SlideShare a Scribd company logo
Natarajan Meghanathan, et al. (Eds): SIPM, FCST, ITCA, WSE, ACSIT, CS & IT 06, pp. 573–578, 2012.
© CS & IT-CSCP 2012 DOI : 10.5121/csit.2012.2356
AN EFFICIENT ROUTING PROTOCOL
FOR DELAY TOLERANT NETWORKS
(DTNs)
Nandha kumar.R1
,Dr.P.Varalakshmi2
and V.S.Harikannan3
1
Department of Computer Technology, Anna University, Chennai, India
Nandhakumarr03@gmail.com
2
Department of Information Technology, Anna university, Chennai, India
varanip@gmail.com
3
Department of Computer Technology, Anna University, Chennai, India
harikannan.mit15@gmail.com
ABSTRACT
Delay-Tolerant Networks are those which lacks continuous communications among mobile
nodes . Distributed clustering scheme and cluster-based routing protocol are used for Delay-
Tolerant Mobile Networks (DTMNs). The basic idea is to distributive group mobile nodes with
similar mobility pattern into a cluster, which can then interchangeably share their resources for
overhead reduction and load balancing, aiming to achieve efficient and scalable routing in
DTMN. Load balancing is carried out in two ways, Intra cluster load balancing and Inter
cluster load balancing. The Convergence and stability become major challenges in
distributed clustering in DTMN. An efficient routing protocol will be provided for the delay
tolerant networks through which the stability of the network is maintained .Based on nodal
contact probabilities, a set of functions including Sync(), Leave(), and Join() are devised for
cluster formation and gateway selection. Finally, the gateway nodes exchange network
information and perform routing.
KEYWORDS
Clustering, delay-tolerant networks, replication, load balancing.
1. INTRODUCTION
A mobile ad-hoc network (MANET) is a self-configuring infra structure less network of mobile
devices connected by wireless links. Each device in a MANET is free to move independently in
any direction, and will therefore change its links to other devices frequently. Each must forward
traffic unrelated to its own use, and therefore be a router. The primary challenge in building a
MANET is equipping each device to continuously maintain the information required to properly
route traffic. Such networks may operate by themselves or may be connected to the
larger Internet.
1.1 DELAY TOLERANT NETWORKS
Delay Tolerant Network (DTN) is fundamentally an opportunistic communication system, where
communication links only exists temporarily, rendering it impossible to establish end-to-end
connections for data delivery. End to end communication between source to destination can be
achieve by disjoint the nodes into different group. Connectivity delay, asymmetric data and high
data rates are overcome by delay tolerant networks. DTN operate above all other existing protocol
574 Computer Science & Information Technology ( CS & IT )
stack and provide gateway function between nodes when data transmitted between different
networks or different group inside the networks. When groups are formed depend on their contact
probability of the nodes. Each of these networking environments has their own specialized
protocol stack and gateway are responsible for storing message, when reliable delivery is
required.
The basic idea for distributed clustering scheme to reduce overhead due to buffer space through
load balancing. Grouping mobile nodes with similar mobility pattern increases nodal contact
probability among mobile nodes within the group, which can interchange their resource. Due to
the lack of continuous communications and possible errors in the estimation of the nodal contact
probability, convergence and stability become major challenges in such cluster formation. Finally
the gateway node exchange network information and performing routing[10].
1.2 CLUSTER FORMATION
Cluster head selection in DTNs is done based on the nodal probabilities of the nodes. The node
with highest nodal contact probability (threshold probability) is taken as the cluster head. Data
from one cluster to another will be transmitted through the gateway nodes. Gateway nodes in
DTNs are selected based on the nodal contact probability of nodes I one cluster with the nodes in
the other cluster. A node in the same cluster transmits data from one node to another with their
transmission range of all the nodes within the cluster. Nodes in the different cluster transmits
data to another cluster depend upon the probability of nodal connectivity; direct transmission is
also employed data from one node to another. Every gateway node constructs a cluster
connectivity packet and distributes it to other gateway in the networks. The cluster connectivity of
the gateway comprises its cluster ID and a list of cluster to which it serve as gateway along with
corresponding contact probability. Once the routing table is obtained, the routing is performed
from a cluster to another cluster through single hop Inter cluster routing and Intra cluster routing.
1.3 LOAD BALANCING
Load balancing is an effective enhancement to the proposed routing protocol. The basic idea is to
share traffic load among cluster members in order to reduce the dropping probability due to queue
overflow at some nodes. Sharing traffic inside a cluster is reasonable, because nodes in the same
cluster have similar mobility pattern, and thus similar ability to deliver data messages. Whenever
the queue length of a node exceeds a threshold, denoted by Λ, it starts to perform load balancing.
More specifically, it randomly transmits as many messages as possible to any node it meets, until
their queues are equally long or the latter’s queue becomes longer than Λ. Load Balancing in a
cluster and among the clusters are done in either ways of Intra cluster load balancing ,Inter cluster
load balancing.
2. LITERATURE SURVEY
Clusters are formed based on their nodal contact probabilities the probability of nodes meeting
each other. Based on their nodal contact probability the threshold probability will be calculated ,
using which the clusters are formed and the gateways nodes are selected to route data from one
cluster to another[1][2].
In [9] capacity and delay trade off mechanism, the capacity of the cell partitioned networks and
analysis the delay of the capacity achieving relay algorithm. The packet are transmitted and
routed according to the timeslot assign to each node without violating the physical constrains of
the partitioned cell. The capacity region depends only on the steady-state user location
distributaries. Hence, any markovian model of the user mobility which in steady state distribute
users independently and the network yields uniformly over the same expression for mobile nodes.
Computer Science & Information Technology ( CS & IT ) 575
A cluster-based self-organizing strategy is proposed for building a backbone among the mobile
devices, detecting segmentation, and recovery [3][4]. In this approach, each mobile device is
controlled by a multi-role agent, which performs these tasks efficiently based only on local
interactions; role management allows the backbone reconfiguration when the nodes leave or
arrive to the network yielding a complex global emergent behaviour.[5] Energy saving is
achieved by adapting the time interval and power of transmission after the network formation.
The inconsistency problem exist both in member and gateway nodes. When two nodes in the
same cluster may have two different gateways to another cluster in figure 1. A node may lose its
gateway to an adjacent cluster because the gateway node has left. These inconsistency problem
employing by synchronization mechanism where nodes exchange and keep only the most up to
