SlideShare ist ein Scribd-Unternehmen logo
1 von 32
Routing Protocols for
Delay Tolerant Network:
A Survey and Comparison

              Authors:
          R. S. Mangrulkar
                 &
      Dr. Mohammad Atique
Introduction
• DTN evolves from MANET

• Main principal for routing message in DTN is “Store and
  Forward”

   o Store: Each node in DTN stores incoming message in the buffer.
   o Forward: Deliver it to the other desirable nodes towards
     destination whenever contact is initiated.

    “Contact” in DTN is the message exchange between two or
     more nodes when they move in transmission range of each
     other.
Introduction
• MANET uses 2 phase approach to deliver data:

  1. Setup the route from source to destination

  2. transmit data and maintain route information till
     transmission is over
Routing Strategies in DTN
• Routing in DTN is mainly categorized into:
  1. Flooding strategy: replicates the messages to
     enough nodes so that the destination nodes
     must receive it.

  2. Forwarding Strategy: uses knowledge about the
     network to select the best path (shortest one) to
     the destination.
Flooding Strategy
• Multiple copies of the same message will be
  created and delivered to a set of nodes called
  relay nodes which store the message until they
  can “contact” with the destination node.

• Advantages:
  o Good chance of bringing the source in contact with
    destination
  o High probability of message delivery to succeed
  o No global or local knowledge about network
Flooding Strategy
1. Single Hop Transmission
• the source and destination come in contact with
  each other directly
• possible when the source and destination are one
  hop apart or immediate neighbor of each other

 no relayed messages
 very less resources are required

 large delay and less probability of message delivery
Flooding Strategy
2. Two-Hop Relay
• Source node along with the nodes coming in
   contact with source node and working in a
   cooperative manner to successfully deliver the
   message to the destination

 increases the message delivery probability
 increases the bandwidth and storage consumption
• same fundamental advantages and limitations as
  direct transmission
Flooding Strategy
3. Tree Based Flooding
• Distribute copies of messages to other relay
  nodes which come in contact with the already
  discovered node

• One extra control field added to the message
  for the information about the number of copies
  a relay node can make and forward
Flooding Strategy
4. Epidemic Routing
• Assumes that each node has unlimited storage space and
   bandwidth being able to store all the messages
   transmitted during "contact" phase
• Summary Vector, a list of messages in the database, is
   exchanged between nodes, so that the absent messages
   in the vector are synchronized.

 Used in sparse(=small) network and small size message

 The message continues to propagate even it is
  successfully delivered to destination
Flooding Strategy
5. Prioritized Epidemic Routing
• impose a partial ordering of message called
  bundles
• Priority functions are used – transmission or
  deletion function

Parameters are used to evaluate the priorities
  o current cost to destination
  o current cost from source
  o the expiry time and generation time …
Flooding Strategy
6. Spray and Wait
• In Spray phase, each node will flood (spray)
  each message to L no. of relay nodes
• The L is initialized by source node
• If destination is encountered, message
  transmission is successfully terminated

• Wait phase started when destination is not
  encountered, and relay node can only deliver
  message during the contact.
Flooding Strategy
7. Spray and Focus
• Modification of Spray and Wait
• In Focus phase, a single copy of message is used
  to focus limited relay node to route the
  message to destination

• Designed for specific application where mobility
  of each node is localized (in small area most of
  the time)
Flooding Strategy
8. MaxProp strategy
• City environment
• Nodes = city buses (high probability to meet)

• Order of stored messages:
   – 1st phase: based on hop count information of each
     message from low to high
   – 2nd phase: based on cost from high to low

• Buffer is utilized in:
   – Front end of buffer is used by 1st phase
   – Back end of buffer is used by 2nd phase
Flooding Strategy
9. Opportunistic Routing with Window-Aware Replication
• Main goal:
   – Reduce resource utilization
   – Reduce partial and dropped messages during transmission

• Partial messages arises when a node move out of
  transmission range while message transmission is going on

• Number of bytes to be transferred is estimated to help utilize
  the bandwidth effectively

• Nodes need to be able to measure its speed and direction –
  equipped with GPS-like devices
Flooding Strategy
10. Cost Efficient Erasure Code Routing (CEECR)
• Based on erasure based coding
• Divides the original message into subsets
  (=blocks) and transmits individually
• Decoding technique is used to obtain the
  original message

• Advantage of Erasure Coding: chances to
  recover original messages in case of failure in
  trans.
Flooding Strategy
11. Constant Cost Quality Routing (CCQR)
• Message flooding only within high quality
  nodes in DTN.

