There were many contradictory evaluation criteria to select next-hop in the delay-disruption tolerance networks(DTN).To solve this problem,an attribute hierarchical model was proposed,in which the predefined criteria ...There were many contradictory evaluation criteria to select next-hop in the delay-disruption tolerance networks(DTN).To solve this problem,an attribute hierarchical model was proposed,in which the predefined criteria were summarized as static identity attributes,forwarding desire attributes and delivery capability attributes(IDC).Based on this model,a novel multi-attributes congestion aware routing(MACAR) scheme with uncertain information for next-hop selection was presented,by adopting an decision theory to aggregate attributes with belief structure and computing partial ordering relations.The simulation results show that MACAR presents higher successful delivery rate,lower average delay and effectively alleviate congestion.展开更多
In a post-disaster environment characterized by frequent interruptions in communication links,traditional wireless communication networks are ineffective.Although the“store-carry-forward”mechanism characteristic of ...In a post-disaster environment characterized by frequent interruptions in communication links,traditional wireless communication networks are ineffective.Although the“store-carry-forward”mechanism characteristic of Delay Tolerant Networks(DTNs)can transmit data from Internet of things devices to more reliable base stations or data centres,it also suffers from inefficient data transmission and excessive transmission delays.To address these challenges,we propose an intelligent routing strategy based on node sociability for post-disaster emergency network scenarios.First,we introduce an intelligent routing strategy based on node intimacy,which selects more suitable relay nodes and assigns the corresponding number of message copies based on comprehensive utility values.Second,we present an intelligent routing strategy based on geographical location of nodes to forward message replicas secondarily based on transmission utility values.Finally,experiments demonstrate the effectiveness of our proposed algorithm in terms of message delivery rate,network cost ratio and average transmission delay.展开更多
How to establish a self‐equilibrium configuration is vital for further kinematics and dynamics analyses of tensegrity mechanism.In this study,for investigating tensegrity form‐finding problems,a concise and efficien...How to establish a self‐equilibrium configuration is vital for further kinematics and dynamics analyses of tensegrity mechanism.In this study,for investigating tensegrity form‐finding problems,a concise and efficient dynamic relaxation‐noise tolerant zeroing neural network(DR‐NTZNN)form‐finding algorithm is established through analysing the physical properties of tensegrity structures.In addition,the non‐linear constrained opti-misation problem which transformed from the form‐finding problem is solved by a sequential quadratic programming algorithm.Moreover,the noise may produce in the form‐finding process that includes the round‐off errors which are brought by the approximate matrix and restart point calculating course,disturbance caused by external force and manufacturing error when constructing a tensegrity structure.Hence,for the purpose of suppressing the noise,a noise tolerant zeroing neural network is presented to solve the search direction,which can endow the anti‐noise capability to the form‐finding model and enhance the calculation capability.Besides,the dynamic relaxation method is contributed to seek the nodal coordinates rapidly when the search direction is acquired.The numerical results show the form‐finding model has a huge capability for high‐dimensional free form cable‐strut mechanisms with complicated topology.Eventually,comparing with other existing form‐finding methods,the contrast simulations reveal the excellent anti‐noise performance and calculation capacity of DR‐NTZNN form‐finding algorithm.展开更多
Delay Tolerant Network (DTN) is a class of networks that experience frequent and long-duration partitions due to sparse distribution of nodes. It has a broad prospect to new network applications for a better seal...Delay Tolerant Network (DTN) is a class of networks that experience frequent and long-duration partitions due to sparse distribution of nodes. It has a broad prospect to new network applications for a better sealability, fault-tolerant, and high performance. In DTNs, path failure occurs frequently, so message transfer is not reliable. Sometimes it is required to change routing even in a very short period, resulting in transmission delay and reception delay. However, some well-known assumptions of traditional networks are no longer true in DTNs. In this paper, we study the problem of path failures in DTNs. The path failure process in DTNs is described when the path appears completely normal, completely failed and partially failed. Traditional approaches based on using precisely known network dynamics have not accounted for message losses. A new fault tolerant scheme to generate redundancy is to use erasure coding and full replication. This can greatly decrease the path failure rate. At last, a traffic DTN model is analyzed. Results reveal the superiority of our scheme in comparison to other present schemes.展开更多
As the use of mobile devices continues to rise,trust administration will significantly improve security in routing the guaranteed quality of service(QoS)supply in Mobile Ad Hoc Networks(MANET)due to the mobility of th...As the use of mobile devices continues to rise,trust administration will significantly improve security in routing the guaranteed quality of service(QoS)supply in Mobile Ad Hoc Networks(MANET)due to the mobility of the nodes.There is no continuance of network communication between nodes in a delay-tolerant network(DTN).DTN is designed to complete recurring connections between nodes.This approach proposes a dynamic source routing protocol(DSR)based on a feed-forward neural network(FFNN)and energybased random repetition trust calculation in DTN.If another node is looking for a node that swerved off of its path in this situation,routing will fail since it won’t recognize it.However,in the suggested strategy,nodes do not stray from their pathways for routing.It is only likely that the message will reach the destination node if the nodes encounter their destination or an appropriate transitional node on their default mobility route,based on their pattern of mobility.The EBRRTC-DTN algorithm(Energy based random repeat trust computation)is based on the time that has passed since nodes last encountered the destination node.Compared to other existing techniques,simulation results show that this process makes the best decision and expertly determines the best and most appropriate route to send messages to the destination node,which improves routing performance,increases the number of delivered messages,and decreases delivery delay.Therefore,the suggested method is better at providing better QoS(Quality of Service)and increasing network lifetime,tolerating network system latency.展开更多