data information. The replication mechanism that routing protocols adopt to ensure delivery of
the original packet to the sink is to transmit multiple copies of the same packet over different
paths in order to recover from some path failures
Wireless networks are without a doubt one of the central issues in current research topics due to
the harsh environmental conditions in which such networks can be deployed and their unique
network characteristics, specifically limited power supply, processing and communication
capabilities[6]. [7] Presented with many challenges and design issues that affect the data routing,
a need for a fault tolerant routing protocol becomes essential. An algorithm to form the various
paths from sender to destination will be provide [8][9].
3. PROPOSED WORK
Scalability is one of the main problem in DTN networks, over population of cluster lead to the
instability .So, fault tolerance techniques are used to solve scalability problem .Data in nodes are
transmitted through gateway nodes and errors in gateway nodes are solved using fault tolerance
techniques . Data loss during transmission due to weak signal strength and intermittent
transmission capabilities in figure 2. In delay tolerant network data lost will be much higher when
bandwidth limits among the node is much low. so we have chosen some techniques to apply in
this routing protocol to prevent the data loss in routing .Load balancing is an effective
enhancement to the proposed routing protocol. The basic idea is to share traffic load among
cluster members in order to reduce the dropping probability due to queue overflow at some nodes.
Specifically, a nodes performs load balancing when its queue exceed their threshold limit, by
randomly transmitting as many packets as possible to any node which meet their queue limit and
with their contact probability region. Sharing traffic inside a cluster is reasonable, because nodes
in the same cluster have similar mobility pattern, and thus similar ability to deliver data messages.
An efficient routing protocol will be provided for the delay tolerant networks through which the
stability of the network is maintained.
Figure 1: Topology diagram
576 Computer Science & Information Technology ( CS & IT )
ALGORITHM:
i. Head and Gateway selection
If(Neigh!0)
(leaders==0) then
ROLE=leader
Else (there exist atleast one leader )
If(ROLE=leader) then
Solveconflict();
Else (my role is not leader )
If(leaders ==1)
ROLE=member
Verify_ consistency();
Else (there exists more than one leader)
ROLE=gateway;
ENDIF
ENDIF
ENDIF
ELSE
ROLE = any node _member
ENDIF
ii. Intra Cluster Load Balancing
MAKE_WEIGHT_LIST()
SORT(WEIGHT_ LIST)
FOR ( All nodes Contacting with Cluster head )
IF ( CONTACT PROBABILITY OF CLUSTER < THRESHHOLD
PROBABILITY OF CLUSTER )
THEN
DELETE those nodes from WEIGHT_LIST
FIND_AVERAGE_WEIGHTED_PROBABILY
FOR ( all nodes in Weighted List )
IF( AVERAGE_WEIGHTED_PROBABILITY > CONTACT
PROBABILITY OF NODE )
THEN
DELETE those nodes from WEIGHT_LIST
REPLICATE()
Transfer all the Data messages to Node Available in WEIGHT_LIST
iii. Inter Cluster Load Balancing
IF( TRAFFIC is not reduced after applying INTRA_LOAD_BALANCING)
THEN
START_INTER_CLUSTER_LOAD_BALANCING()
CHOOSE_ADJUCENT_CLUSTER()
IF ( AVERAGE_WEIGHTED PROBABILITY OF Present cluster <
AVERAGE_WEIGHTED PROBABILITY NODE in Adjacent Cluster
&& NUMBER OF NODE IN Adjacent Cluster > NUMBER OF NODE
in Present Cluster )
THEN
Transfers data to those cluster and
Apply INTRA_CLUSTER_LOAD_BALANCING() in Adjacent Cluster
Computer Science & Information Technology ( CS & IT ) 577
Figure 2: Data Transmission
4. PERFORMANCE ANALYSIS
In the existing project data dropping probability average values will be always more than 50
percentages. But when we are applying the algorithms that have been discussed above data
dropping probability value will be reduced to below 50 percentages in figure 3. so that we can
minimize the data dropping value with using this cluster based routing environment. Every node
has the maximum queue size, which varies from 20 to 100 during the simulation. Our nodal
contact based on similar mobility pattern among mobile nodes increases overall delivery ratio.
The delivery ratio due to load balancing, when the data or message in the queue almost full. It
transmit data to other members inside the group, resulting in low drop rate at each single node.
Figure 3 : Data dropping values at various stages
578 Computer Science & Information Technology ( CS & IT )
5. CONCLUSION
An efficient routing protocol has been provided for the delay tolerant networks through which the
stability of the network is maintained. Another important consideration taken into account is load
balancing which is implemented using grouping of mobile nodes with similar mobility pattern
techniques either retransmission or replication data to their neighbour nodes. Nodal contact
probability ratio or threshold is maintained in each group head to achieve better stability and
increase scalability among mobile nodes.
REFERENCES
[1] Ha Dang and Hongyi Wu ”Clustering and Cluster-Based Routing Protocol for Delay-Tolerant
Mobile Networks,” IEEE Transactions on Wireless Communication , vol. 9, no. 6, pp. 174–185 ,June
2010.
[2] Devices J. Guadalupe Olascuaga-Cabrera, Ernesto López-Mellado, Andres Mendez-Vazquez, and
Félix Francisco Ramos-Corchado, ”A Self-Organization Algorithm for Robust Networking of
Wireless”, IEEE Journals, vol 11,no 3 pp 102-117,March 2011.
[3] Ning Li and Jennifer C. Hou ”Localized Fault-Tolerant Topology Control in Wireless Ad Hoc
Networks,” IEEE Transactions on Distributed Systems ,vol 17,no 4 pp 601-611 April ,2010.
[4] Hind Alwan and Anjali Agarwal ”A Survey on Fault Tolerant Routing Techniques in Wireless
networks,” Third International Conference on Sensor Technologies and Applications, vol 12,no 5,pp
201-217,March ,2009.
[5] Che-Aron, Z, Al-Khateeb, W. F. M and Anwar.F “An Enhancement of Fault-Tolerant Routing
Protocol for Wireless Network,” Malaysia, Kuala Lumpur, Malaysia, International Conference on
Computer and Communication Engineering ,vol 15,no.7,pp 607-612 ,May 2010.
[6] Y. Wang and H. Wu, “DFT-MSN The Fault tolerant mobile sensor network for pervasive information
gathering,” in Proc. 26th Annual Joint Conference of the IEEE Computer and Communications
Societies, IEEE,vol 4,no.7 pp 401-409,February 2010.
[7] K. Fall, “Dynamic Cluster Header Selection and Conditional Re-clustering for Wireless Sensor
Networks” in Proc.ACM SIGCOMM, vol .9,no.4,pp. 27–34, 2010.
[8] S. Burleigh, A. Hooke, L. Torgerson, K. Fall, V. Cerf, B. Durst,K. Scott, and H. Weiss, “Clustering
and fault tolerance for target tracking using wireless sensor networks,” IEEE Communication. Mag.,
vol. 41, no. 6, pp. 128–136, 2010.
[9] Michael J.Neely and Eytan Modiano, “Capacity and Delay Tradeoffs for Ad Hoc Mobile Networks,”
in IEEE Transactions on Information Theory, Vol. 51, No. 6,pp. 1917-1937, June 2005.
[10] Ha Dang and Hongi Wu,”Clustering Based Data Transmission protocol in Delay Tolerant Mobile
Networks,” IEEE conference, vol. 01, pp.529-530, 2008.
[11] T. Small and Z. J. Haas, “An Intrusion Detection Architecture for Clustered Wireless Ad Hoc
Networks,” in Proc. MobiHOC, IEEE,vol.12,no.9,pp. 233– 244, 2010.
[12] M.Grossglauser and D.N.C Tse,”Mobility increases the capacity of ad-hoc wireless networks,” in
Proc. IEEE INFOCOM, Anchorage, AK, PP. 1360-1369., April 2001.
[13] Y.Wang, H. Wu, F. Lin and N.F.Tzeng,”Protocol Design and Optimization for Delay/Fault-Tolerant
Mobile Sensor Networks, ” in Proc. Of ICDCS, PP.7, 2007.