• The nodal cost is used as a parameter referring
  to the total number of messages received by a
  given node during the entire routing process

• Solve nodal imbalance problems
Flooding Strategy
12. A-SMART:
• An Advance Controlled-Flooding Routing with
  Group Structures
• Nodes are called companion nodes forming an
  ANYCAST group
  – Periodically broadcast its group identities and hop
    distance to build routing table

• 1st phase: introduce extra phase to route the
  message to the companion nodes
• 2nd phase is same as SMART protocol
Flooding Strategy
           •   MSN : Message
                –   S: Source Node
                –   D: Destination Node
                –   R: Relay Nodes
                –   EN: Encountered Nodes
                –   EVC: Evolution nodes satisfying evolution
                    criteria
                –   L: Specified nodes in Message
                –   NC: Nodes Encountered during contact
                –   EN: Nodes storing encoded message
                –   QN: Quality Nodes
                –   TCN: Travel Companion Nodes
                –   HPN: High Probability Nodes
                –   DPN: Direction and Byte Predicted Nodes
           •   MDR : Message Delivery Ratio,
                –   Lw: Low
                –   N: Normal
                –   G: Good
           •   LT : Latency
                –   L-Low
                –   N-Normal
           •   RP: Routing Protocol
           •   MV: Message Vector
           •   MPV: Message Probability Vector
           •   DPV: Delivery Probability Vector
Forwarding Strategy
• Makes use of network topology and local/global
  knowledge to find the best route path to deliver
  the message to the destination.
• No message replication
• Network parameters are required for estimating
  a single path

• Advantages:
  o No replication -> less bandwidth and consumption
  o Faster since the best path routing is used
Forwarding Strategy
1. Location Based Routing Stategy
• Each node in the network is assigned the coordinate – GPS
  coordinate.
• Then distance formula, calculating minimum distance
  between source and destination, is used to estimate the cost
  of delivering message

• Path estimation – coordinates of source, destination and
  intermediate node
 eliminates the need for storing routing tables and control
  information transfer management

 Obstacles
 Mobility of a node changes the physical coordinate
Forwarding Strategy
2. Gradient Routing strategy
• Weights are assigned to the nodes representing
  suitability of message delivery
• Relay nodes contact one another to have better
  metric for message destination, and then pass
  the message to the next node

• Suitable for Sensor Network
Forwarding Strategy
3. Label Based Forwarding Strategy
• Firstly, create groups, called “labeled group”
• Then, the groups are chosen to be the next node
  or groups to forward the message to destination

Efficiently utilize bandwidth and consumption
Forwarding Strategy
4. Bubble Rap Forwarding Strategy
• Focus on issues of
 o Community – divide the nodes in specific communities or
   groups
 o Centrality - always becomes centre of attraction

• Global ranking: used for a node to bubble the
  message up to the hierarchical rankings tree until it
  reaches a node which is in the same community as
  the destination node
• Local ranking: further bubble the message until the
  message is reached destination or expires
Forwarding Strategy
5. NECTAR
• Based on neighborhood contact history –
   Neighborhood Index – to determine the most
   appropriated route

• Use heuristic knowledge based on mobility
• relay in controlled manner to limit the traffic in the
  network.

 Improve the number of delivered messages
 Consume fewer resource in the limited network
Forwarding Strategy
6. CREAST
• An opportunistic forwarding protocol based on
   conditional residual* time
                                 *Residual = remaining after most of sth has gone



• Conditional residual time – a parameter estimating
  the time remaining for a pair of nodes to meet using
  only local knowledge of the past contacts.

 Lower end-to-end delay, since no global knowledge
  and no future contact schedule is dependent
 Better delivery ratio compared to flooding protocols
Forwarding Strategy
7. Conditional Shortest Path Routing (CSPR)
• Based on human mobility traces
• Use conditional intermeeting time
  – As a parameter computing the average intermeeting time
    between two nodes relative to a meeting with third node
    using local knowledge of the past contacts.
  – To estimate best path towards destination in shortest
    path routing algorithm

 Achieve high delivery rate
 Lower end-to-end delay compared shortest path
  routing protocols
Forwarding Strategy
8. QoNSW (Quality of Node with Spray and Wait)
• QoN (Quality of Node) refers to the activity of node,
   or the number a node meets other different nodes
   within given interval of time

• Node: the more meeting to others, the greater QoN
• Find the best suitable relay node to route message

 Significant improvements on Binary Spray and Wait
  and Simple Spray and Wait
Forwarding Strategy
9. Single Copy Replication routing protocol (SCR)
• duplicate the message to the node selected as best
   relay node
• Time Interval – as a parameter to select the node

• Starts message transmission in Critical Transmission
  Rang(CTR)
• Stop transferring out of communication range
 Reduces the overhead by decreasing message
  delivery failure due to node's movement out of
  transmission range
Forwarding Strategy
10. CRHC
• Based on Hierarchical forwarding and cluster control
  mechanism

• Reduces messages transmission by allowing
  transmission permission to Cluster Head

 higher delivery rate and lower delay

 needs to maintain the information regarding partial
  nodes of the network luster Head
Forwarding Strategy
11. PROCCS
• based on repetitive contact patterns and their time
  sequencing to improve routing

• Greedy path probabilistic approach – to calculate
  probability of path and then best path is selected as the
  path for routing message