In 2012, Hsu et al. generalized the classical connectivity of graph G and introduced the concept of g-component connectivity CK<sub>g</sub> (G) to measure the fault tolerance of networks. In this pape...In 2012, Hsu et al. generalized the classical connectivity of graph G and introduced the concept of g-component connectivity CK<sub>g</sub> (G) to measure the fault tolerance of networks. In this paper, we determine the g-component connectivity of some graphs, such as fan graph, helm graph, crown graph, Gear graph and the Mycielskian graph of star graph and complete bipartite graph.展开更多
Adaptive clustering hierarchy routing(ACHR) establishes a clusters-based hierarchical hybrid routing algorithm with two-hop local visibility for delay tolerant network(DTN).The major contribution of ACHR is the combin...Adaptive clustering hierarchy routing(ACHR) establishes a clusters-based hierarchical hybrid routing algorithm with two-hop local visibility for delay tolerant network(DTN).The major contribution of ACHR is the combination of single copy scheme and multi-copy scheme and the combination of hop-by-hop and multi-hop mechanism ACHR,which has the advantages in simplicity,availability and well-expansibility.The result shows that it can take advantage of the random communication opportunities and local network connectivity,and achieves 1.6 times delivery ratio and 60% overhead compared with its counterpart.展开更多
Currently cellular networks do not have sufficient capacity to accommodate the exponential growth of mobile data requirements.Data can be delivered between mobile terminals through peer-to-peer WiFi communications(e.g...Currently cellular networks do not have sufficient capacity to accommodate the exponential growth of mobile data requirements.Data can be delivered between mobile terminals through peer-to-peer WiFi communications(e.g.WiFi direct),but contacts between mobile terminals are frequently disrupted because of the user mobility.In this paper,we propose a Subscribe-and-Send architecture and an opportunistic forwarding protocol for it called HPRO.Under Subscribe-and-Send,a user subscribes contents on the Content Service Provider(CSP) but does not download the subscribed contents.Some users who have these contents deliver them to the subscribers through WiFi opportunistic peer-to-peer communications.Numerical simulations provide a robust evaluation of the forwarding performance and the traffic offloading performance of Subscribe-and-Send and HPRO.展开更多
Pocket Switched Networks(PSN)represent a particular remittent network for direct communication between the handheld mobile devices.Compared to traditional networks,there is no stable topology structure for PSN where t...Pocket Switched Networks(PSN)represent a particular remittent network for direct communication between the handheld mobile devices.Compared to traditional networks,there is no stable topology structure for PSN where the nodes observe the mobility model of human society.It is a kind of Delay Tolerant Networks(DTNs)that gives a description to circulate information among the network nodes by the way of taking the benefit of transferring nodes from one area to another.Considering its inception,there are several schemes for message routing in the infrastructure-less environment in which human mobility is only the best manner to exchange information.For routing messages,PSN uses different techniques such asDistributed Expectation-Based Spatio-Temporal(DEBT)Epidemic(DEBTE),DEBT Cluster(DEBTC),and DEBT Tree(DEBTT).Understanding on how the network environment is affected for these routing strategies are the main motivation of this research.In this paper,we have investigated the impact of network nodes,the message copies per transmission,and the overall carrying out of these routing protocols.ONE simulator was used to analyze those techniques on the basis of delivery,overhead,and latency.The result of this task demonstrates that for a particular simulation setting,DEBTE is the best PSN routing technique among all,against DEBTC and DEBTT.展开更多
Delay-Tolerant Networks (DTNs) are wireless networks that often experience temporary, even long-duration partitioning. Current DTN researches mainly focus on pure delay-tolerant networks that are extreme environments ...Delay-Tolerant Networks (DTNs) are wireless networks that often experience temporary, even long-duration partitioning. Current DTN researches mainly focus on pure delay-tolerant networks that are extreme environments within a limited application scope. It motivates the identification of a more reasonable and valuable DTN architecture, which can be applied in a wider range of environments to achieve interoperability between some networks suffering from frequent network partitioning, and other networks provided with stable and high speed Internet access. Such hybrid delay-tolerant networks have a lot of applications in real world. A novel and practical Cache-Assign-Forward (CAF) architecture is proposed as an appropriate approach to tie together such hybrid networks to achieve an efficient and flexible data communication. Based on CAF, we enhance the existing DTN routing protocols and apply them to complex hybrid delay-tolerant networks. Simulations show that CAF can improve DTN routing performance significantly in hybrid DTN environments.展开更多
This paper presents a new graph-based single-copy routmg method m delay tolerant networks (DTN). With time goes on in the networks, a DTN connectivity graph is constituted with mobility of nodes and communication, a...This paper presents a new graph-based single-copy routmg method m delay tolerant networks (DTN). With time goes on in the networks, a DTN connectivity graph is constituted with mobility of nodes and communication, and a corresponding greedy tree is obtained using a greedy algorithm in DTN connectivity graph. While there are some bad nodes such as disabled nodes or selfish nodes in delay tolerant networks, the nodes can choose the next p^oper intermediate node to transmit the mes- sage by comparing the location of neighboring nodes in the greedy tree. The single-copy routing method is very appropriate for energy-constrained, storage-constrained and bandwidth-constrained applications such as mobile wireless DTN networks. We show that delivery ratio is increased significantly by using the graph-based single-copy routing when bad nodes exist.展开更多
