• Tidak ada hasil yang ditemukan

View of “A REVIEW ON IMPACT OF OPPORTUNISTIC ROUTING IN MULTI-HOP WIRELESS NETWORK”

N/A
N/A
Protected

Academic year: 2023

Membagikan "View of “A REVIEW ON IMPACT OF OPPORTUNISTIC ROUTING IN MULTI-HOP WIRELESS NETWORK”"

Copied!
8
0
0

Teks penuh

(1)

Vol.03, Issue 04, April 2018, Available Online: www.ajeee.co.in/index.php/AJEEE

1

“A REVIEW ON IMPACT OF OPPORTUNISTIC ROUTING IN MULTI-HOP WIRELESS NETWORK”

Md Mohtab Alam1, Mr.Sanjay Gupta2 Research Scholar1, Assistant Professor2

12Department of Computer Science & Engineering

12vindhya Institute of Technology & Science Jabalpur-482001, Madhya Pradesh (India)

Abstract -In wireless sensor network the sensor nodes are deployed in a wireless area to form a network in which the data can traverse from source to destination. In point to point wireless communication, whenever a source has some data to send then it has the destination address. So without any congestion the data has been transferred from source to destination, but in Multi-Hop STDMA wireless network there is no predefined path present in between source and destination. The interfering node forwards the message to next node by including its own address so that when the message arrives at receiver side route from source to destination can be forwarded back to the sender for route maintenance. By opportunistic communication the traffic during communication has been optimized which increases the network performance.

Key-Words: Opportunistic Communication, Multi-Hop Wireless Network, STDMA, Congestion.

1. MOBILE DATA OFFLOADING Mobile data offloading, also referred to as mobile cellulartraffic offloading, is the use

of complementary network

communication technologies to deliver mobile data traffic originally planned for transmission over cellular networks[1].

Rules triggering the mobile offloading action can be set by either an end-user (mobile subscriber) or an operator. The code operating on the rules resides in an end-user device, in a server, or is divided between the two. End users do data offloading for data service cost control and the availability of higher bandwidth.

Operators do it to ease congestion of cellular networks.It is predictedthat mobile data offloading will become a new industry segment due to the surge of mobile data traffic[2].

Increasing need for offloading solutions is caused by the explosion of Internet data traffic, especially the growing portion of traffic going through mobile networks. This has been enabled by smartphone devices possessing Wi-Fi capabilities together with large screens and different Internet applications, from browsers to video and audio streaming applications. In addition to smart phones laptops with 3G access capabilities are also seen as a major source of mobile data traffic. Additionally, Wi-Fi is typically

much less costly to build than cellular networks.

Fig 1: Overview of Mobile Data Offloading

2. NEED FOR DATA OFFLOADING Because of the quick development of cell phones and tablets, information movement on the systems is on the ascent and versatile associations are required to achieve the 7.4 billion check by 2015 outperforming the worldwide populace [3].

With the appearance of system innovations, for example, 3G and 4G (LTE, WiMAX) versatile information movement has been developing at an uncommon pace and progressively overwhelming the system limit. The presentation of cell phones that offer pervasive web get to united to a large group of other web competent gadgets

(2)

Vol.03, Issue 04, April 2018, Available Online: www.ajeee.co.in/index.php/AJEEE

2 including tablets, consoles, PCs and guides - all getting to be web skilled has been driving the information development.

The system administrators are additionally progressively presenting information benefits because of information progressively adding to the administration incomes; however information activity utilization is outpacing the information income. The expansion of these versatile broadband gadgets alongside the boundless information groups from the administrators has prompted arrange clog and weakening system quality. [4].

3. OFFLOADING CHALLENGES

The entire offloading market has been a surely knew showcase for quite a while now, and by making the cell littler the transporters will have greater limit. The difficulties have dependably been the means by which to execute the arrangement of microcells and to discover every one of the spots to convey the important passageways and different variables including mounting; control supply; and backhaul to interconnect them to portable transporter's center system. The accompanying rundown condenses the key inhibitors for Versatile Information Offloading.

Consistent client encounter:

Wireless associations need to give a consistent association and should be of higher quality for the clients to offload from the bearer's system to the WiFi arrange. This implies once associated with the WiFi organize clients must have the capacity to consistently interface with a similar system when in go.