• Contact graph – for particular time issued by PROCCS to
  calculate best path

 high message delivery ratio with no message replication as
  compared to PROPHET and Epidemic.
Forwarding Strategy
           •   S: Source Node
           •   D: Destination Node
           •   R: Relay Nodes
           •   RP: Routing Protocol
           •   DN: Distance between Neighboring Nodes
           •   SM: Suitability to deliver message
           •   SLN: Nodes with same Label
           •   SCN: Nodes in Same Community
           •   PCH: Previous Contact History
           •   CRT: Conditional Residual Time
           •   CIT: Conditional Intermeeting Time
           •   QoN: Quality of Nodes
           •   TI: Time Interval
           •   CH: Cluster Head
           •   CPTS: Contact Pattern and Time Sequencing
           •   HGP: High Greedy Probability Value Nodes
           •   MDR: Message Delivery Ratio
           •   LT: Latency
           •   G: Good
           •   N: Normal
Conclusion
• Routing protocols in DTN are classified into two broad categories
    – Flooding
    – Forwarding

• Each protocol has its own advantages and disadvantage

• The DTN based applications suffered from less resources as well as
  bandwidth.

• Suitable routing protocol in DTV depends on the application for
  which Delay Tolerant Network is configured.

• The large delay results in low latency

Weitere ähnliche Inhalte

Was ist angesagt?

Delay Tolerant Network - Journal
Delay Tolerant Network - JournalDelay Tolerant Network - Journal
Delay Tolerant Network - JournalLaili Aidi
 
Intro to DTN and routing classification
Intro to DTN and routing classificationIntro to DTN and routing classification
Intro to DTN and routing classificationShivi Shukla
 
Project
Project Project
Project J M
 
Delay Tolerant Network (DTN)
Delay Tolerant Network (DTN)Delay Tolerant Network (DTN)
Delay Tolerant Network (DTN)Haya Saani
 
Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...
Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...
Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...Dr. Mazlan Abbas
 
Delay and Disruption Tolerance and the Internet of Things
Delay and Disruption Tolerance and the Internet of ThingsDelay and Disruption Tolerance and the Internet of Things
Delay and Disruption Tolerance and the Internet of ThingsNordic Digital Business Summit
 
Delay tolerant networking
Delay tolerant networkingDelay tolerant networking
Delay tolerant networkingApoorva Hebbar
 
Opportunistic Networking: Extending Internet Communications Through Spontaneo...
Opportunistic Networking: Extending Internet Communications Through Spontaneo...Opportunistic Networking: Extending Internet Communications Through Spontaneo...
Opportunistic Networking: Extending Internet Communications Through Spontaneo...Waldir Moreira
 
Opportunistic Networking
Opportunistic NetworkingOpportunistic Networking
Opportunistic NetworkingNoorin Fatima
 
DPRoPHET in Delay Tolerant Network
DPRoPHET in Delay Tolerant NetworkDPRoPHET in Delay Tolerant Network
DPRoPHET in Delay Tolerant NetworkPhearin Sok
 
Delay Tolerant Network - Presentation
Delay Tolerant Network - PresentationDelay Tolerant Network - Presentation
Delay Tolerant Network - PresentationLaili Aidi
 
Multicasting in Delay Tolerant Networks: Implementation and Performance Analysis
Multicasting in Delay Tolerant Networks: Implementation and Performance AnalysisMulticasting in Delay Tolerant Networks: Implementation and Performance Analysis
Multicasting in Delay Tolerant Networks: Implementation and Performance AnalysisNagendra Posani
 
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...IJSRD
 
Network Coding in Disruption Tolerant Network (DTN)
Network Coding in Disruption Tolerant Network (DTN)Network Coding in Disruption Tolerant Network (DTN)
Network Coding in Disruption Tolerant Network (DTN)Faheema Monica
 
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...ijasuc
 
Iaetsd a secured based information sharing scheme via
Iaetsd a secured based information sharing scheme viaIaetsd a secured based information sharing scheme via
Iaetsd a secured based information sharing scheme viaIaetsd Iaetsd
 

Was ist angesagt? (20)

Delay Tolerant Network - Journal
Delay Tolerant Network - JournalDelay Tolerant Network - Journal
Delay Tolerant Network - Journal
 
Intro to DTN and routing classification
Intro to DTN and routing classificationIntro to DTN and routing classification
Intro to DTN and routing classification
 
Project
Project Project
Project
 
Delay Tolerant Network (DTN)
Delay Tolerant Network (DTN)Delay Tolerant Network (DTN)
Delay Tolerant Network (DTN)
 
Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...
Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...
Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...
 
Delay and Disruption Tolerance and the Internet of Things
Delay and Disruption Tolerance and the Internet of ThingsDelay and Disruption Tolerance and the Internet of Things
Delay and Disruption Tolerance and the Internet of Things
 
Delay tolerant networking
Delay tolerant networkingDelay tolerant networking
Delay tolerant networking
 
Opportunistic Networking: Extending Internet Communications Through Spontaneo...
Opportunistic Networking: Extending Internet Communications Through Spontaneo...Opportunistic Networking: Extending Internet Communications Through Spontaneo...
Opportunistic Networking: Extending Internet Communications Through Spontaneo...
 
