Advertisement

Design of Energy-Aware PRoPHET and Spray-and-Wait Routing Protocols for Opportunistic Networks

  • Sibusiso ShabalalaEmail author
  • Zelalem Shibeshi
  • Khuram KhalidEmail author
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 27)

Abstract

Opportunistic networks are kind of networks where connectivity disruption and topology changes are frequent. In such environment, nodes are responsible to dynamically discover the next hop that can be used to forward the message closer to the destination using the so-called store-and-forward mechanism. In this sense, the performance of nodes in transferring the message to the destination is highly influenced by the routing and forwarding algorithm employed by the network. A number of efficient benchmark routing protocols for OppNets have been investigated, including the PRoPHET and Spray-and-Wait protocols. This chapter proposes energy-efficient versions of the PRoPHET and Spray-and-Wait routing protocols that are designed to reduce the number of message copies generated in the network and ensures that only nodes with high residual energy are selected as next hop. Through simulation, we have proven that our proposed energy-efficient versions of the mentioned routing protocols outperform the original version in terms of energy consumption, overhead ratio and number of messages delivered to destination.

Keywords

Opportunistic networks (OppNets) Performance evaluation PRoPHET Spray and Wait (S&W) ONE simulator 

References

  1. 1.
    R.S. Vaishali, C. Manicka, Disruption Tolerant Network (DTM), its network characteristics and core application. Int. J. Comput. Sci. Mob. Comput. 2(9), 256–262 (2013).Google Scholar
  2. 2.
    D. Huang, Z. Gao, K. Niu, X. Qiu, Adaptable quota-stretchy routing for delay-tolerant networks. Proc. Comput. Sci. 107, 513–519 (2017)CrossRefGoogle Scholar
  3. 3.
    L. Pelusi, A. Passarella, M. Conti, Opportunistic networking: data forwarding in disconnected mobile ad hoc networks. IEEE Commun. Mag. 44(11), 134–141 (2006)CrossRefGoogle Scholar
  4. 4.
    V. Anshul, S. Anurag, Integrated routing protocol for opportunistic networks. Int. J. Adv. Comput. Sci. Appl. 2(3), 85–92 (2011)Google Scholar
  5. 5.
    K. Khalid, A History-Based Energy-Efficient Routing Protocol for Opportunistic Networks, vol. 2 (Memorial University of Newfoundland, Toronto, 2014), pp. 85–92.Google Scholar
  6. 6.
    S. Grasic, E. Davies, A. Lindgren, A. Doria, The evolution of a DTN routing protocol RoPHETv2, in 6th ACM Workshop on Challenged Networks, Las Vegas, 2011.Google Scholar
  7. 7.
    T. Spyropoulos, K. Psounis, C.S. Raghavendra, Spray-and-Wait: An efficient routing scheme for intermittently connected mobile networks, in Proceedings of the SIGCOMM Workshop on Delay-Tolerant Networking, pp. 252–259, , 22–26 August 2005Google Scholar
  8. 8.
    A. Lindgren, A. Doria, Probabilistic routing in intermittently connected network. Mob. Comput. Commun. Rev. 7(3), 19–20 (2013)CrossRefGoogle Scholar
  9. 9.
    S.S. Dhurandher, K.S. Deepak, W. Isaac, G. Rohan, G. Sanjay, GAER: genetic algorithm-based energy-efficient routing protocol for infrastructure-less opportunistic networks. J. Supercomputing 69(3), 1183–1214 (2014)CrossRefGoogle Scholar
  10. 10.
    Y.K. Yao, W.H. Liu, W.X. Zheng, Z. Ren, An energy-saving routing algorithm for opportunistic networks based on asynchronous sleep approach. Appl. Mech. Mater. 441(3), 1001–1004 (2014)Google Scholar
  11. 11.
    A.C. Chilipirea, A. Petre, Energy-aware social-based routing in opportunistic network, in Proceedings of the 27th IEEE WAINA, pp. 791–796, 25 March 2013Google Scholar
  12. 12.
    P. Hui, J. Crowcroft, E. Yoneki, Bubble Rap: Social-based forwarding in delay tolerant network, in Proceedings of the 9th ACM International Symposium on Mobile Ad Hoc Networks and Computing, New York, 2008.Google Scholar
  13. 13.
    A. Keränen, J. Ott, T. Kärkkäinen, The ONE simulator for DTN protocol evaluation, in Proceedings of the Second International ICST Conference on Simulation Tools and Techniques (2009), pp. 1–10.Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Department of Computer ScienceUniversity of Fort HareAliceSouth Africa
  2. 2.Department of Computer ScienceRyerson UniversityTorontoCanada

Personalised recommendations