More Related Content

What's hot (18)

[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat
[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat
[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat
IJET - International Journal of Engineering and Techniques
 
A New Paradigm for Load Balancing in WMNs
A New Paradigm for Load Balancing in WMNsA New Paradigm for Load Balancing in WMNs
A New Paradigm for Load Balancing in WMNs
CSCJournals
 
Fa25939942
Fa25939942Fa25939942
Fa25939942
IJERA Editor
 
E42062126
E42062126E42062126
E42062126
IJERA Editor
 
E0942531
E0942531E0942531
E0942531
IOSR Journals
 
B0781013215
B0781013215B0781013215
B0781013215
Prafull Maktedar
 
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
ijasuc
 
F0963440
F0963440F0963440
F0963440
IOSR Journals
 
Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...
Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...
Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...
CSCJournals
 
Delay Tolerant Network
Delay Tolerant NetworkDelay Tolerant Network
Delay Tolerant Network
Michel Chamat
 
WLAN IP and Frame
WLAN IP and FrameWLAN IP and Frame
WLAN IP and Frame
Michel Chamat
 
An efficient hybrid peer to-peersystemfordistributeddatasharing
An efficient hybrid peer to-peersystemfordistributeddatasharingAn efficient hybrid peer to-peersystemfordistributeddatasharing
An efficient hybrid peer to-peersystemfordistributeddatasharing
ambitlick
 
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
IJCNCJournal
 
Advanced delay reduction algorithm based on GPS with Load Balancing
Advanced delay reduction algorithm based on GPS with Load BalancingAdvanced delay reduction algorithm based on GPS with Load Balancing
Advanced delay reduction algorithm based on GPS with Load Balancing
ijdpsjournal
 
Effective Path Identification Protocol for Wireless Mesh Networks
Effective Path Identification Protocol for Wireless Mesh NetworksEffective Path Identification Protocol for Wireless Mesh Networks
Effective Path Identification Protocol for Wireless Mesh Networks
IDES Editor
 
Eb35725731
Eb35725731Eb35725731
Eb35725731
IJERA Editor
 
A study on cross layer metrics of wireless mesh network
A study on cross layer metrics of wireless mesh networkA study on cross layer metrics of wireless mesh network
A study on cross layer metrics of wireless mesh network
eSAT Publishing House
 
Replica Placement In Unstable Radio Links
Replica Placement In Unstable Radio LinksReplica Placement In Unstable Radio Links
Replica Placement In Unstable Radio Links
CSCJournals
 
A New Paradigm for Load Balancing in WMNs
A New Paradigm for Load Balancing in WMNsA New Paradigm for Load Balancing in WMNs
A New Paradigm for Load Balancing in WMNs
CSCJournals
 
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
ijasuc
 
Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...
Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...
Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...
CSCJournals
 
Delay Tolerant Network
Delay Tolerant NetworkDelay Tolerant Network
Delay Tolerant Network
Michel Chamat
 
An efficient hybrid peer to-peersystemfordistributeddatasharing
An efficient hybrid peer to-peersystemfordistributeddatasharingAn efficient hybrid peer to-peersystemfordistributeddatasharing
An efficient hybrid peer to-peersystemfordistributeddatasharing
ambitlick
 
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
IJCNCJournal
 
Advanced delay reduction algorithm based on GPS with Load Balancing
Advanced delay reduction algorithm based on GPS with Load BalancingAdvanced delay reduction algorithm based on GPS with Load Balancing
Advanced delay reduction algorithm based on GPS with Load Balancing
ijdpsjournal
 
Effective Path Identification Protocol for Wireless Mesh Networks
Effective Path Identification Protocol for Wireless Mesh NetworksEffective Path Identification Protocol for Wireless Mesh Networks
Effective Path Identification Protocol for Wireless Mesh Networks
IDES Editor
 