In Delay Tolerant Networks (DTNs), the offiine users can, through the encountering nodes, use the specific peer-to-peer message routing approach to deliver messages to the destination. Thus, it solves the problem th...In Delay Tolerant Networks (DTNs), the offiine users can, through the encountering nodes, use the specific peer-to-peer message routing approach to deliver messages to the destination. Thus, it solves the problem that users have the demands to deliver messages while they are temporarily not able to connect to the Internet. Therefore, by the characteristics of DTNs, people who are not online can still query some location based information, with the help of users using the same service in the nearby area. In this paper, we proposed a location-based content search approach. Based on the concept of three-tier area and hybrid node types, we presented four strategies to solve the query problem, namely, Data Replication, Query Replication, Data Reply, and Data Synchronization strategies. Especially we proposed a Message Queue Selection algorithm for message transferring. The priority concept is set associated with every message such that the most "important" one could be sent first. In this way, it can increase the query success ratio and reduce the query delay time. Finally, we evaluated our approach, and compared with other routing schemes. The simulation results showed that our proposed approach had better query efficiency and shorter delay.展开更多
Delay Tolerant Networks(DTNs)have the major problem of message delay in the network due to a lack of endto-end connectivity between the nodes,especially when the nodes are mobile.The nodes in DTNs have limited buffer ...Delay Tolerant Networks(DTNs)have the major problem of message delay in the network due to a lack of endto-end connectivity between the nodes,especially when the nodes are mobile.The nodes in DTNs have limited buffer storage for storing delayed messages.This instantaneous sharing of data creates a low buffer/shortage problem.Consequently,buffer congestion would occur and there would be no more space available in the buffer for the upcoming messages.To address this problem a buffer management policy is proposed named“A Novel and Proficient Buffer Management Technique(NPBMT)for the Internet of Vehicle-Based DTNs”.NPBMT combines appropriate-size messages with the lowest Time-to-Live(TTL)and then drops a combination of the appropriate messages to accommodate the newly arrived messages.To evaluate the performance of the proposed technique comparison is done with Drop Oldest(DOL),Size Aware Drop(SAD),and Drop Larges(DLA).The proposed technique is implemented in the Opportunistic Network Environment(ONE)simulator.The shortest path mapbased movement model has been used as the movement path model for the nodes with the epidemic routing protocol.From the simulation results,a significant change has been observed in the delivery probability as the proposed policy delivered 380 messages,DOL delivered 186 messages,SAD delivered 190 messages,and DLA delivered only 95 messages.A significant decrease has been observed in the overhead ratio,as the SAD overhead ratio is 324.37,DLA overhead ratio is 266.74,and DOL and NPBMT overhead ratios are 141.89 and 52.85,respectively,which reveals a significant reduction of overhead ratio in NPBMT as compared to existing policies.The network latency average of DOL is 7785.5,DLA is 5898.42,and SAD is 5789.43 whereas the NPBMT latency average is 3909.4.This reveals that the proposed policy keeps the messages for a short time in the network,which reduces the overhead ratio.展开更多
In Wireless Sensor Network(WSN),because battery and energy supply are constraints,sleep scheduling is always needed to save energy while maintaining connectivity for packet delivery.Traditional schemes have to ensure ...In Wireless Sensor Network(WSN),because battery and energy supply are constraints,sleep scheduling is always needed to save energy while maintaining connectivity for packet delivery.Traditional schemes have to ensure high duty cycling to ensure enough percentage of active nodes and then derogate the energy efficiency.This paper proposes an RFID based non-preemptive random sleep scheduling scheme with stable low duty cycle.It employs delay tolerant network routing protocol to tackle the frequent disconnections.A low-power RFID based non-preemptive wakeup signal is used to confirm the availability of next-hop before sending packet.It eliminates energy consumption of repeated retransmission of the delayed packets.Moreover,the received wakeup signal is postponed to take effect until the sleep period is finished,and the waken node then responds to the sending node to start the packet delivery.The scheme can keep stable duty cycle and then ensure energy saving effect compared with other sleeping scheduling methods.展开更多
The inherent selfishness of each node for the enhancement of message successful delivery ratio and the network overall performance improvement are reflected in the contradiction relationship of competition and coopera...The inherent selfishness of each node for the enhancement of message successful delivery ratio and the network overall performance improvement are reflected in the contradiction relationship of competition and cooperation in delay/disruption tolerant networks (DTN). In particular, the existence of malicious node aggravates this contradiction. To resolve this contradiction, social relationship theory and group theory of social psychology were adopted to do an in-depth analysis. The concrete balancing approach which leveraged Nash equilibrium theory of game theory was proposed to resolve this contradiction in reality. Thus, a new congestion control routing algorithm for security defense based on social psychology and game theory (CRSG) was put forward. Through the experiment, this algorithm proves that it can enhance the message successful delivery ratio by more than 15% and reduce the congestion ratio over 15% as well. This algorithm balances the contradiction relationship between the two key performance targets and made all nodes exhibit strong cooperation relationship in DTN.展开更多
The network coverage is a big problem in ocean communication, and there is no low-cost solution in the short term. Based on the knowledge of Mobile Delay Tolerant Network(MDTN), the mobility of vessels can create the ...The network coverage is a big problem in ocean communication, and there is no low-cost solution in the short term. Based on the knowledge of Mobile Delay Tolerant Network(MDTN), the mobility of vessels can create the chances of end-to-end communication. The mobility pattern of vessel is one of the key metrics on ocean MDTN network. Because of the high cost, few experiments have focused on research of vessel mobility pattern for the moment. In this paper, we study the traces of more than 4000 fishing and freight vessels. Firstly, to solve the data noise and sparsity problem, we design two algorithms to filter the noise and complement the missing data based on the vessel's turning feature. Secondly, after studying the traces of vessels, we observe that the vessel's traces are confined by invisible boundary. Thirdly, through defining the distance between traces, we design MR-Similarity algorithm to find the mobility pattern of vessels. Finally, we realize our algorithm on cluster and evaluate the performance and accuracy. Our results can provide the guidelines on design of data routing protocols on ocean MDTN.展开更多
