COMPARATIVE ANALYSIS OF DIFFERENT ROUTING PROTOCOLS IN DELAY TOLERANT NETWORKS
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 3
Abstract
The modern wireless networks have provided a wide range of applications making it possible to successfully interconnect devices and systems which have the wireless connection facility, such as mobile phones, tablets, laptops etc. all around the world. Modern Internet protocols exhibits inefficient performance in those networks where the connectivity between end nodes has intermittent property due to dynamic topology such as Mobile Ad-hoc Networks (MANET) or Vehicular Ad-hoc Networks (VANET). The network environments where the nodes are characterized by opportunistic connectivity are referred to as Delay Tolerant Networks (DTNs). DTNs have been one of the growing areas of interest characterized by the significant amount of research efforts invested in this area over the past decade. Routing is one of the major issues affecting the overall performance of DTN networks in terms of resource consumption, data delivery and latency. Over the past few years a number of routing protocols have been proposed for DTN networks. In this paper mainly three DTN routing protocols: Direct Delivery, Epidemic Routing and Spray and Wait Routing, are advocated and compared in terms of Average Packet Delivery Probability and Average Latency. To better judge the performance of these routing protocols, the series of simulations are carried out in The ONE simulator with program version of 1.4.1
Authors and Affiliations
Chintan B. Desai , Mr. Vyomal N. Pandya , Dr. Prashant M. Dolia
Power-Time Efficient Algorithm for Computing Reconfigurable FFT in Wireless Sensor Network
Wireless sensor network have several constraints, such as a short transmission range, poor processing capabilities, limited available power and slow execution time. The design of algorithms for fast processing of informa...
Design and Implementation of Captcha with Click Point Authentication based on Hard AI Problems
A fundamental task in security is to create cryptographic primitives based on hard mathematical problems that are computationally intractable Using hard AI problems for security is emerging as an exciting new paradigm, b...
Design & Evaluation For Conversion from Dv to Mpeg4 Video in Grid Environment
The term, grid computing, has become one of the latest buzz words in the IT industry Grid computing is an innovative approach that leverages existing IT infrastructure to optimize computer resources and manage data and c...
AN EFFICIENT APPROACH FOR COOPERATIVE ROUTING IN MANETS
a mobile ad hoc network (MANET) is also a cluster of volatile nodes, self configuring and infrastructure less and will set at anytime and at any site. Cooperative Communication is a latest research area, it combines the...
QoS and Energy Consumption by Symmetric and Asymmetric key Schemes against Blackhole attack in Wireless Sensor Network
The Wireless Sensor Network consists of a number of spatial distributed sensor devices that combines with each other to accomplish a task of environment monitoring, object tracking, etc. and report the gathered data to a...