4. MOBILE DATA OFFLOAD OVERVIEW The Intouch Portable Information Offload stage is a suite of adaptable items intended to make offload a fundamental piece of the versatile information organize - boost existing system resources, streamline versatile availability in the offload condition and broaden control by means of shrewd netw ork and gadget arrangement controls. We comprehend our clients require strong, dependable, superior w ireless netw orks to upgrade the client encounter. Greenpacket's protected innovation for clever netw ork choice and consistent wandering can enable transporters to convey

progressively and spare more through industry benchmarks best netw orking rehearses that assistance ease blockage to make consistent experience crosswise over substitute netw orks. The arrangement suite works out of the case.

Transporters can tweak w hen to supersede local Wi-Fi physically or naturally, decide get to standards and sw tingling guidelines in the choice of netw ork and consistent wandering to help Wi- Fi offload. Setup of strategy authorization controls can likewise be effortlessly reached out to upgrade end to end portable information offload by means of joining to a PCRF or approach server.

A. Simple Offload

Intouch Straightforward Offload is planned w ith the client involvement as a main priority. Wi-Fi get to is still transcendently manual and disappointing at most for some endorsers. With Basic Offload, endorsers never again battle to comprehend Wi-Fi via computerizing Wi- Fi hotspot identification, choice and association abilities. Endorsers would now be able to have opportunity to interface with the quickest and most elevated execution hotspot accessible .Intouch Straightforward Offload can enable attract to offload to huge introduced supporter base at the same time. Wi-Fi get to is made simple with Wi- Fi hotspot discoverer capacity. Moreover, w ith Wi-Fi netw orks turning into a basic piece of the experience, so does the requirement for a vigorous Wi-Fi QoS execution to enhance the disclosure, choice and prioritization of Wi-Fi. Intouch Basic Offload promptly bolsters fundamental Wi-Fi QoS that tracks and approves w hich Wi-Fi hotspots are of ideal quality and ready to modify bearer arrangement control.

 Hotspot Management.

 Wi-Fi QoS & QoE extension.

 Status Aw are– Device, Netw ork, Environment.

 Smart Notifications.

B. Dynamic Offload

A propelled versatile offload arrangement that astutely implements administrator characterized controls crosswise over cell and Wi-Fi netw orks to permit adaptable prioritization of w here, w hen, w ho and how to offload, guaranteeing your

(3)

Vol.03, Issue 04, April 2018, Available Online: www.ajeee.co.in/index.php/AJEEE

3 endorsers are constantly associated with the most upgraded netw ork constantly.

The capacity to progressively find, sw tingle and organize netw orks w ithout manual client mediation guarantees a consistent handover Intouch Dynamic Offload is intended to respond and react to supporter conduct. We have faith in conveying the best portable information encounter, through end-to-end correspondence. The joined strategy implementer over the gadget and netw ork level relationship is additionally improved w hen the two supporters and administrators can trade crucial data to assemble quality associations. Make the Wi-Fi encounter straightforward, w hen offloading your supporters. Offloading must be compelling and important w ith clearer comprehension of the inspiration for stack adjusting financially. Effectively scale up or dow n the use of netw ork assets as per supporter utilization w ithout real foundation changes and ventures w ith a 3GPP-ANDSF consistent arrangement. Add more profundity to the Wi-Fi encounter, by including Wi-Fi QoS ability. Intouch Dynamic Offload can undoubtedly consolidate Wi-Fi QoS that helps to total, measure and screen the gadget and Wi-Fi netw ork, to ensure tasteful client encounter as a feature of information offload upgrade suite.

• Policy-Based Management – ANDSF compliant.

• Advanced Policy Engine.

• Standard Based Security &

Authentication.

• IP Flow Mobility.

• Best of Netw ork and Device Policy.

C. Seamless Offload

Consistent Offload is intended to make Wi-Fi encounter as simple as cell. We enable transporters to cut down the obstructions of executing business Wi-Fi benefits as a feature of the administration blend. Transporters can keep on delivering 'home' administrations in the offload condition and in the meantime permit Wi-Fi to be incorporated as a component of bearer procedures to deal with movement volumes and to empower the conveyance of focused, separated administrations.

5. MOBILE DATA OFFLOADING ARCHITECTURE

There are six different options to offload data from the mobile network at either the access or the core network level. Each of these options can co-exist and the operator will have to determine the best option based on multiple factors such as current infrastructure, customer usage patterns, associated costs, deployment and maintenance complexities and user density in a particular location.

