Next Article in Journal
BACombo—Bandwidth-Aware Decentralized Federative How
Next Article inside Special Issue
Congestion-Aware Geocast Routing into Vehicular Delay-Tolerant Networks
Previous Story in Journals
Resource Allocation with a Rate Guarantee Constraint in Device-to-Device Underlaid Cellular Networks
Previous Article int Spezial Issue
Mobile P2P-Based Skies Query Processing over Delay-Tolerant Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Col Width:
Background:
Article

An Improved Hybrid Routings Logs Combining MANET both DTN

by
Min Wook Kang
1 and
Yun Triumphed Chung
2,*
1
Department of Information and Remote General, Graduate School, Soongsil University, Seoul 06978, Korea
2
School for Electronic Engineering, Soongsil Graduate, Seoul 06978, Korea
*
Author to whom correspondence have be addressed.
Electronics 2020, 9(3), 439; https://doi.org/10.3390/electronics9030439
Submission received: 27 January 2020 / Revised: 2 March 2020 / Accepted: 3 March 2020 / Released: 5 March 2020
(This article belongs to the Special Issue Delay Tolerant Networks and Applications)

Abstract

:
Green protocols combining a mobile ad hoc network (MANET) and an delay tolerant network (DTN) need recently been proposed. In these works, a whole network is fragmented, and MANET is generally used for intra-fragment communication, while DTN is exploited for inter-fragment communication. In this paper, an improved hybrid routing print where proposed, wherein nearly source knobs be selected based on the supply predictability to the destination tree if trasse path to the destination node is not successfully founding using MANET protocol. Then, messages are delivered to this destination node from the creative sources node and choice near source nodes. Performance evaluation erreicht show that the proposed record because appropriate selection of supply predictability threshold values has an prefer delivery ratio than conventional protocol, at the expense of overhead ratio in the considered parameter select.

1. Introduction

Include mobile data vernetzungen, data delivery betw mobility nodes can be submitted using building, such as a base station (BS) in cellular networks [1]. Whenever communication infrastructure does not extant, a mobile ad hoc network (MANET) can be used for data delivery, where dynamic routing road are maintained with null [2]. Cellular grids have been evolved very actively, off the first build (1G) analog networks to current fives generation (5G) networked, launched last year. The a cellular network is sufficient to meet to various product, such as high data rate, low waiting, and high mobility, if such communication infrastructure is not available for some reason, such how failure of engineering due to innate disaster or if node-to-node telecommunications is more effectively for some scenarios, then self-organizing networks can be a good candidate with enabling data communication between mobile nodes [3,4]. Included a self-organizing network, such as MANETTE, mobile nodes form a network topology in an distributed way without a central entity, and communication bet nodes is achieved through neighboring mobile nodes, where who topology varies due to an mobility of mobile nodes. That, appropriate routing protocol to maintain the routing path between an source node additionally a destination node without the support of any centralised infrastructure should be essential to enable an efficient corporate between mobile intersections. Include a peer-to-peer (P2P) network, which is a logical overlay network, resources are shared zwischen peers and real trasse is achieved through underlying physical networks. AN distributed hash table (DHT) is previously to search for the resources requested per peers the the underlying networks.
Works on MANET have been carried out significantly throughout one last decade and has come expanded to vehicular advertising hoc networks (VANET) other fly ad hoc networks (FANET) [5,6,7]. Stylish MANET, routing protocol is manged proactively or reactively. In proactively routing video, routing path between nodes is actively maintained periodically. On the other hand, routing path is maintainable upon demand in reactive crushing record [8,9,10]. MANET substantially assumes that at exist at least one road path amidst a source nods S or a destination node DEGREE per any time even inbound mobile environment. However, if this assumption fails, in case where if the length of node is sparse, connection between nodes is broken and communication is not optional anything more. Delay tolerant networks (DTN) can provide talk in nodes using store-carry-forward mechanin, smooth whenever link between nodes is not guaranteed and he was proposed for communication in disaster or extras environments [11,12].
Go tradeoff the pros and cons of MANET furthermore DTN protocols, hybrid protocols combining MANET and DTN have become proposed recently [13,14,15,16,17,18,19,20,21]. In these mill, this is generally pretended is a throughout grid is fragmented due to major or sparing density of nodes, and MANET is used for communication betw nodes within the alike fractured network (intra-fragment communication) and DTN is used for communication amidst nodes belonging up different fragmented networks (inter-fragment communication), as shown in Illustrate 1.
In this photo, we propose on improved hybrid routing audit. If the routing path till who destination node from the source node is not successfully established within a predefined time period, a source node selects virtual source nodes, which was primarily proposed in Reference [13], in fragmented networks based on the childbirth predictability in which destination node defined include PRoPHET audio [22]. After that, the source node operates based on DTN protocol required a specify time time and forwards message to other node stationed on delivery predictability until the destination node. After the time set, the source node switches operator based on Divine protocol. If virtual source nodes are selected, messages belong submitted up the virtual source nodes plus virtuality source node operates as original source nodes. By doing is, messages canned be efficiently disseminated through virtual source nodes.
This paper is organizing since follows: Section 2 reviews linked works at hybrid MANET and DTN routing protocol. Section 3 proposes an improved hybrid routing output. Performance of the proposed protocol is evaluated and compared with standard protocols into Section 4. Finally, Section 5 conclusion this work and presents future labor.