A study on cross layer metrics of wireless mesh network
A study on cross layer metrics of wireless mesh networkA study on cross layer metrics of wireless mesh network
A study on cross layer metrics of wireless mesh network
eSAT Publishing House
 
Replica Placement In Unstable Radio Links
Replica Placement In Unstable Radio LinksReplica Placement In Unstable Radio Links
Replica Placement In Unstable Radio Links
CSCJournals
 

Similar to AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs) (20)

V.KARTHIKEYAN PUBLISHED ARTICLE A
V.KARTHIKEYAN PUBLISHED ARTICLE AV.KARTHIKEYAN PUBLISHED ARTICLE A
V.KARTHIKEYAN PUBLISHED ARTICLE A
KARTHIKEYAN V
 
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc NetworksBroadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
IJCNCJournal
 
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKSBROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
IJCNCJournal
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETs
paperpublications3
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
eSAT Journals
 
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
inventionjournals
 
A comparative study in wireless sensor networks
A comparative study in wireless sensor networksA comparative study in wireless sensor networks
A comparative study in wireless sensor networks
ijwmn
 
Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...
Roopali Singh
 
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor NetworkA QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
ijassn
 
Adapting Mac 802.11 For Performance Optmization Of Manet Using Cross Layer In...
Adapting Mac 802.11 For Performance Optmization Of Manet Using Cross Layer In...Adapting Mac 802.11 For Performance Optmization Of Manet Using Cross Layer In...
Adapting Mac 802.11 For Performance Optmization Of Manet Using Cross Layer In...
ijwmn
 
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
pijans
 
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
pijans
 
Ha3512291233
Ha3512291233Ha3512291233
Ha3512291233
IJERA Editor
 
Clustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performancesClustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performances
ijcsit
 
Optimization Algorithm to Control Interference-based Topology Control for De...
 Optimization Algorithm to Control Interference-based Topology Control for De... Optimization Algorithm to Control Interference-based Topology Control for De...
Optimization Algorithm to Control Interference-based Topology Control for De...
IJCSIS Research Publications
 
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNDistributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
paperpublications3
 
ROUTING STRATEGIES IN DTN
ROUTING STRATEGIES IN DTNROUTING STRATEGIES IN DTN
ROUTING STRATEGIES IN DTN
Prasanna Shanmugasundaram
 
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ijac journal
 
Review on Clustering and Data Aggregation in Wireless Sensor Network
Review on Clustering and Data Aggregation in Wireless Sensor NetworkReview on Clustering and Data Aggregation in Wireless Sensor Network
Review on Clustering and Data Aggregation in Wireless Sensor Network
Editor IJCATR
 
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
IJECEIAES
 
V.KARTHIKEYAN PUBLISHED ARTICLE A
V.KARTHIKEYAN PUBLISHED ARTICLE AV.KARTHIKEYAN PUBLISHED ARTICLE A
V.KARTHIKEYAN PUBLISHED ARTICLE A
KARTHIKEYAN V
 
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc NetworksBroadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
IJCNCJournal
 
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKSBROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
IJCNCJournal
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETs
paperpublications3
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
eSAT Journals
 
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
inventionjournals
 
A comparative study in wireless sensor networks
A comparative study in wireless sensor networksA comparative study in wireless sensor networks
A comparative study in wireless sensor networks
ijwmn
 
Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...
Roopali Singh
 
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor NetworkA QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
ijassn
 
Adapting Mac 802.11 For Performance Optmization Of Manet Using Cross Layer In...
Adapting Mac 802.11 For Performance Optmization Of Manet Using Cross Layer In...Adapting Mac 802.11 For Performance Optmization Of Manet Using Cross Layer In...
Adapting Mac 802.11 For Performance Optmization Of Manet Using Cross Layer In...
ijwmn
 
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
pijans
 
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
pijans
 
Clustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performancesClustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performances
ijcsit
 
Optimization Algorithm to Control Interference-based Topology Control for De...
 Optimization Algorithm to Control Interference-based Topology Control for De... Optimization Algorithm to Control Interference-based Topology Control for De...
Optimization Algorithm to Control Interference-based Topology Control for De...
IJCSIS Research Publications
 
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNDistributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
paperpublications3
 
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ijac journal
 
Review on Clustering and Data Aggregation in Wireless Sensor Network
Review on Clustering and Data Aggregation in Wireless Sensor NetworkReview on Clustering and Data Aggregation in Wireless Sensor Network
Review on Clustering and Data Aggregation in Wireless Sensor Network
Editor IJCATR
 
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
IJECEIAES
 

More from cscpconf (20)

ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
cscpconf
 
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
cscpconf
 
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
cscpconf
 
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIESPROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
cscpconf
 
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICA SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
cscpconf
 
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
cscpconf
 
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
cscpconf
 
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICTWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
cscpconf
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
cscpconf
 
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
cscpconf
 
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMIMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
cscpconf
 
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
cscpconf
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEW
cscpconf
 
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKCLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
cscpconf
 
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
cscpconf
 
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAPROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
cscpconf
 
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHCHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
cscpconf
 
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
cscpconf
 
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGESOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
cscpconf
 
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTGENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
cscpconf
 
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
cscpconf
 
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
cscpconf
 
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
cscpconf
 
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIESPROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
cscpconf
 
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICA SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
cscpconf
 
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
cscpconf
 
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
cscpconf
 
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICTWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
cscpconf
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
cscpconf
 
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
cscpconf
 
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMIMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
cscpconf
 
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
cscpconf
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEW
cscpconf
 
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKCLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
cscpconf
 
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
cscpconf
 
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAPROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
cscpconf
 
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHCHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
cscpconf
 
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
cscpconf
 
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGESOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
cscpconf
 
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTGENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
cscpconf
 

Recently uploaded (20)

MCQS (EMERGENCY NURSING) DR. NASIR MUSTAFA
MCQS (EMERGENCY NURSING) DR. NASIR MUSTAFAMCQS (EMERGENCY NURSING) DR. NASIR MUSTAFA
MCQS (EMERGENCY NURSING) DR. NASIR MUSTAFA
Dr. Nasir Mustafa
 