1. Wi-Fi Hotspot

2. LTE Small Cells / Relay nodes 3. Integrated Femto / Wi-Fi 4. Direct Tunnel

5. Internet offload Gateway (IOGW) 6. M2M Gateway

Fig 2: Mobile Data offloading Architecture

(4)

Vol.03, Issue 04, April 2018, Available Online: www.ajeee.co.in/index.php/AJEEE

4 6. LITERATURE SURVEY

Wifler[6] is a framework to enlarges portable 3G limit. It utilizes two key thoughts utilizing defer resilience and quick switching|to conquer the poor accessibility and execution of WiFi. For postpone tolerant applications, Wifler utilizes a basic model of nature to foresee WiFi availability. It utilizes these forecasts to defers exchanges to offload more information on WiFi, however just if postponing diminishes 3G utilization and the exchanges can be finished inside the application's resistance limit. For applications that are to a great degree delicate to postpone or misfortune (e.g., VoIP), Wifler rapidly changes to 3G if WiFi can't effectively transmit the parcel inside a little time window. We execute and send Wiflerin our vehicular testbed. Our examinations demonstrate that Wifler altogether decreases 3G use. For a sensible remaining task at hand, the decrease is 45% for a defer resilience of 60 seconds.

Line2 [7] is the sole application ready to use WiFi, 3G/4G information associations, and your phone system to make and get calls and messages wherever you are. We call it "tri-mode calling." Our clients call it"never missing a call". Line2 first tries to associate by means of a WiFi organize. On the off chance that inaccessible, it will then endeavor to associate over your 3G/4G cell information arrange giving you the flexibility to be portable without utilizing cell minutes. Lastly, if all else fails, Line2 will associate by means of your phone association, which will utilize your phone plan minutes, however guarantees you never miss a call.

iPass [8] framework gives us access to the iPass Portable System, the world's biggest business Wi-Fi organize, with inflight Web and unquestionably lodgings, airplane terminals, and business scenes than some other system.

So clients get simple, solid availability for all intents and purposes anyplace they wander. Versatile network can display genuine expense and profitability challenges. 3G and 4G systems are regularly congested and information meandering plans are costly. Versatile laborers like to interface utilizing Wi-Fi—

it's in our airplane terminals and in flight, in lodgings, workplaces, homes and

wherever we gather. For all intents and purposes all cell phones and tablets transport with Wi-Fi ability; layered information designs urge customers to depend on Wi-Fi; and cloud-based applications are detonating. iPass conveys the main worldwide Wi-Fi organize and confided in versatility administrations. No one but iPass can convey a genuine all around portable experience.

MOTO Task [9] examines the cutoff points of 4G/LTE advances in congested conditions and how artful systems administration (a development of the Postponement Tolerant Systems administration (DTN) worldview) can be utilized in a trustful way to offload some portion of the activity from the 4G/LTE organize. MOTO venture has proposed configuration, measurement, actualize, and assess a design that exploits the most recent advances in pioneering systems administration to accomplish effective activity offloading, keeping in mind the end goal to help lighten over-burden cell frameworks. MOTO venture is organized around five logical and mechanical goals:

1. To plan an incorporated administrator oversaw offloading framework, 2. To configuration joined offloading calculations, 3. To portray the limit advantages of the framework, 4. To perform fine-grained vast scale assessment, 5. To do incorporated prototyping and preliminaries.

PeopleNet [10] is planned as a remote virtual interpersonal organization that emulates how individuals look for data, all things considered. PeopleNet is a straightforward, adaptable and ease engineering for proficient data look in an appropriated way. It utilizes theinfrastructure to spread inquiries of an offered compose to clients in particular geographic areas, called bazaars. Inside every bazaar, the question is additionally engendered between neighboring hubs by means of shared network until the point when it finds a coordinating inquiry.

PeopleNet can bolster an assortment of administrations. Truth be told, any application including the common trade of data or products, e.g., purchasing and offering or dating, can be bolstered by PeopleNet.Storing the sort of data taken care of by PeopleNet (time, area and network particular) in unified databases requires huge time and exertion with

(5)

Vol.03, Issue 04, April 2018, Available Online: www.ajeee.co.in/index.php/AJEEE

5 respect to singular clients. From the client point of view, PeopleNet's primary preferences are comfort, since your cell phone is with you wherever you are, and time reserve funds, as delineated prior.

Online substance suppliers like Yippee!, Amazon, eBay. PeopleNet is a straightforward, minimal effort and adaptable design for dynamic data stockpiling and access. At long last, in many developing markets, versatile infiltration is very high, while the Web foundation is poor. Truth be told, Business PeopleNet is an exceptionally appealing component to give access to data and administrations for the majority.