Opportunistic Networking
Opportunistic NetworkingOpportunistic Networking
Opportunistic Networking
 
DTN
DTNDTN
DTN
 
DPRoPHET in Delay Tolerant Network
DPRoPHET in Delay Tolerant NetworkDPRoPHET in Delay Tolerant Network
DPRoPHET in Delay Tolerant Network
 
Delay telerant network
Delay telerant networkDelay telerant network
Delay telerant network
 
Delay Tolerant Network - Presentation
Delay Tolerant Network - PresentationDelay Tolerant Network - Presentation
Delay Tolerant Network - Presentation
 
WLAN IP and Frame
WLAN IP and FrameWLAN IP and Frame
WLAN IP and Frame
 
Multicasting in Delay Tolerant Networks: Implementation and Performance Analysis
Multicasting in Delay Tolerant Networks: Implementation and Performance AnalysisMulticasting in Delay Tolerant Networks: Implementation and Performance Analysis
Multicasting in Delay Tolerant Networks: Implementation and Performance Analysis
 
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
 
Network Coding in Disruption Tolerant Network (DTN)
Network Coding in Disruption Tolerant Network (DTN)Network Coding in Disruption Tolerant Network (DTN)
Network Coding in Disruption Tolerant Network (DTN)
 
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
 
E42062126
E42062126E42062126
E42062126
 
Iaetsd a secured based information sharing scheme via
Iaetsd a secured based information sharing scheme viaIaetsd a secured based information sharing scheme via
Iaetsd a secured based information sharing scheme via
 

Andere mochten auch

lassification with decision trees from a nonparametric predictive inference p...
lassification with decision trees from a nonparametric predictive inference p...lassification with decision trees from a nonparametric predictive inference p...
lassification with decision trees from a nonparametric predictive inference p...NTNU
 
The Evolution of Offshoring
The Evolution of OffshoringThe Evolution of Offshoring
The Evolution of Offshoringswiss IT bridge
 
Lviv Outsourcing Forum Олександра Альхімович “Drivers of change at the begin...
Lviv Outsourcing Forum Олександра Альхімович  “Drivers of change at the begin...Lviv Outsourcing Forum Олександра Альхімович  “Drivers of change at the begin...
Lviv Outsourcing Forum Олександра Альхімович “Drivers of change at the begin...Lviv Startup Club
 
Industry 4.0 and the road towards it
Industry 4.0 and the road towards itIndustry 4.0 and the road towards it
Industry 4.0 and the road towards itRick Bouter
 
The Hyper Connected Era: Mobile First, Cloud First and Multi Screen
The Hyper Connected Era: Mobile First, Cloud First and Multi Screen The Hyper Connected Era: Mobile First, Cloud First and Multi Screen
The Hyper Connected Era: Mobile First, Cloud First and Multi Screen Jose Papo, MSc
 
Origins of Public Relations
Origins of Public RelationsOrigins of Public Relations
Origins of Public RelationsKelli Burns
 
The Fourth Industrial Revolution
The Fourth Industrial RevolutionThe Fourth Industrial Revolution
The Fourth Industrial RevolutionLuca Lamera
 
Outsourcing & Offshoring
Outsourcing & OffshoringOutsourcing & Offshoring
Outsourcing & OffshoringArun Khedwal
 
4th Industrial Revolution by Sam Williams
4th Industrial Revolution by Sam Williams4th Industrial Revolution by Sam Williams
4th Industrial Revolution by Sam WilliamsCertus Solutions
 
Huawei parameter strategy v1.4 1st dec
Huawei parameter strategy v1.4  1st decHuawei parameter strategy v1.4  1st dec
Huawei parameter strategy v1.4 1st decKetut Widya
 

Andere mochten auch (15)

BlitzTrader_PPT
BlitzTrader_PPTBlitzTrader_PPT
BlitzTrader_PPT
 
The Future of Work - The Fourth Industrial Revolution
The Future of Work - The Fourth Industrial RevolutionThe Future of Work - The Fourth Industrial Revolution
The Future of Work - The Fourth Industrial Revolution
 
lassification with decision trees from a nonparametric predictive inference p...
lassification with decision trees from a nonparametric predictive inference p...lassification with decision trees from a nonparametric predictive inference p...
lassification with decision trees from a nonparametric predictive inference p...
 
Analysis of Business Environment
Analysis of  Business EnvironmentAnalysis of  Business Environment
Analysis of Business Environment
 
The Evolution of Offshoring
The Evolution of OffshoringThe Evolution of Offshoring
The Evolution of Offshoring
 
Lviv Outsourcing Forum Олександра Альхімович “Drivers of change at the begin...
Lviv Outsourcing Forum Олександра Альхімович  “Drivers of change at the begin...Lviv Outsourcing Forum Олександра Альхімович  “Drivers of change at the begin...
Lviv Outsourcing Forum Олександра Альхімович “Drivers of change at the begin...
 