U3 ANTITUBERCULAR DRUGS Pharmacology 3.pptx
U3 ANTITUBERCULAR DRUGS Pharmacology 3.pptxU3 ANTITUBERCULAR DRUGS Pharmacology 3.pptx
U3 ANTITUBERCULAR DRUGS Pharmacology 3.pptx
Mayuri Chavan
 
Module 1: Foundations of Research
Module 1: Foundations of ResearchModule 1: Foundations of Research
Module 1: Foundations of Research
drroxannekemp
 
Unit 5 ACUTE, SUBACUTE,CHRONIC TOXICITY.pptx
Unit 5 ACUTE, SUBACUTE,CHRONIC TOXICITY.pptxUnit 5 ACUTE, SUBACUTE,CHRONIC TOXICITY.pptx
Unit 5 ACUTE, SUBACUTE,CHRONIC TOXICITY.pptx
Mayuri Chavan
 
Peer Assesment- Libby.docx..............
Peer Assesment- Libby.docx..............Peer Assesment- Libby.docx..............
Peer Assesment- Libby.docx..............
19lburrell
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...
BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...
BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...
Nguyen Thanh Tu Collection
 
How to Manage Amounts in Local Currency in Odoo 18 Purchase
How to Manage Amounts in Local Currency in Odoo 18 PurchaseHow to Manage Amounts in Local Currency in Odoo 18 Purchase
How to Manage Amounts in Local Currency in Odoo 18 Purchase
Celine George
 
How to Configure Extra Steps During Checkout in Odoo 18 Website
How to Configure Extra Steps During Checkout in Odoo 18 WebsiteHow to Configure Extra Steps During Checkout in Odoo 18 Website
How to Configure Extra Steps During Checkout in Odoo 18 Website
Celine George
 
COPA Apprentice exam Questions and answers PDF
COPA Apprentice exam Questions and answers PDFCOPA Apprentice exam Questions and answers PDF
COPA Apprentice exam Questions and answers PDF
SONU HEETSON
 
E-Filing_of_Income_Tax.pptx and concept of form 26AS
E-Filing_of_Income_Tax.pptx and concept of form 26ASE-Filing_of_Income_Tax.pptx and concept of form 26AS
E-Filing_of_Income_Tax.pptx and concept of form 26AS
Abinash Palangdar
 
Final Evaluation.docx...........................
Final Evaluation.docx...........................Final Evaluation.docx...........................
Final Evaluation.docx...........................
l1bbyburrell
 
INSULIN.pptx by Arka Das (Bsc. Critical care technology)
INSULIN.pptx by Arka Das (Bsc. Critical care technology)INSULIN.pptx by Arka Das (Bsc. Critical care technology)
INSULIN.pptx by Arka Das (Bsc. Critical care technology)
ArkaDas54
 
ANTI-VIRAL DRUGS unit 3 Pharmacology 3.pptx
ANTI-VIRAL DRUGS unit 3 Pharmacology 3.pptxANTI-VIRAL DRUGS unit 3 Pharmacology 3.pptx
ANTI-VIRAL DRUGS unit 3 Pharmacology 3.pptx
Mayuri Chavan
 
Origin of Brahmi script: A breaking down of various theories
Origin of Brahmi script: A breaking down of various theoriesOrigin of Brahmi script: A breaking down of various theories
Origin of Brahmi script: A breaking down of various theories
PrachiSontakke5
 
MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)
MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)
MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)
Dr. Nasir Mustafa
 
How to Add Button in Chatter in Odoo 18 - Odoo Slides
How to Add Button in Chatter in Odoo 18 - Odoo SlidesHow to Add Button in Chatter in Odoo 18 - Odoo Slides
How to Add Button in Chatter in Odoo 18 - Odoo Slides
Celine George
 
Chemotherapy of Malignancy -Anticancer.pptx
Chemotherapy of Malignancy -Anticancer.pptxChemotherapy of Malignancy -Anticancer.pptx
Chemotherapy of Malignancy -Anticancer.pptx
Mayuri Chavan
 
MEDICAL BIOLOGY MCQS BY. DR NASIR MUSTAFA
MEDICAL BIOLOGY MCQS  BY. DR NASIR MUSTAFAMEDICAL BIOLOGY MCQS  BY. DR NASIR MUSTAFA
MEDICAL BIOLOGY MCQS BY. DR NASIR MUSTAFA
Dr. Nasir Mustafa
 
YSPH VMOC Special Report - Measles Outbreak Southwest US 5-14-2025 .pptx
YSPH VMOC Special Report - Measles Outbreak  Southwest US 5-14-2025  .pptxYSPH VMOC Special Report - Measles Outbreak  Southwest US 5-14-2025  .pptx
YSPH VMOC Special Report - Measles Outbreak Southwest US 5-14-2025 .pptx
Yale School of Public Health - The Virtual Medical Operations Center (VMOC)
 
MICROBIAL GENETICS -tranformation and tranduction.pdf
MICROBIAL GENETICS -tranformation and tranduction.pdfMICROBIAL GENETICS -tranformation and tranduction.pdf
MICROBIAL GENETICS -tranformation and tranduction.pdf
DHARMENDRA SAHU
 
MCQS (EMERGENCY NURSING) DR. NASIR MUSTAFA
MCQS (EMERGENCY NURSING) DR. NASIR MUSTAFAMCQS (EMERGENCY NURSING) DR. NASIR MUSTAFA
MCQS (EMERGENCY NURSING) DR. NASIR MUSTAFA
Dr. Nasir Mustafa
 
U3 ANTITUBERCULAR DRUGS Pharmacology 3.pptx
U3 ANTITUBERCULAR DRUGS Pharmacology 3.pptxU3 ANTITUBERCULAR DRUGS Pharmacology 3.pptx
U3 ANTITUBERCULAR DRUGS Pharmacology 3.pptx
Mayuri Chavan
 