7. SUBSCRIBE AND SEND ARCHITECTURE

In this section, we have discussed the Subscribe-and-Send architecture [14] and describe how it offloads the mobile Internet data traffic from cellular networks through WiFi opportunistic peer-topeer communications.

7.1 Premise: Transmission Model

We are worried about the issue of dispersing substance to a variable arrangement of SMTs. The SMTs are furnished with remote broadband availability (e.g., 3G) and furthermore ready to convey by means of WiFi. Both the remote broadband network and WiFi interface are dynamic. Programming is introduced on the SMT to buy in to substance on CSP and to send documents to experiencing hubs. The product can get a document through either the remote broadband association or the Wireless association. We guess the SMTs are WiFi coordinate gadgets. WiFi coordinate gadgets enable the production of distributed associations between WiFi customer gadgets without requiring the nearness of a customary WiFi foundation arrange (i.e., AP or switch) [15].

7.2 Outline of Buy in and-Send

The Buy in and-Send design and portray how it offloads the versatile Web information movement from cell arranges through Wi-Fi artful distributed correspondences. Since the Wi-Fi association can't simply be made, a hand- off needs to convey the substance and sits tight for future Wi-Fi associations. In Figure 2, the strong line implies the association made by 3G interface and the

spotted line implies shared Wi-Fi correspondence. After hub 3 gets motion picture 1 from hub 1, since it has no other Wi-Fi associations, hub 3 needs to convey film 1 constantly. At the point when node_3 meets node_7 later on, it sends motion picture 1 to hub 7. Since the Wi-Fi association can't simply be made, a transfer needs to convey the substance and sits tight for future Wi-Fi associations. In Figure 3, the strong line implies the association made by 3G interface and the specked line implies distributed Wi-Fi correspondence. After hub 3 gets film 1 from hub 1, since it has no other Wi-Fi associations, hub 3 needs to convey motion picture 1 constantly. At the point when hub 3 meets hub 7 later on, it sends motion picture 1 to hub 7.

Fig 3: Subscribe and Send Architecture 7.3 Subscription Management

1. When an endorser gets the substance bought in on the CSP(Content Specialist organization), it sends a reaction message to the CSP and expels the membership of this substance from the membership table.

2. If a supporter does not get the bought in content after the due date of the membership, the CSP prompts the client about the disappointment of the membership. At that point the client can download the substance through 3G, or expand the due date of the membership. On the off chance that the client does not broaden the due date, the CSP evacuates the membership of the substance from the membership table on CSP. Then, the membership is expelled from the membership table on the client's gadget, as well.

(6)

Vol.03, Issue 04, April 2018, Available Online: www.ajeee.co.in/index.php/AJEEE

6 3. As the due date of a membership

is made by the supporter, the due dates of various memberships are unique. Also, it isn't important that the timekeepers on all gadgets are synchronous in light of the fact that the CSP keeps up the aggregate membership table.

4. Every hub gets to the CSP to check the membership table like clockwork or 30 minutes through 3G, so the 3G activity heap of a SMT(Smart Portable Terminals) is low.

8. ENHANCED WI-FI OFFLOADING MODEL WITH PCC

In portable information offloading, the objective is to divert (offload) chose Web activity toward a minimal effort get to radio system to mitigate information clog while conveying positive client encounter.

In view of the 3GPP/LTE center engineering, Fig. 4 demonstrates our proposed Wi-Fi offloading reference display with PCC support and administration information stream mobility[16]. In this figure, the Serving- GW and the bundle information arrange

passage (PDNGW) are in charge of versatility and session administration. All parcels are initially exchanged through the center system (i.e., the Serving-GW and PDNGW). At the point when a portable client lives in an offloading territory [i.e., Wi-Fi region in this model;

see Fig. 4(a)], all or part of the chose Web information initially exchanged on the center system can be offloaded. For instance, best-exertion low-QoS information can be offloaded to Wi-Fi while keeping high-QoS voice and information through theLTE center. At the point when a versatile client does not dwell in an offloading territory [see Fig.

4(b)],all information activity must be exchanged by means of the LTE center. In the LTE center, application flagging is steered to the application work (AF), which is in charge of the real administration. An administration information stream comprises of the client bundles in regards to an IP application recognized by a movement stream layout (TFT) [17]. The AF depicts a support of the PCC framework as far as related IP addresses, port numbers, bit rates, and postpone affectability.