Energy harvesting(EH)technology in wireless communication is a promising approach to extend the lifetime of future wireless networks.A cross-layer optimal adaptation policy for a point-to-point energy harvesting(EH)wi...Energy harvesting(EH)technology in wireless communication is a promising approach to extend the lifetime of future wireless networks.A cross-layer optimal adaptation policy for a point-to-point energy harvesting(EH)wireless communication system with finite buffer constraints over a Rayleigh fading channel based on a Semi-Markov Decision Process(SMDP)is investigated.Most adaptation strategies in the literature are based on channeldependent adaptation.However,besides considering the channel,the state of the energy capacitor and the data buffer are also involved when proposing a dynamic modulation policy for EH wireless networks.Unlike the channeldependent policy,which is a physical layer-based optimization,the proposed cross-layer dynamic modulation policy is a guarantee to meet the overflow requirements of the upper layer by maximizing the throughput while optimizing the transmission power and minimizing the dropping packets.Based on the states of the channel conditions,data buffer,and energy capacitor,the scheduler selects a particular action corresponding to the selected modulation constellation.Moreover,the packets are modulated into symbols according to the selected modulation type to be ready for transmission over the Rayleigh fading channel.Simulations are used to test the performance of the proposed cross-layer policy scheme,which shows that it significantly outperforms the physical layer channel-dependent policy scheme in terms of throughput only.展开更多
Wireless and mobile networks seem to deliver tremendous uses. In its way, MANET leads to enormous real world applications. Routing allows us to implement many real world applications. Complete affinity in an infrequen...Wireless and mobile networks seem to deliver tremendous uses. In its way, MANET leads to enormous real world applications. Routing allows us to implement many real world applications. Complete affinity in an infrequent network like ICMANET is highly impossible. Disconnected MANET is also known as ICMANET which is also a DTN (Delay Torrent Network) that supports for higher delays. It is laborious process to execute routing in a diffused network process to execute routing in a diffused network. To deliver the data packets towards the destined node to its best, a new strategy in routing called Ant routing protocol in concoction with storage strategy LoDis has been proposed. Despite of routing, security is still an unsolved problem. To evaluate this situation, this paper presents a methodology called agent technology which yields a secure routing. Hostile node in the network is spotted with the help of agent at each node. A cryptographic algorithm Advanced Encryption Standard (AES) is habituated to improve secure communication in wide range Mobility and total number of nodes in the network act as variables in examining the hostile nodes in the network to judge the standard of security. Improved performance along with the security is the point to be highlighted.展开更多
Opportunistic networks are derived from delay tolerant networks, where mobile nodes have no end-to-end connections. Nodes are represented by people, which means that opportunistic networks can be regarded as social ne...Opportunistic networks are derived from delay tolerant networks, where mobile nodes have no end-to-end connections. Nodes are represented by people, which means that opportunistic networks can be regarded as social networks. Human mobility plays an important role in affecting the performance of forwarding protocols in social networks, furthermore, the trajectory of people's movements are driven by social characteristics. However, current routing protocols rely on simple mobility models, and rarely consider social characteristics. Considering two heterogeneous network models, an social opportunistic networks routing(SONR) was proposed which brings an adapted discrete Markov chain into nodes' mobility model and calculates the transition probability between successive status. Comparison was made between Spray, Wait and Epidemic protocol. Simulation show that SONR can improve performance on delivery ratio, delivery latency and network overhead, meanwhile. SONR approaches the performance of Epidemic routing.展开更多
Vehicular Delay Tolerant Networks (DTN) use moving vehicles to sample and relay sensory data for urban areas, making it a promising low-cost solution for the urban sensing and infotainment applications. However, rou...Vehicular Delay Tolerant Networks (DTN) use moving vehicles to sample and relay sensory data for urban areas, making it a promising low-cost solution for the urban sensing and infotainment applications. However, routing in the DTN in real vehicle fleet is a great challenge due to uneven and fluctuant node density caused by vehicle mobility patterns. Moreover, the high vehicle density in urban areas makes the wireless channel capacity an impactful factor to network performance. In this paper, we propose a local capacity constrained density adaptive routing algorithm for large scale vehicular DTN in urban areas which targets to increase the packet delivery ratio within deadline, namely Density Adaptive routing With Node deadline awareness (DAWN). DAWN enables the mobile nodes awareness of their neighbor density, to which the nodes' transmission manners are adapted so as to better utilize the limited capacity and increase the data delivery probability within delay constraint based only on local information. Through simulations on Manhattan Grid Mobility Model and the real GPS traces of 4960 taxi cabs for 30 days in the Beijing city, DAWN is demonstrated to outperform other classical DTN routing schemes in performance of delivery ratio and coverage within delay constraint. These simulations suggest that DAWN is practically useful for the vehicular DTN in urban areas.展开更多
基金Project(60973127) supported by the National Natural Science Foundation of ChinaProject(09JJ3123) supported by the Natural Science Foundation of Hunan Province,China
文摘There were many contradictory evaluation criteria to select next-hop in the delay-disruption tolerance networks(DTN).To solve this problem,an attribute hierarchical model was proposed,in which the predefined criteria were summarized as static identity attributes,forwarding desire attributes and delivery capability attributes(IDC).Based on this model,a novel multi-attributes congestion aware routing(MACAR) scheme with uncertain information for next-hop selection was presented,by adopting an decision theory to aggregate attributes with belief structure and computing partial ordering relations.The simulation results show that MACAR presents higher successful delivery rate,lower average delay and effectively alleviate congestion.