Module 1: Foundations of Research
Module 1: Foundations of ResearchModule 1: Foundations of Research
Module 1: Foundations of Research
drroxannekemp
 
Unit 5 ACUTE, SUBACUTE,CHRONIC TOXICITY.pptx
Unit 5 ACUTE, SUBACUTE,CHRONIC TOXICITY.pptxUnit 5 ACUTE, SUBACUTE,CHRONIC TOXICITY.pptx
Unit 5 ACUTE, SUBACUTE,CHRONIC TOXICITY.pptx
Mayuri Chavan
 
Peer Assesment- Libby.docx..............
Peer Assesment- Libby.docx..............Peer Assesment- Libby.docx..............
Peer Assesment- Libby.docx..............
19lburrell
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...
BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...
BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...
Nguyen Thanh Tu Collection
 
How to Manage Amounts in Local Currency in Odoo 18 Purchase
How to Manage Amounts in Local Currency in Odoo 18 PurchaseHow to Manage Amounts in Local Currency in Odoo 18 Purchase
How to Manage Amounts in Local Currency in Odoo 18 Purchase
Celine George
 
How to Configure Extra Steps During Checkout in Odoo 18 Website
How to Configure Extra Steps During Checkout in Odoo 18 WebsiteHow to Configure Extra Steps During Checkout in Odoo 18 Website
How to Configure Extra Steps During Checkout in Odoo 18 Website
Celine George
 
COPA Apprentice exam Questions and answers PDF
COPA Apprentice exam Questions and answers PDFCOPA Apprentice exam Questions and answers PDF
COPA Apprentice exam Questions and answers PDF
SONU HEETSON
 
E-Filing_of_Income_Tax.pptx and concept of form 26AS
E-Filing_of_Income_Tax.pptx and concept of form 26ASE-Filing_of_Income_Tax.pptx and concept of form 26AS
E-Filing_of_Income_Tax.pptx and concept of form 26AS
Abinash Palangdar
 
Final Evaluation.docx...........................
Final Evaluation.docx...........................Final Evaluation.docx...........................
Final Evaluation.docx...........................
l1bbyburrell
 
INSULIN.pptx by Arka Das (Bsc. Critical care technology)
INSULIN.pptx by Arka Das (Bsc. Critical care technology)INSULIN.pptx by Arka Das (Bsc. Critical care technology)
INSULIN.pptx by Arka Das (Bsc. Critical care technology)
ArkaDas54
 
ANTI-VIRAL DRUGS unit 3 Pharmacology 3.pptx
ANTI-VIRAL DRUGS unit 3 Pharmacology 3.pptxANTI-VIRAL DRUGS unit 3 Pharmacology 3.pptx
ANTI-VIRAL DRUGS unit 3 Pharmacology 3.pptx
Mayuri Chavan
 
Origin of Brahmi script: A breaking down of various theories
Origin of Brahmi script: A breaking down of various theoriesOrigin of Brahmi script: A breaking down of various theories
Origin of Brahmi script: A breaking down of various theories
PrachiSontakke5
 
MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)
MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)
MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)
Dr. Nasir Mustafa
 
How to Add Button in Chatter in Odoo 18 - Odoo Slides
How to Add Button in Chatter in Odoo 18 - Odoo SlidesHow to Add Button in Chatter in Odoo 18 - Odoo Slides
How to Add Button in Chatter in Odoo 18 - Odoo Slides
Celine George
 
Chemotherapy of Malignancy -Anticancer.pptx
Chemotherapy of Malignancy -Anticancer.pptxChemotherapy of Malignancy -Anticancer.pptx
Chemotherapy of Malignancy -Anticancer.pptx
Mayuri Chavan
 
MEDICAL BIOLOGY MCQS BY. DR NASIR MUSTAFA
MEDICAL BIOLOGY MCQS  BY. DR NASIR MUSTAFAMEDICAL BIOLOGY MCQS  BY. DR NASIR MUSTAFA
MEDICAL BIOLOGY MCQS BY. DR NASIR MUSTAFA
Dr. Nasir Mustafa
 
MICROBIAL GENETICS -tranformation and tranduction.pdf
MICROBIAL GENETICS -tranformation and tranduction.pdfMICROBIAL GENETICS -tranformation and tranduction.pdf
MICROBIAL GENETICS -tranformation and tranduction.pdf
DHARMENDRA SAHU
 

AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)