9. ONE SIMULATOR

Today numerous individual cell phones incorporate capacities to speak with foundation arranges yet additionally with one another. The last can be utilized to shape impromptu systems where regular foundation is never again required for correspondence among has taking an interest in the system. Adhoc systems can likewise assist portable hubs with reaching framework if some hub in the

system is capable and willing to go about as an entryway and potentially different hubs as transfers for the movement.

Systems can be shaped along these lines as long as the hub thickness is sufficiently huge so that there exists conceivable end-to-end ways between all hubs needing to impart. Be that as it may, if the hub thickness diminishes or the network breaks for some other reason (e.g., the radios are turned off every so

(7)

Vol.03, Issue 04, April 2018, Available Online: www.ajeee.co.in/index.php/AJEEE

7 often), conventional system correspondence conventions are not any more ready to give intends to multi-jump communication.Delay Tolerant Systems administration (DTN) [10, 4] is a correspondence organizing worldview that empowers correspondence in conditions where there might be no conclusion to- end ways, correspondence openings go back and forth and their interim can be long and not in any case known in advance. Steering messages in this sort of conditions can be very extraordinary contrasted with conventional systems.

This has made a need to discover new steering conventions that consider the particular idea of these systems.

Diverse methodologies can be tried and assessed by reproduction, yet the reenactment results are extremely valuable just in the event that they are a consequence of fairly tenable reenactment situations.To make complex DTN reenactments more plausible and reasonable, we made another reenactment condition that joins development

displaying, directing reenactment, perception and revealing in one program.

Development demonstrating should be possible either on-request utilizing the incorporated development models or development information can be transported in from an outside source.

The hub position information that the development models give is then used to deciding on the off chance that two hubs can impart and trade messages. This data can be sent out for directing reproduction in outer test systems (such as dtnsim) or it tends to be given to the inward directing modules which execute a few distinctive DTN steering calculations. The interior directing modules perform tasks individually, yet they can additionally be told utilizing occasion generator modules or outside follows. The development demonstrating and directing recreation is intelligently perceptible in the test system's GUI and report modules can accumulate information of the recreation for advance examination or association with different projects.

Fig 4: Overview of ONE Simulator

9.1 Mobilty Model

Versatility models direct how the hubs move amid the reenactment. Three unique kinds of versatility models were at first executed for ONE. For reference purposes, even regardless of its inadequacies, ONE incorporates the fundamental Irregular Waypoint development show. For more practical versatility situations ONE gives assortment of guide based development models which oblige the hub development to foreordained ways. At long last, ONE additionally underpins bringing in of portability information from outer sources. Guide based development models

acknowledge outline that is portrayed utilizing a subset of the Notable Content (WKT) design. WKT is an ASCII based configuration that is normally utilized in Geographic Data.

9.2 Routing Simulation

While the versatility models choose where the hubs should move straightaway, the directing modules get the chance to choose where the messages, or packages, wind up. The ONE has six usage of various surely understood directing calculations and furthermore an aloof steering module that can be utilized for collaboration with outside DTN steering

(8)

Vol.03, Issue 04, April 2018, Available Online: www.ajeee.co.in/index.php/AJEEE

8 test systems. The dynamic steering modules incorporated into the ONE are:

First Contact [13], Coordinate Conveyance [24], Splash and Hold up [25] (typical and double), Plague [26], PRoPHET [17]

andMaxProp [3]. Whenever (at least two) hubs meet and there is an opportunity to trade messages.

10. CONCLUSION

With offloading arrangement, data specialist co-op can diminish cell messages and therefore lessening their operational expense. The fundamental focal point of our examination is simply execution situated. MaxProp, Splash and- Pause, Scourge and assess their movement offloading execution, conveyance likelihood, normal inertness and overhead proportion through ONE test system has been examined.

REFERENCES

1. http://en.wikipedia.org/wiki/Mobile_data_

offloading

2. Perez Sarah (February 11, 2010). "Mobile data traffic surge: 40 exabytes by 2014".

3. computerweekly.com/news/2240105255/S martphones-and-tablets-drive-mobile-data- traffic-up-23-says-Gartner

4. Balancing the Mobile Data Load:Whitpaper by Nitin Bhas Juniper Research Limited

March 2011

[http://www.juniperresearch.com/

5. Data offload approaches for mobile operators‖.http://www.wipro.com/Docume nts/resourcecenter/Data_Offload_Approac hes_for_Mobile_Operators.pdf.

6. Balasubramanian, R. Mahajan, and A.

Venkataramani, ―Augmenting Mobile 3G Using WiFi,‖ Proc. ACM MobiSys, pp. 209- 222, June 2010.