基金funded by the Researchers Supporting Project Number RSPD2024R681,King Saud University,Riyadh,Saudi Arabia.
文摘In a post-disaster environment characterized by frequent interruptions in communication links,traditional wireless communication networks are ineffective.Although the“store-carry-forward”mechanism characteristic of Delay Tolerant Networks(DTNs)can transmit data from Internet of things devices to more reliable base stations or data centres,it also suffers from inefficient data transmission and excessive transmission delays.To address these challenges,we propose an intelligent routing strategy based on node sociability for post-disaster emergency network scenarios.First,we introduce an intelligent routing strategy based on node intimacy,which selects more suitable relay nodes and assigns the corresponding number of message copies based on comprehensive utility values.Second,we present an intelligent routing strategy based on geographical location of nodes to forward message replicas secondarily based on transmission utility values.Finally,experiments demonstrate the effectiveness of our proposed algorithm in terms of message delivery rate,network cost ratio and average transmission delay.
基金supported in part by the National Natural Science Foundation of China under grants 61873304,62173048,62106023in part by the China Postdoctoral Science Foundation Funded Project under grants 2018M641784 and 2019T120240+1 种基金also in part by the Key Science and Technology Projects of Jilin Province,China,under grant 20210201106GXalso in part by the Changchun Science and Technology Project under grant 21ZY41.
文摘How to establish a self‐equilibrium configuration is vital for further kinematics and dynamics analyses of tensegrity mechanism.In this study,for investigating tensegrity form‐finding problems,a concise and efficient dynamic relaxation‐noise tolerant zeroing neural network(DR‐NTZNN)form‐finding algorithm is established through analysing the physical properties of tensegrity structures.In addition,the non‐linear constrained opti-misation problem which transformed from the form‐finding problem is solved by a sequential quadratic programming algorithm.Moreover,the noise may produce in the form‐finding process that includes the round‐off errors which are brought by the approximate matrix and restart point calculating course,disturbance caused by external force and manufacturing error when constructing a tensegrity structure.Hence,for the purpose of suppressing the noise,a noise tolerant zeroing neural network is presented to solve the search direction,which can endow the anti‐noise capability to the form‐finding model and enhance the calculation capability.Besides,the dynamic relaxation method is contributed to seek the nodal coordinates rapidly when the search direction is acquired.The numerical results show the form‐finding model has a huge capability for high‐dimensional free form cable‐strut mechanisms with complicated topology.Eventually,comparing with other existing form‐finding methods,the contrast simulations reveal the excellent anti‐noise performance and calculation capacity of DR‐NTZNN form‐finding algorithm.
基金National Nature Science Foundation of China (No.60534020)Cultivation Fund of the Key Scientific and Technical Innovation Project from Ministry of Education of China(No.706024)+1 种基金International Science Cooperation Foundation of Shanghai,China(No.061307041)Shanghai Talent Developing Foundation,China(No.010)
文摘Delay Tolerant Network (DTN) is a class of networks that experience frequent and long-duration partitions due to sparse distribution of nodes. It has a broad prospect to new network applications for a better sealability, fault-tolerant, and high performance. In DTNs, path failure occurs frequently, so message transfer is not reliable. Sometimes it is required to change routing even in a very short period, resulting in transmission delay and reception delay. However, some well-known assumptions of traditional networks are no longer true in DTNs. In this paper, we study the problem of path failures in DTNs. The path failure process in DTNs is described when the path appears completely normal, completely failed and partially failed. Traditional approaches based on using precisely known network dynamics have not accounted for message losses. A new fault tolerant scheme to generate redundancy is to use erasure coding and full replication. This can greatly decrease the path failure rate. At last, a traffic DTN model is analyzed. Results reveal the superiority of our scheme in comparison to other present schemes.
文摘As the use of mobile devices continues to rise,trust administration will significantly improve security in routing the guaranteed quality of service(QoS)supply in Mobile Ad Hoc Networks(MANET)due to the mobility of the nodes.There is no continuance of network communication between nodes in a delay-tolerant network(DTN).DTN is designed to complete recurring connections between nodes.This approach proposes a dynamic source routing protocol(DSR)based on a feed-forward neural network(FFNN)and energybased random repetition trust calculation in DTN.If another node is looking for a node that swerved off of its path in this situation,routing will fail since it won’t recognize it.However,in the suggested strategy,nodes do not stray from their pathways for routing.It is only likely that the message will reach the destination node if the nodes encounter their destination or an appropriate transitional node on their default mobility route,based on their pattern of mobility.The EBRRTC-DTN algorithm(Energy based random repeat trust computation)is based on the time that has passed since nodes last encountered the destination node.Compared to other existing techniques,simulation results show that this process makes the best decision and expertly determines the best and most appropriate route to send messages to the destination node,which improves routing performance,increases the number of delivered messages,and decreases delivery delay.Therefore,the suggested method is better at providing better QoS(Quality of Service)and increasing network lifetime,tolerating network system latency.