  • 1. Natarajan Meghanathan, et al. (Eds): SIPM, FCST, ITCA, WSE, ACSIT, CS & IT 06, pp. 573–578, 2012. © CS & IT-CSCP 2012 DOI : 10.5121/csit.2012.2356 AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs) Nandha kumar.R1 ,Dr.P.Varalakshmi2 and V.S.Harikannan3 1 Department of Computer Technology, Anna University, Chennai, India Nandhakumarr03@gmail.com 2 Department of Information Technology, Anna university, Chennai, India varanip@gmail.com 3 Department of Computer Technology, Anna University, Chennai, India harikannan.mit15@gmail.com ABSTRACT Delay-Tolerant Networks are those which lacks continuous communications among mobile nodes . Distributed clustering scheme and cluster-based routing protocol are used for Delay- Tolerant Mobile Networks (DTMNs). The basic idea is to distributive group mobile nodes with similar mobility pattern into a cluster, which can then interchangeably share their resources for overhead reduction and load balancing, aiming to achieve efficient and scalable routing in DTMN. Load balancing is carried out in two ways, Intra cluster load balancing and Inter cluster load balancing. The Convergence and stability become major challenges in distributed clustering in DTMN. An efficient routing protocol will be provided for the delay tolerant networks through which the stability of the network is maintained .Based on nodal contact probabilities, a set of functions including Sync(), Leave(), and Join() are devised for cluster formation and gateway selection. Finally, the gateway nodes exchange network information and perform routing. KEYWORDS Clustering, delay-tolerant networks, replication, load balancing. 1. INTRODUCTION A mobile ad-hoc network (MANET) is a self-configuring infra structure less network of mobile devices connected by wireless links. Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently. Each must forward traffic unrelated to its own use, and therefore be a router. The primary challenge in building a MANET is equipping each device to continuously maintain the information required to properly route traffic. Such networks may operate by themselves or may be connected to the larger Internet. 1.1 DELAY TOLERANT NETWORKS Delay Tolerant Network (DTN) is fundamentally an opportunistic communication system, where communication links only exists temporarily, rendering it impossible to establish end-to-end connections for data delivery. End to end communication between source to destination can be achieve by disjoint the nodes into different group. Connectivity delay, asymmetric data and high data rates are overcome by delay tolerant networks. DTN operate above all other existing protocol
  • 2. 574 Computer Science & Information Technology ( CS & IT ) stack and provide gateway function between nodes when data transmitted between different networks or different group inside the networks. When groups are formed depend on their contact probability of the nodes. Each of these networking environments has their own specialized protocol stack and gateway are responsible for storing message, when reliable delivery is required. The basic idea for distributed clustering scheme to reduce overhead due to buffer space through load balancing. Grouping mobile nodes with similar mobility pattern increases nodal contact probability among mobile nodes within the group, which can interchange their resource. Due to the lack of continuous communications and possible errors in the estimation of the nodal contact probability, convergence and stability become major challenges in such cluster formation. Finally the gateway node exchange network information and performing routing[10]. 1.2 CLUSTER FORMATION Cluster head selection in DTNs is done based on the nodal probabilities of the nodes. The node with highest nodal contact probability (threshold probability) is taken as the cluster head. Data from one cluster to another will be transmitted through the gateway nodes. Gateway nodes in DTNs are selected based on the nodal contact probability of nodes I one cluster with the nodes in the other cluster. A node in the same cluster transmits data from one node to another with their transmission range of all the nodes within the cluster. Nodes in the different cluster transmits data to another cluster depend upon the probability of nodal connectivity; direct transmission is also employed data from one node to another. Every gateway node constructs a cluster connectivity packet and distributes it to other gateway in the networks. The cluster connectivity of the gateway comprises its cluster ID and a list of cluster to which it serve as gateway along with corresponding contact probability. Once the routing table is obtained, the routing is performed from a cluster to another cluster through single hop Inter cluster routing and Intra cluster routing. 1.3 LOAD BALANCING Load balancing is an effective enhancement to the proposed routing protocol. The basic idea is to share traffic load among cluster members in order to reduce the dropping probability due to queue overflow at some nodes. Sharing traffic inside a cluster is reasonable, because nodes in the same cluster have similar mobility pattern, and thus similar ability to deliver data messages. Whenever the queue length of a node exceeds a threshold, denoted by Λ, it starts to perform load balancing. More specifically, it randomly transmits as many messages as possible to any node it meets, until their queues are equally long or the latter’s queue becomes longer than Λ. Load Balancing in a cluster and among the clusters are done in either ways of Intra cluster load balancing ,Inter cluster load balancing. 2. LITERATURE SURVEY Clusters are formed based on their nodal contact probabilities the probability of nodes meeting each other. Based on their nodal contact probability the threshold probability will be calculated , using which the clusters are formed and the gateways nodes are selected to route data from one cluster to another[1][2]. In [9] capacity and delay trade off mechanism, the capacity of the cell partitioned networks and analysis the delay of the capacity achieving relay algorithm. The packet are transmitted and routed according to the timeslot assign to each node without violating the physical constrains of the partitioned cell. The capacity region depends only on the steady-state user location distributaries. Hence, any markovian model of the user mobility which in steady state distribute users independently and the network yields uniformly over the same expression for mobile nodes.