7. http://www.line2.com 8. http://www.ipass.com

9. Mobile Opportunistic Traffic Offloading D1.1 – Project Presentation 21/12/2012 © MOTO Consortium – 2013

10. M. Motani, V. Srinivasan, and P.S.

Nuggehalli, ―PeopleNet: Engineering A Wireless Virtual Social Network,‖ Proc.

ACM MobiCom, pp. 243-257, Aug./Sept.

2005

11. Beach, M. Gartrell, S. Akkala, J. Elston, J.

Kelley, K. Nishimoto,B. Ray, S. Razgulin, K.

Sundaresan, B. Surendar, M. Terada, and R. Han, ―WhozThat? Evolving an Ecosystem for Context-Aware Mobile Social Networks,‖

IEEE Network, vol. 22, no. 4, pp. 50- 55,July/Aug. 2008.

12. S. Gaonkar, J. Li, R.R. Choudhury, L. Cox, and A. Schmidt, ―Micro-Blog: Sharing and Querying Content through Mobile Phones and Social Participation,‖ Proc. ACM MobiSys, pp. 174-186, June 2008.

13. Miluzzo, N.D. Lane, K. Fodor, R. Peterson, H. Lu, M. Musolesi, S.B. Eisenman, X.

Zheng, and A.T. Campbell, ―Sensing Meets

Mobile Social Networks: The Design, Implementation and Evaluation of the CenceMe Application,‖ Proc. Sixth ACM Conf. Embedded Network Sensor Systems (SenSys ’08), pp. 337-350, Nov.2008.

14. Offloading Mobile Data from Cellular NetworksThrough Peer-to-Peer Wi-Fi Communication:A Subscribe-and-Send ArchitectureLU Xiaofeng, HUI Pan, Pietro Lio’ China Communications June 2013 15. ALLIANCE W F. Wi-Fi CERTIFIED Makes it

Wi-Fi [EB/OL]. http://www.wi- fi.org/news_articles.php, 2010.

16. Mobile data offloading with policy and charging control in 3GPP core network by Sok-Ian Sou, Member, IEEEIEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 62, NO. 7, SEPTEMBER 2013

17. 3GPP. 3rd Generation Partnership Project;

Technical Specification Group Services and System Aspects; Policy and charging control architecture. Technical Specification 3G TS 23.203 Version 9.5.0 (2010-06), 2010.

18. S.-I. Sou, and C.-S. Lin, ―SPR proxy mechanism for 3GPP Policy and Charging Control System‖, Computer Networks, in

press, DOI:

10.1016/j.comnet.2011.07.025.

19. The Network Simulator NS-2.

http://www.isi.edu/nsnam/ns/. [Online;

accessed 24-May-2008].

20. University of Waterloo. DTNSim2 Delay- tolerant Network Simulator.

http://watwire.uwaterloo.ca/DTN/sim/.

[Online; accessed 24-May2008].

21. OpenJUMP - The free, Java based and open source Geographic Information System for the World. http://openjump.org, 2008.

[Online; accessed 19-May-2008].

22. Mikko Pitk¨anen, Ari Ker¨anen, and J¨org Ott. Message Fragmentation in Opportunistic DTNs. In Proceedings of the Second WoWMoM Workshop on Autonomic and Opportunistic Communications (AOC) 2008. IEEE, 2008.

23. The Rice Monarch Project. Rice Monarch Project Extensions to ns-2.

http://www.monarch.cs.rice.edu/cmu- ns.html. [Online; accessed 19-May-2008].

24. Thrasyvoulos Spyropoulos, Konstantinos Psounis, and Cauligi S. Raghavendra.

Single-copy routing in intermittently connected mobile networks. In Proc. Sensor and Ad Hoc Communications and Networks SECON, pages 235–244, October 2004.

25. Thrasyvoulos Spyropoulos, Konstantinos Psounis, and Cauligi S. Raghavendra.

Spray and Wait: An Efficient Routing Scheme for Intermittently Connected Mobile Networks. In Proceedings of ACM SIGCOMM Workshop on Delay-Tolerant Networking (WDTN), 2005.

26. A. Vahdat and D. Becker. Epidemic routing for partially connected ad hoc networks.

Technical Report CS-200006, Duke University, April 2000.

Referensi

Dokumen terkait

For eINITEX (the INITEX version of ε-TEX) there is an additional possi- bility: If the first non-blank input character is an * (immediately followed what would be the first