The fourth industrial revolution
The fourth industrial revolutionThe fourth industrial revolution
The fourth industrial revolution
 
Industry 4.0 and the road towards it
Industry 4.0 and the road towards itIndustry 4.0 and the road towards it
Industry 4.0 and the road towards it
 
The Hyper Connected Era: Mobile First, Cloud First and Multi Screen
The Hyper Connected Era: Mobile First, Cloud First and Multi Screen The Hyper Connected Era: Mobile First, Cloud First and Multi Screen
The Hyper Connected Era: Mobile First, Cloud First and Multi Screen
 
Origins of Public Relations
Origins of Public RelationsOrigins of Public Relations
Origins of Public Relations
 
The Fourth Industrial Revolution
The Fourth Industrial RevolutionThe Fourth Industrial Revolution
The Fourth Industrial Revolution
 
Outsourcing & Offshoring
Outsourcing & OffshoringOutsourcing & Offshoring
Outsourcing & Offshoring
 
4th Industrial Revolution by Sam Williams
4th Industrial Revolution by Sam Williams4th Industrial Revolution by Sam Williams
4th Industrial Revolution by Sam Williams
 
Huawei parameter strategy v1.4 1st dec
Huawei parameter strategy v1.4  1st decHuawei parameter strategy v1.4  1st dec
Huawei parameter strategy v1.4 1st dec
 
10 facts about jobs in the future
10 facts about jobs in the future10 facts about jobs in the future
10 facts about jobs in the future
 

Ähnlich wie Routing protocol for delay tolerant network a survey and comparison

MobileAdHocRoutingProtocols.pptx
MobileAdHocRoutingProtocols.pptxMobileAdHocRoutingProtocols.pptx
MobileAdHocRoutingProtocols.pptxHirazNor
 
Z02417321735
Z02417321735Z02417321735
Z02417321735IJMER
 
Module-4 Short notes.pptx
Module-4 Short notes.pptxModule-4 Short notes.pptx
Module-4 Short notes.pptxAzmiNizar1
 
Unit 4_Network Layer_Part II.pptx
Unit 4_Network Layer_Part II.pptxUnit 4_Network Layer_Part II.pptx
Unit 4_Network Layer_Part II.pptxHODElex
 
Wsn routing protocol
Wsn routing protocolWsn routing protocol
Wsn routing protocolSuganthiN2
 
Unit 3_Network Layer_Part II.pptx
Unit 3_Network Layer_Part II.pptxUnit 3_Network Layer_Part II.pptx
Unit 3_Network Layer_Part II.pptxHODElex
 
A review of routing protocols in wsn
A review of routing protocols in wsnA review of routing protocols in wsn
A review of routing protocols in wsnAyman Adel
 
DATA COMMUNICATION BY BP. ...
DATA COMMUNICATION BY BP.                                                    ...DATA COMMUNICATION BY BP.                                                    ...
DATA COMMUNICATION BY BP. ...BPRAVEENROLEX
 
Chapter_13_Energy-Efficient_WSN_Slides.ppt
Chapter_13_Energy-Efficient_WSN_Slides.pptChapter_13_Energy-Efficient_WSN_Slides.ppt
Chapter_13_Energy-Efficient_WSN_Slides.pptAjayTiwari301041
 
Transport Layer In Computer Network
Transport Layer In Computer NetworkTransport Layer In Computer Network
Transport Layer In Computer NetworkDestro Destro
 
Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...revathiyadavb
 
computer Netwoks - network layer
computer Netwoks - network layercomputer Netwoks - network layer
computer Netwoks - network layerSendhil Kumar
 
MOBILE COMPUTING Unit 4.pptx
 MOBILE COMPUTING Unit 4.pptx MOBILE COMPUTING Unit 4.pptx
MOBILE COMPUTING Unit 4.pptxkarthiksmart21
 
Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...
Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...
Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...CSCJournals
 

Ähnlich wie Routing protocol for delay tolerant network a survey and comparison (20)

MobileAdHocRoutingProtocols.pptx
MobileAdHocRoutingProtocols.pptxMobileAdHocRoutingProtocols.pptx
MobileAdHocRoutingProtocols.pptx
 
Z02417321735
Z02417321735Z02417321735
Z02417321735
 
WSN Routing Protocols
WSN Routing ProtocolsWSN Routing Protocols
WSN Routing Protocols
 
Module-4 Short notes.pptx
Module-4 Short notes.pptxModule-4 Short notes.pptx
Module-4 Short notes.pptx
 
Unit 4_Network Layer_Part II.pptx
Unit 4_Network Layer_Part II.pptxUnit 4_Network Layer_Part II.pptx
Unit 4_Network Layer_Part II.pptx
 
ICICCE0367
ICICCE0367ICICCE0367
ICICCE0367
 
Wsn routing protocol
Wsn routing protocolWsn routing protocol
Wsn routing protocol
 
Unit 3_Network Layer_Part II.pptx
Unit 3_Network Layer_Part II.pptxUnit 3_Network Layer_Part II.pptx
Unit 3_Network Layer_Part II.pptx
 
A review of routing protocols in wsn
A review of routing protocols in wsnA review of routing protocols in wsn
A review of routing protocols in wsn
 
7Multiplexing.pdf
7Multiplexing.pdf7Multiplexing.pdf
7Multiplexing.pdf
 
DATA COMMUNICATION BY BP. ...
DATA COMMUNICATION BY BP.                                                    ...DATA COMMUNICATION BY BP.                                                    ...
DATA COMMUNICATION BY BP. ...
 