文摘In 2012, Hsu et al. generalized the classical connectivity of graph G and introduced the concept of g-component connectivity CK<sub>g</sub> (G) to measure the fault tolerance of networks. In this paper, we determine the g-component connectivity of some graphs, such as fan graph, helm graph, crown graph, Gear graph and the Mycielskian graph of star graph and complete bipartite graph.
基金Project(531107040202) supported by the Fundamental Research Funds for the Central Universities of China
文摘Adaptive clustering hierarchy routing(ACHR) establishes a clusters-based hierarchical hybrid routing algorithm with two-hop local visibility for delay tolerant network(DTN).The major contribution of ACHR is the combination of single copy scheme and multi-copy scheme and the combination of hop-by-hop and multi-hop mechanism ACHR,which has the advantages in simplicity,availability and well-expansibility.The result shows that it can take advantage of the random communication opportunities and local network connectivity,and achieves 1.6 times delivery ratio and 60% overhead compared with its counterpart.
基金supported by the National Natural Science Foundation of China under Grants No. 61100208,No. 61100205the Natural Science Foundation of Jiangsu Province under Grant No. BK2011169+1 种基金the Foundation of Beijing University of Posts and Telecommunications under Grant No. 2013RC0309supported by the EU FP7 Project REC-OGNITION:Relevance and Cognition for SelfAwareness in a Content-Centric Internet
文摘Currently cellular networks do not have sufficient capacity to accommodate the exponential growth of mobile data requirements.Data can be delivered between mobile terminals through peer-to-peer WiFi communications(e.g.WiFi direct),but contacts between mobile terminals are frequently disrupted because of the user mobility.In this paper,we propose a Subscribe-and-Send architecture and an opportunistic forwarding protocol for it called HPRO.Under Subscribe-and-Send,a user subscribes contents on the Content Service Provider(CSP) but does not download the subscribed contents.Some users who have these contents deliver them to the subscribers through WiFi opportunistic peer-to-peer communications.Numerical simulations provide a robust evaluation of the forwarding performance and the traffic offloading performance of Subscribe-and-Send and HPRO.
基金UPNM Grant J0117-UPNM/2016/GPJP/5/ICT/2.The authors fully acknowledged Ministry of Higher Education(MOHE)and National Defence University of Malaysia for the approved fund which makes this important research viable and effective.The authors also would like to thank University Grant Commission of Bangladesh,Comilla University for the financial support.
文摘Pocket Switched Networks(PSN)represent a particular remittent network for direct communication between the handheld mobile devices.Compared to traditional networks,there is no stable topology structure for PSN where the nodes observe the mobility model of human society.It is a kind of Delay Tolerant Networks(DTNs)that gives a description to circulate information among the network nodes by the way of taking the benefit of transferring nodes from one area to another.Considering its inception,there are several schemes for message routing in the infrastructure-less environment in which human mobility is only the best manner to exchange information.For routing messages,PSN uses different techniques such asDistributed Expectation-Based Spatio-Temporal(DEBT)Epidemic(DEBTE),DEBT Cluster(DEBTC),and DEBT Tree(DEBTT).Understanding on how the network environment is affected for these routing strategies are the main motivation of this research.In this paper,we have investigated the impact of network nodes,the message copies per transmission,and the overall carrying out of these routing protocols.ONE simulator was used to analyze those techniques on the basis of delivery,overhead,and latency.The result of this task demonstrates that for a particular simulation setting,DEBTE is the best PSN routing technique among all,against DEBTC and DEBTT.
基金The authors would like to thank Prof. Xu Zhiwei and the re- viewers for their detailed reviews and constructive comments, which have helped improve the quality of this paper. This work was supported by the National Key Basic Research Program of China under Grant No. 2011CB302702 the Na- tional Natural Science Foundation of China under Grants No. 61132001, No. 61120106008, No. 61070187, No. 60970133, No. 61003225 the Beijing Nova Program.
文摘Delay-Tolerant Networks (DTNs) are wireless networks that often experience temporary, even long-duration partitioning. Current DTN researches mainly focus on pure delay-tolerant networks that are extreme environments within a limited application scope. It motivates the identification of a more reasonable and valuable DTN architecture, which can be applied in a wider range of environments to achieve interoperability between some networks suffering from frequent network partitioning, and other networks provided with stable and high speed Internet access. Such hybrid delay-tolerant networks have a lot of applications in real world. A novel and practical Cache-Assign-Forward (CAF) architecture is proposed as an appropriate approach to tie together such hybrid networks to achieve an efficient and flexible data communication. Based on CAF, we enhance the existing DTN routing protocols and apply them to complex hybrid delay-tolerant networks. Simulations show that CAF can improve DTN routing performance significantly in hybrid DTN environments.
基金Supported by the National High Technology Research and Development Programme of China (No. 2007AA01Z429, 2007AA01Z405 ) and the National Natural Science Foundation of China (No. 60633020, 60702059, 60872041 ).