  • 3. Computer Science & Information Technology ( CS & IT ) 575 A cluster-based self-organizing strategy is proposed for building a backbone among the mobile devices, detecting segmentation, and recovery [3][4]. In this approach, each mobile device is controlled by a multi-role agent, which performs these tasks efficiently based only on local interactions; role management allows the backbone reconfiguration when the nodes leave or arrive to the network yielding a complex global emergent behaviour.[5] Energy saving is achieved by adapting the time interval and power of transmission after the network formation. The inconsistency problem exist both in member and gateway nodes. When two nodes in the same cluster may have two different gateways to another cluster in figure 1. A node may lose its gateway to an adjacent cluster because the gateway node has left. These inconsistency problem employing by synchronization mechanism where nodes exchange and keep only the most up to data information. The replication mechanism that routing protocols adopt to ensure delivery of the original packet to the sink is to transmit multiple copies of the same packet over different paths in order to recover from some path failures Wireless networks are without a doubt one of the central issues in current research topics due to the harsh environmental conditions in which such networks can be deployed and their unique network characteristics, specifically limited power supply, processing and communication capabilities[6]. [7] Presented with many challenges and design issues that affect the data routing, a need for a fault tolerant routing protocol becomes essential. An algorithm to form the various paths from sender to destination will be provide [8][9]. 3. PROPOSED WORK Scalability is one of the main problem in DTN networks, over population of cluster lead to the instability .So, fault tolerance techniques are used to solve scalability problem .Data in nodes are transmitted through gateway nodes and errors in gateway nodes are solved using fault tolerance techniques . Data loss during transmission due to weak signal strength and intermittent transmission capabilities in figure 2. In delay tolerant network data lost will be much higher when bandwidth limits among the node is much low. so we have chosen some techniques to apply in this routing protocol to prevent the data loss in routing .Load balancing is an effective enhancement to the proposed routing protocol. The basic idea is to share traffic load among cluster members in order to reduce the dropping probability due to queue overflow at some nodes. Specifically, a nodes performs load balancing when its queue exceed their threshold limit, by randomly transmitting as many packets as possible to any node which meet their queue limit and with their contact probability region. Sharing traffic inside a cluster is reasonable, because nodes in the same cluster have similar mobility pattern, and thus similar ability to deliver data messages. An efficient routing protocol will be provided for the delay tolerant networks through which the stability of the network is maintained. Figure 1: Topology diagram
  • 4. 576 Computer Science & Information Technology ( CS & IT ) ALGORITHM: i. Head and Gateway selection If(Neigh!0) (leaders==0) then ROLE=leader Else (there exist atleast one leader ) If(ROLE=leader) then Solveconflict(); Else (my role is not leader ) If(leaders ==1) ROLE=member Verify_ consistency(); Else (there exists more than one leader) ROLE=gateway; ENDIF ENDIF ENDIF ELSE ROLE = any node _member ENDIF ii. Intra Cluster Load Balancing MAKE_WEIGHT_LIST() SORT(WEIGHT_ LIST) FOR ( All nodes Contacting with Cluster head ) IF ( CONTACT PROBABILITY OF CLUSTER < THRESHHOLD PROBABILITY OF CLUSTER ) THEN DELETE those nodes from WEIGHT_LIST FIND_AVERAGE_WEIGHTED_PROBABILY FOR ( all nodes in Weighted List ) IF( AVERAGE_WEIGHTED_PROBABILITY > CONTACT PROBABILITY OF NODE ) THEN DELETE those nodes from WEIGHT_LIST REPLICATE() Transfer all the Data messages to Node Available in WEIGHT_LIST iii. Inter Cluster Load Balancing IF( TRAFFIC is not reduced after applying INTRA_LOAD_BALANCING) THEN START_INTER_CLUSTER_LOAD_BALANCING() CHOOSE_ADJUCENT_CLUSTER() IF ( AVERAGE_WEIGHTED PROBABILITY OF Present cluster < AVERAGE_WEIGHTED PROBABILITY NODE in Adjacent Cluster && NUMBER OF NODE IN Adjacent Cluster > NUMBER OF NODE in Present Cluster ) THEN Transfers data to those cluster and Apply INTRA_CLUSTER_LOAD_BALANCING() in Adjacent Cluster
  • 5. Computer Science & Information Technology ( CS & IT ) 577 Figure 2: Data Transmission 4. PERFORMANCE ANALYSIS In the existing project data dropping probability average values will be always more than 50 percentages. But when we are applying the algorithms that have been discussed above data dropping probability value will be reduced to below 50 percentages in figure 3. so that we can minimize the data dropping value with using this cluster based routing environment. Every node has the maximum queue size, which varies from 20 to 100 during the simulation. Our nodal contact based on similar mobility pattern among mobile nodes increases overall delivery ratio. The delivery ratio due to load balancing, when the data or message in the queue almost full. It transmit data to other members inside the group, resulting in low drop rate at each single node. Figure 3 : Data dropping values at various stages
  • 6. 578 Computer Science & Information Technology ( CS & IT ) 5. CONCLUSION An efficient routing protocol has been provided for the delay tolerant networks through which the stability of the network is maintained. Another important consideration taken into account is load balancing which is implemented using grouping of mobile nodes with similar mobility pattern techniques either retransmission or replication data to their neighbour nodes. Nodal contact probability ratio or threshold is maintained in each group head to achieve better stability and increase scalability among mobile nodes. REFERENCES [1] Ha Dang and Hongyi Wu ”Clustering and Cluster-Based Routing Protocol for Delay-Tolerant Mobile Networks,” IEEE Transactions on Wireless Communication , vol. 9, no. 6, pp. 174–185 ,June 2010. [2] Devices J. Guadalupe Olascuaga-Cabrera, Ernesto López-Mellado, Andres Mendez-Vazquez, and Félix Francisco Ramos-Corchado, ”A Self-Organization Algorithm for Robust Networking of Wireless”, IEEE Journals, vol 11,no 3 pp 102-117,March 2011. [3] Ning Li and Jennifer C. Hou ”Localized Fault-Tolerant Topology Control in Wireless Ad Hoc Networks,” IEEE Transactions on Distributed Systems ,vol 17,no 4 pp 601-611 April ,2010. [4] Hind Alwan and Anjali Agarwal ”A Survey on Fault Tolerant Routing Techniques in Wireless networks,” Third International Conference on Sensor Technologies and Applications, vol 12,no 5,pp 201-217,March ,2009. [5] Che-Aron, Z, Al-Khateeb, W. F. M and Anwar.F “An Enhancement of Fault-Tolerant Routing Protocol for Wireless Network,” Malaysia, Kuala Lumpur, Malaysia, International Conference on Computer and Communication Engineering ,vol 15,no.7,pp 607-612 ,May 2010. [6] Y. Wang and H. Wu, “DFT-MSN The Fault tolerant mobile sensor network for pervasive information gathering,” in Proc. 26th Annual Joint Conference of the IEEE Computer and Communications Societies, IEEE,vol 4,no.7 pp 401-409,February 2010. [7] K. Fall, “Dynamic Cluster Header Selection and Conditional Re-clustering for Wireless Sensor Networks” in Proc.ACM SIGCOMM, vol .9,no.4,pp. 27–34, 2010. [8] S. Burleigh, A. Hooke, L. Torgerson, K. Fall, V. Cerf, B. Durst,K. Scott, and H. Weiss, “Clustering and fault tolerance for target tracking using wireless sensor networks,” IEEE Communication. Mag., vol. 41, no. 6, pp. 128–136, 2010. [9] Michael J.Neely and Eytan Modiano, “Capacity and Delay Tradeoffs for Ad Hoc Mobile Networks,” in IEEE Transactions on Information Theory, Vol. 51, No. 6,pp. 1917-1937, June 2005. [10] Ha Dang and Hongi Wu,”Clustering Based Data Transmission protocol in Delay Tolerant Mobile Networks,” IEEE conference, vol. 01, pp.529-530, 2008. [11] T. Small and Z. J. Haas, “An Intrusion Detection Architecture for Clustered Wireless Ad Hoc Networks,” in Proc. MobiHOC, IEEE,vol.12,no.9,pp. 233– 244, 2010. [12] M.Grossglauser and D.N.C Tse,”Mobility increases the capacity of ad-hoc wireless networks,” in Proc. IEEE INFOCOM, Anchorage, AK, PP. 1360-1369., April 2001. [13] Y.Wang, H. Wu, F. Lin and N.F.Tzeng,”Protocol Design and Optimization for Delay/Fault-Tolerant Mobile Sensor Networks, ” in Proc. Of ICDCS, PP.7, 2007.
  翻译: