Survey of Acknowledgement based Vector Routing for Opportunistic Networks
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 5
Abstract
Opportunistic networks are one of the most challenging area of interest MANETs. Here nodes communicate with each other when they get opportunity because path joining two mobile nodes never exists. Again nodes do not contain any knowledge about the network terminology. If they want to deliver message to the destination the routes are built dynamically furthermore, nodes are not having or possess any knowledge about the network terminology and any intermediate node selected as a next hop which brings the message closer up to the destination. These requirements make opportunistic networks most interesting evolutions of MANETs & challenging and promising research field. In this paper we describe composite approach for routing in opportunistic networks, considering traditional different routing protocols unable to deliver messages between hosts. Thus, there is a need for a path to route from source to destination through such networks. We propose composite approach which combines Epidemic Routing and Probabilistic Routing approaches together. When two hosts come into contact of one another, they exchange their summary vectors to determine which messages stored remotely have not been seen by the local host. In turn, each host then requests copies of messages that it has not yet seen. When message reaches to destination, acknowledgment is sent in the same manner to the sender of the message.
Authors and Affiliations
Mr. Prashant Rewagad*1
PERFORMANCE ANALYSIS OF MAXIMUM POWER POINT TRACKING (MPPT)ALGORITHM FOR A SINGLE-PHASE FIVE-LEVEL PWM INVERTER CONNECTED PV SYSTEM
This paper attempts an in-depth analysis of maximum power point tracking (MPPT) algorithm for a single-phase five-level PWM inverter connected PV system. The MPPT technique considered in proposed work is Perturb &...
EVOLUTIONARY METHODS FOR IMAGE CLASSIFICATION: A REVIEW
Image classification has earned enormous attention due to the advent of modern day applications involving image base information and now an extensive research has been carried out in this field. It is important to...
Blue Eyes the Future Technology
Is it possible to create a computer, which can interact with us as we interact each other? For example imagine in a fine morning you walk on to your computer room and switch on your computer, and then it tells you...
Named Entity Recognition in Indian Languages: A Survey
Named Entity Recognition (NER) is the process of determining and identifying all proper nouns into pre defined classes such as persons, places, organi but for Indian languages it is a difficult and challenging ta...
INTRODUCTION OF FINGERPRINT BIOMETRIC TECHNOLOGY IN NIGERIA BANKING SYSTEM: A KNOWLEDGE-BASED SECURITY PERSPECTIVE
Web-based and cash-point/automated teller machine (ATM) fraud has become a common occurrence where third parties gain unauthorized access to customer’s fund. A Knowledge management (KM) transformation principles,...