文摘This paper presents a new graph-based single-copy routmg method m delay tolerant networks (DTN). With time goes on in the networks, a DTN connectivity graph is constituted with mobility of nodes and communication, and a corresponding greedy tree is obtained using a greedy algorithm in DTN connectivity graph. While there are some bad nodes such as disabled nodes or selfish nodes in delay tolerant networks, the nodes can choose the next p^oper intermediate node to transmit the mes- sage by comparing the location of neighboring nodes in the greedy tree. The single-copy routing method is very appropriate for energy-constrained, storage-constrained and bandwidth-constrained applications such as mobile wireless DTN networks. We show that delivery ratio is increased significantly by using the graph-based single-copy routing when bad nodes exist.
文摘In Delay Tolerant Networks (DTNs), the offiine users can, through the encountering nodes, use the specific peer-to-peer message routing approach to deliver messages to the destination. Thus, it solves the problem that users have the demands to deliver messages while they are temporarily not able to connect to the Internet. Therefore, by the characteristics of DTNs, people who are not online can still query some location based information, with the help of users using the same service in the nearby area. In this paper, we proposed a location-based content search approach. Based on the concept of three-tier area and hybrid node types, we presented four strategies to solve the query problem, namely, Data Replication, Query Replication, Data Reply, and Data Synchronization strategies. Especially we proposed a Message Queue Selection algorithm for message transferring. The priority concept is set associated with every message such that the most "important" one could be sent first. In this way, it can increase the query success ratio and reduce the query delay time. Finally, we evaluated our approach, and compared with other routing schemes. The simulation results showed that our proposed approach had better query efficiency and shorter delay.
基金funded by Researchers Supporting Project Number(RSPD2023R947),King Saud University,Riyadh,Saudi Arabia.
文摘Delay Tolerant Networks(DTNs)have the major problem of message delay in the network due to a lack of endto-end connectivity between the nodes,especially when the nodes are mobile.The nodes in DTNs have limited buffer storage for storing delayed messages.This instantaneous sharing of data creates a low buffer/shortage problem.Consequently,buffer congestion would occur and there would be no more space available in the buffer for the upcoming messages.To address this problem a buffer management policy is proposed named“A Novel and Proficient Buffer Management Technique(NPBMT)for the Internet of Vehicle-Based DTNs”.NPBMT combines appropriate-size messages with the lowest Time-to-Live(TTL)and then drops a combination of the appropriate messages to accommodate the newly arrived messages.To evaluate the performance of the proposed technique comparison is done with Drop Oldest(DOL),Size Aware Drop(SAD),and Drop Larges(DLA).The proposed technique is implemented in the Opportunistic Network Environment(ONE)simulator.The shortest path mapbased movement model has been used as the movement path model for the nodes with the epidemic routing protocol.From the simulation results,a significant change has been observed in the delivery probability as the proposed policy delivered 380 messages,DOL delivered 186 messages,SAD delivered 190 messages,and DLA delivered only 95 messages.A significant decrease has been observed in the overhead ratio,as the SAD overhead ratio is 324.37,DLA overhead ratio is 266.74,and DOL and NPBMT overhead ratios are 141.89 and 52.85,respectively,which reveals a significant reduction of overhead ratio in NPBMT as compared to existing policies.The network latency average of DOL is 7785.5,DLA is 5898.42,and SAD is 5789.43 whereas the NPBMT latency average is 3909.4.This reveals that the proposed policy keeps the messages for a short time in the network,which reduces the overhead ratio.
基金This work is supported in part by the National Natural Science Foundation of China(61871140,61572153,U1636215,61572492,61672020)the National Key research and Development Plan(Grant No.2018YFB0803504).
文摘In Wireless Sensor Network(WSN),because battery and energy supply are constraints,sleep scheduling is always needed to save energy while maintaining connectivity for packet delivery.Traditional schemes have to ensure high duty cycling to ensure enough percentage of active nodes and then derogate the energy efficiency.This paper proposes an RFID based non-preemptive random sleep scheduling scheme with stable low duty cycle.It employs delay tolerant network routing protocol to tackle the frequent disconnections.A low-power RFID based non-preemptive wakeup signal is used to confirm the availability of next-hop before sending packet.It eliminates energy consumption of repeated retransmission of the delayed packets.Moreover,the received wakeup signal is postponed to take effect until the sleep period is finished,and the waken node then responds to the sending node to start the packet delivery.The scheme can keep stable duty cycle and then ensure energy saving effect compared with other sleeping scheduling methods.
基金Projects(61202488, 61070199, 61103182) supported by the National Natural Science Foundation of China
文摘The inherent selfishness of each node for the enhancement of message successful delivery ratio and the network overall performance improvement are reflected in the contradiction relationship of competition and cooperation in delay/disruption tolerant networks (DTN). In particular, the existence of malicious node aggravates this contradiction. To resolve this contradiction, social relationship theory and group theory of social psychology were adopted to do an in-depth analysis. The concrete balancing approach which leveraged Nash equilibrium theory of game theory was proposed to resolve this contradiction in reality. Thus, a new congestion control routing algorithm for security defense based on social psychology and game theory (CRSG) was put forward. Through the experiment, this algorithm proves that it can enhance the message successful delivery ratio by more than 15% and reduce the congestion ratio over 15% as well. This algorithm balances the contradiction relationship between the two key performance targets and made all nodes exhibit strong cooperation relationship in DTN.