Switch networking
Switch networking Switch networking
Switch networking
 
Chapter_13_Energy-Efficient_WSN_Slides.ppt
Chapter_13_Energy-Efficient_WSN_Slides.pptChapter_13_Energy-Efficient_WSN_Slides.ppt
Chapter_13_Energy-Efficient_WSN_Slides.ppt
 
Transport Layer In Computer Network
Transport Layer In Computer NetworkTransport Layer In Computer Network
Transport Layer In Computer Network
 
Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...
 
dtn-180110112549.pdf
dtn-180110112549.pdfdtn-180110112549.pdf
dtn-180110112549.pdf
 
computer Netwoks - network layer
computer Netwoks - network layercomputer Netwoks - network layer
computer Netwoks - network layer
 
MOBILE COMPUTING Unit 4.pptx
 MOBILE COMPUTING Unit 4.pptx MOBILE COMPUTING Unit 4.pptx
MOBILE COMPUTING Unit 4.pptx
 
Unit 33-routing protocols for wsn
Unit 33-routing protocols for wsnUnit 33-routing protocols for wsn
Unit 33-routing protocols for wsn
 
Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...
Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...
Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...
 

Mehr von Phearin Sok

A Mobile Service Architecture for Improving Availability and Continuity
A Mobile Service Architecture for Improving Availability and ContinuityA Mobile Service Architecture for Improving Availability and Continuity
A Mobile Service Architecture for Improving Availability and ContinuityPhearin Sok
 
Locator ID Separation Using Device Unique ID
Locator ID Separation Using Device Unique IDLocator ID Separation Using Device Unique ID
Locator ID Separation Using Device Unique IDPhearin Sok
 
Mobility Management in HIMALIS Architecture
Mobility Management in HIMALIS ArchitectureMobility Management in HIMALIS Architecture
Mobility Management in HIMALIS ArchitecturePhearin Sok
 
Desktop to Cloud Transformation Planning
Desktop to Cloud Transformation PlanningDesktop to Cloud Transformation Planning
Desktop to Cloud Transformation PlanningPhearin Sok
 
Content centric networking
Content centric networkingContent centric networking
Content centric networkingPhearin Sok
 
Pervasive computing and its Security Issues
Pervasive computing and its Security IssuesPervasive computing and its Security Issues
Pervasive computing and its Security IssuesPhearin Sok
 

Mehr von Phearin Sok (9)

A Mobile Service Architecture for Improving Availability and Continuity
A Mobile Service Architecture for Improving Availability and ContinuityA Mobile Service Architecture for Improving Availability and Continuity
A Mobile Service Architecture for Improving Availability and Continuity
 
N Screen
N ScreenN Screen
N Screen
 
Locator ID Separation Using Device Unique ID
Locator ID Separation Using Device Unique IDLocator ID Separation Using Device Unique ID
Locator ID Separation Using Device Unique ID
 
Mobility Management in HIMALIS Architecture
Mobility Management in HIMALIS ArchitectureMobility Management in HIMALIS Architecture
Mobility Management in HIMALIS Architecture
 
UNICEF
UNICEFUNICEF
UNICEF
 
Desktop to Cloud Transformation Planning
Desktop to Cloud Transformation PlanningDesktop to Cloud Transformation Planning
Desktop to Cloud Transformation Planning
 
Content centric networking
Content centric networkingContent centric networking
Content centric networking
 
Pervasive computing and its Security Issues
Pervasive computing and its Security IssuesPervasive computing and its Security Issues
Pervasive computing and its Security Issues
 
Sensor Network
Sensor NetworkSensor Network
Sensor Network
 

Kürzlich hochgeladen

INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseCeline George
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Developmentchesterberbo7
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptxJonalynLegaspi2
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsPooky Knightsmith
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptxmary850239
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvRicaMaeCastro1
 

Kürzlich hochgeladen (20)

INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 Database
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Development
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptx
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young minds
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
 