基金supported by the National Key R&D Program (No. 2016YFC1401900)the China Postdoctoral Science Foundation (No. 2017M620293)+3 种基金the National Natural Science Foundation of China (Nos. 61379127, 61379128, 61572448)the Fundamental Research Funds for the Central Universities (No. 201713016)Qingdao National Labor for Marine Science and Technology Open Research Project (No. QNLM2016ORP0405)Natural Science Foundation of Shandong (No. ZR2018BF006)
文摘The network coverage is a big problem in ocean communication, and there is no low-cost solution in the short term. Based on the knowledge of Mobile Delay Tolerant Network(MDTN), the mobility of vessels can create the chances of end-to-end communication. The mobility pattern of vessel is one of the key metrics on ocean MDTN network. Because of the high cost, few experiments have focused on research of vessel mobility pattern for the moment. In this paper, we study the traces of more than 4000 fishing and freight vessels. Firstly, to solve the data noise and sparsity problem, we design two algorithms to filter the noise and complement the missing data based on the vessel's turning feature. Secondly, after studying the traces of vessels, we observe that the vessel's traces are confined by invisible boundary. Thirdly, through defining the distance between traces, we design MR-Similarity algorithm to find the mobility pattern of vessels. Finally, we realize our algorithm on cluster and evaluate the performance and accuracy. Our results can provide the guidelines on design of data routing protocols on ocean MDTN.
基金The authors would like to thank the Deanship of Scientific Research at Majmaah University for supporting this work under Project Number No-R-2021-60.
文摘Energy harvesting(EH)technology in wireless communication is a promising approach to extend the lifetime of future wireless networks.A cross-layer optimal adaptation policy for a point-to-point energy harvesting(EH)wireless communication system with finite buffer constraints over a Rayleigh fading channel based on a Semi-Markov Decision Process(SMDP)is investigated.Most adaptation strategies in the literature are based on channeldependent adaptation.However,besides considering the channel,the state of the energy capacitor and the data buffer are also involved when proposing a dynamic modulation policy for EH wireless networks.Unlike the channeldependent policy,which is a physical layer-based optimization,the proposed cross-layer dynamic modulation policy is a guarantee to meet the overflow requirements of the upper layer by maximizing the throughput while optimizing the transmission power and minimizing the dropping packets.Based on the states of the channel conditions,data buffer,and energy capacitor,the scheduler selects a particular action corresponding to the selected modulation constellation.Moreover,the packets are modulated into symbols according to the selected modulation type to be ready for transmission over the Rayleigh fading channel.Simulations are used to test the performance of the proposed cross-layer policy scheme,which shows that it significantly outperforms the physical layer channel-dependent policy scheme in terms of throughput only.
文摘Wireless and mobile networks seem to deliver tremendous uses. In its way, MANET leads to enormous real world applications. Routing allows us to implement many real world applications. Complete affinity in an infrequent network like ICMANET is highly impossible. Disconnected MANET is also known as ICMANET which is also a DTN (Delay Torrent Network) that supports for higher delays. It is laborious process to execute routing in a diffused network process to execute routing in a diffused network. To deliver the data packets towards the destined node to its best, a new strategy in routing called Ant routing protocol in concoction with storage strategy LoDis has been proposed. Despite of routing, security is still an unsolved problem. To evaluate this situation, this paper presents a methodology called agent technology which yields a secure routing. Hostile node in the network is spotted with the help of agent at each node. A cryptographic algorithm Advanced Encryption Standard (AES) is habituated to improve secure communication in wide range Mobility and total number of nodes in the network act as variables in examining the hostile nodes in the network to judge the standard of security. Improved performance along with the security is the point to be highlighted.
基金supported by the National Natural Science Foundation of China(61171097)the State Major Science and Technology Special Projects(2012ZX03004001)
文摘Opportunistic networks are derived from delay tolerant networks, where mobile nodes have no end-to-end connections. Nodes are represented by people, which means that opportunistic networks can be regarded as social networks. Human mobility plays an important role in affecting the performance of forwarding protocols in social networks, furthermore, the trajectory of people's movements are driven by social characteristics. However, current routing protocols rely on simple mobility models, and rarely consider social characteristics. Considering two heterogeneous network models, an social opportunistic networks routing(SONR) was proposed which brings an adapted discrete Markov chain into nodes' mobility model and calculates the transition probability between successive status. Comparison was made between Spray, Wait and Epidemic protocol. Simulation show that SONR can improve performance on delivery ratio, delivery latency and network overhead, meanwhile. SONR approaches the performance of Epidemic routing.
文摘Vehicular Delay Tolerant Networks (DTN) use moving vehicles to sample and relay sensory data for urban areas, making it a promising low-cost solution for the urban sensing and infotainment applications. However, routing in the DTN in real vehicle fleet is a great challenge due to uneven and fluctuant node density caused by vehicle mobility patterns. Moreover, the high vehicle density in urban areas makes the wireless channel capacity an impactful factor to network performance. In this paper, we propose a local capacity constrained density adaptive routing algorithm for large scale vehicular DTN in urban areas which targets to increase the packet delivery ratio within deadline, namely Density Adaptive routing With Node deadline awareness (DAWN). DAWN enables the mobile nodes awareness of their neighbor density, to which the nodes' transmission manners are adapted so as to better utilize the limited capacity and increase the data delivery probability within delay constraint based only on local information. Through simulations on Manhattan Grid Mobility Model and the real GPS traces of 4960 taxi cabs for 30 days in the Beijing city, DAWN is demonstrated to outperform other classical DTN routing schemes in performance of delivery ratio and coverage within delay constraint. These simulations suggest that DAWN is practically useful for the vehicular DTN in urban areas.