Routing protocol for delay tolerant network a survey and comparison

  • 1. Routing Protocols for Delay Tolerant Network: A Survey and Comparison Authors: R. S. Mangrulkar & Dr. Mohammad Atique
  • 2. Introduction • DTN evolves from MANET • Main principal for routing message in DTN is “Store and Forward” o Store: Each node in DTN stores incoming message in the buffer. o Forward: Deliver it to the other desirable nodes towards destination whenever contact is initiated.  “Contact” in DTN is the message exchange between two or more nodes when they move in transmission range of each other.
  • 3. Introduction • MANET uses 2 phase approach to deliver data: 1. Setup the route from source to destination 2. transmit data and maintain route information till transmission is over
  • 4. Routing Strategies in DTN • Routing in DTN is mainly categorized into: 1. Flooding strategy: replicates the messages to enough nodes so that the destination nodes must receive it. 2. Forwarding Strategy: uses knowledge about the network to select the best path (shortest one) to the destination.
  • 5. Flooding Strategy • Multiple copies of the same message will be created and delivered to a set of nodes called relay nodes which store the message until they can “contact” with the destination node. • Advantages: o Good chance of bringing the source in contact with destination o High probability of message delivery to succeed o No global or local knowledge about network
  • 6. Flooding Strategy 1. Single Hop Transmission • the source and destination come in contact with each other directly • possible when the source and destination are one hop apart or immediate neighbor of each other  no relayed messages  very less resources are required  large delay and less probability of message delivery
  • 7. Flooding Strategy 2. Two-Hop Relay • Source node along with the nodes coming in contact with source node and working in a cooperative manner to successfully deliver the message to the destination  increases the message delivery probability  increases the bandwidth and storage consumption • same fundamental advantages and limitations as direct transmission
  • 8. Flooding Strategy 3. Tree Based Flooding • Distribute copies of messages to other relay nodes which come in contact with the already discovered node • One extra control field added to the message for the information about the number of copies a relay node can make and forward
  • 9. Flooding Strategy 4. Epidemic Routing • Assumes that each node has unlimited storage space and bandwidth being able to store all the messages transmitted during "contact" phase • Summary Vector, a list of messages in the database, is exchanged between nodes, so that the absent messages in the vector are synchronized.  Used in sparse(=small) network and small size message  The message continues to propagate even it is successfully delivered to destination
  • 10. Flooding Strategy 5. Prioritized Epidemic Routing • impose a partial ordering of message called bundles • Priority functions are used – transmission or deletion function Parameters are used to evaluate the priorities o current cost to destination o current cost from source o the expiry time and generation time …
  • 11. Flooding Strategy 6. Spray and Wait • In Spray phase, each node will flood (spray) each message to L no. of relay nodes • The L is initialized by source node • If destination is encountered, message transmission is successfully terminated • Wait phase started when destination is not encountered, and relay node can only deliver message during the contact.
  • 12. Flooding Strategy 7. Spray and Focus • Modification of Spray and Wait • In Focus phase, a single copy of message is used to focus limited relay node to route the message to destination • Designed for specific application where mobility of each node is localized (in small area most of the time)
  • 13. Flooding Strategy 8. MaxProp strategy • City environment • Nodes = city buses (high probability to meet) • Order of stored messages: – 1st phase: based on hop count information of each message from low to high – 2nd phase: based on cost from high to low • Buffer is utilized in: – Front end of buffer is used by 1st phase – Back end of buffer is used by 2nd phase
  • 14. Flooding Strategy 9. Opportunistic Routing with Window-Aware Replication • Main goal: – Reduce resource utilization – Reduce partial and dropped messages during transmission • Partial messages arises when a node move out of transmission range while message transmission is going on • Number of bytes to be transferred is estimated to help utilize the bandwidth effectively • Nodes need to be able to measure its speed and direction – equipped with GPS-like devices
  • 15. Flooding Strategy 10. Cost Efficient Erasure Code Routing (CEECR) • Based on erasure based coding • Divides the original message into subsets (=blocks) and transmits individually • Decoding technique is used to obtain the original message • Advantage of Erasure Coding: chances to recover original messages in case of failure in trans.
  • 16. Flooding Strategy 11. Constant Cost Quality Routing (CCQR) • Message flooding only within high quality nodes in DTN. • The nodal cost is used as a parameter referring to the total number of messages received by a given node during the entire routing process • Solve nodal imbalance problems
  • 17. Flooding Strategy 12. A-SMART: • An Advance Controlled-Flooding Routing with Group Structures • Nodes are called companion nodes forming an ANYCAST group – Periodically broadcast its group identities and hop distance to build routing table • 1st phase: introduce extra phase to route the message to the companion nodes • 2nd phase is same as SMART protocol
  • 18. Flooding Strategy • MSN : Message – S: Source Node – D: Destination Node – R: Relay Nodes – EN: Encountered Nodes – EVC: Evolution nodes satisfying evolution criteria – L: Specified nodes in Message – NC: Nodes Encountered during contact – EN: Nodes storing encoded message – QN: Quality Nodes – TCN: Travel Companion Nodes – HPN: High Probability Nodes – DPN: Direction and Byte Predicted Nodes • MDR : Message Delivery Ratio, – Lw: Low – N: Normal – G: Good • LT : Latency – L-Low – N-Normal • RP: Routing Protocol • MV: Message Vector • MPV: Message Probability Vector • DPV: Delivery Probability Vector
  • 19. Forwarding Strategy • Makes use of network topology and local/global knowledge to find the best route path to deliver the message to the destination. • No message replication • Network parameters are required for estimating a single path • Advantages: o No replication -> less bandwidth and consumption o Faster since the best path routing is used
  • 20. Forwarding Strategy 1. Location Based Routing Stategy • Each node in the network is assigned the coordinate – GPS coordinate. • Then distance formula, calculating minimum distance between source and destination, is used to estimate the cost of delivering message • Path estimation – coordinates of source, destination and intermediate node  eliminates the need for storing routing tables and control information transfer management  Obstacles  Mobility of a node changes the physical coordinate
  • 21. Forwarding Strategy 2. Gradient Routing strategy • Weights are assigned to the nodes representing suitability of message delivery • Relay nodes contact one another to have better metric for message destination, and then pass the message to the next node • Suitable for Sensor Network
  • 22. Forwarding Strategy 3. Label Based Forwarding Strategy • Firstly, create groups, called “labeled group” • Then, the groups are chosen to be the next node or groups to forward the message to destination Efficiently utilize bandwidth and consumption
  • 23. Forwarding Strategy 4. Bubble Rap Forwarding Strategy • Focus on issues of o Community – divide the nodes in specific communities or groups o Centrality - always becomes centre of attraction • Global ranking: used for a node to bubble the message up to the hierarchical rankings tree until it reaches a node which is in the same community as the destination node • Local ranking: further bubble the message until the message is reached destination or expires
  • 24. Forwarding Strategy 5. NECTAR • Based on neighborhood contact history – Neighborhood Index – to determine the most appropriated route • Use heuristic knowledge based on mobility • relay in controlled manner to limit the traffic in the network.  Improve the number of delivered messages  Consume fewer resource in the limited network
  • 25. Forwarding Strategy 6. CREAST • An opportunistic forwarding protocol based on conditional residual* time *Residual = remaining after most of sth has gone • Conditional residual time – a parameter estimating the time remaining for a pair of nodes to meet using only local knowledge of the past contacts.  Lower end-to-end delay, since no global knowledge and no future contact schedule is dependent  Better delivery ratio compared to flooding protocols
  • 26. Forwarding Strategy 7. Conditional Shortest Path Routing (CSPR) • Based on human mobility traces • Use conditional intermeeting time – As a parameter computing the average intermeeting time between two nodes relative to a meeting with third node using local knowledge of the past contacts. – To estimate best path towards destination in shortest path routing algorithm  Achieve high delivery rate  Lower end-to-end delay compared shortest path routing protocols
  • 27. Forwarding Strategy 8. QoNSW (Quality of Node with Spray and Wait) • QoN (Quality of Node) refers to the activity of node, or the number a node meets other different nodes within given interval of time • Node: the more meeting to others, the greater QoN • Find the best suitable relay node to route message  Significant improvements on Binary Spray and Wait and Simple Spray and Wait
  • 28. Forwarding Strategy 9. Single Copy Replication routing protocol (SCR) • duplicate the message to the node selected as best relay node • Time Interval – as a parameter to select the node • Starts message transmission in Critical Transmission Rang(CTR) • Stop transferring out of communication range  Reduces the overhead by decreasing message delivery failure due to node's movement out of transmission range
  • 29. Forwarding Strategy 10. CRHC • Based on Hierarchical forwarding and cluster control mechanism • Reduces messages transmission by allowing transmission permission to Cluster Head  higher delivery rate and lower delay  needs to maintain the information regarding partial nodes of the network luster Head
  • 30. Forwarding Strategy 11. PROCCS • based on repetitive contact patterns and their time sequencing to improve routing • Greedy path probabilistic approach – to calculate probability of path and then best path is selected as the path for routing message • Contact graph – for particular time issued by PROCCS to calculate best path  high message delivery ratio with no message replication as compared to PROPHET and Epidemic.
  • 31. Forwarding Strategy • S: Source Node • D: Destination Node • R: Relay Nodes • RP: Routing Protocol • DN: Distance between Neighboring Nodes • SM: Suitability to deliver message • SLN: Nodes with same Label • SCN: Nodes in Same Community • PCH: Previous Contact History • CRT: Conditional Residual Time • CIT: Conditional Intermeeting Time • QoN: Quality of Nodes • TI: Time Interval • CH: Cluster Head • CPTS: Contact Pattern and Time Sequencing • HGP: High Greedy Probability Value Nodes • MDR: Message Delivery Ratio • LT: Latency • G: Good • N: Normal
  • 32. Conclusion • Routing protocols in DTN are classified into two broad categories – Flooding – Forwarding • Each protocol has its own advantages and disadvantage • The DTN based applications suffered from less resources as well as bandwidth. • Suitable routing protocol in DTV depends on the application for which Delay Tolerant Network is configured. • The large delay results in low latency