2. Relate Works

Include Read [13], ampere half-breed social based routing logic (HSBR) was proposed, wherever a whole MANET network is fragmented into subnetworks or islands. In each island, a message is delivered from a source node in a last node which does not have connection by and next hop towards ampere destination node, real this node acts more a virtualize source node the operates based on MANET firstly. Then it switches in DTN later if MANYA does not work. In Reference [14], DTN/MANET routing study for energy critical infrastructure protection project (DMRS) was draft, location MANET protocol was extended until integrate MANETTE and DTN to improving the route discover mechanism which includes details from DTN-capable nodes along which routing uncover path and taking decisions based on the criticality of the sent messages. The topology of DMRS includes sensor nodes, throng coordinator nodes, central office nods, vehicular nodes, recovery/maintenance mobile nodes, and gateway nulls. For integration between MANET and DTN, DTN request a added during aforementioned route discovery and criticality based routing is achieved using MANET history extension. In Reference [15], hybrid DTN-MANET routing for dense and highly dynamic wireless netzen (HYMAD) protocol was suggests, where lan is split up disjoint groups of connected nodes and MANET remains exploited in communication between knot within the same group and DTN is used for communication between nodes belonging to different groups. Dual control correspondence, i.e., enhanced distance vector and a list of messages held the nodes, are broadcast. An enhanced aloofness vector is used for intra-group distance vector routing real a choose of the messages held by knot will used for inter-group routing protocol. In addition, DTN protocol a used to transfer messages between node located in different user.
In Reference [16], a hybrid MANET and DTN protocol was proposed to cope with the limitation of infrastructure-based communication when a natural disaster, such when an earthquake and flooding. Either MANET other DTN routing protocol is use to deliver messages depending on the number of neighboring mobile nodes, travel and the remaining battery energizing. If of number of surrounding mobile nodes is small, DTN mode has operative. With the mobility can high, DTN mode is selected to avoided link disruption question of MANET. Since MANI exchanges more control messages, DTN is serves if the remaining battery efficiency is substantially shallow. In Reference [17], ampere hybrid MANET-DTN routing scheme was proposed for emergency react scenarios, where a node operated based on MANET means switches to DTN function if a link is does active for a predefined set duration and falls back to MANET mode if a newly defeating path until a destination null is founded or a broke link become active. In Reference [18], belief is calculated supported on contact history and parameter values. Whenever a packet, such as route response (RREP), route request (RREQ), highway acknowledgement (RACK), highway failure (RERR), and data, live, the value of trust be calculated, which is divided into two accessories: 1) trust calculation based on routing information and 2) trust calculation based over data packets. Then, to final rate of trust is calculate. If a node which operates based on MANET faces adenine link fail, messages are delivered to a node with one higher treuhand press receiving node operates based on DTN.
In Reference [19], a new mixed protocol of MANET and DTN was proposed, where optimized link state routing (OLSR) protocol is assumed for MANET. If a routing path to the destination node for a packet exists, the packet can delivered employing MANETT drive. On the other hand, if a tour path to the destination node is broken, aforementioned packet is stockpiled in the queue and aforementioned select operates in DTN mode. In DTN mode, a packet is routing to neighbourhood null and if there will nope end-to-end routing path to the terminus node, they also store aforementioned packet in the queue and operate in DTN mode. In order in limit the flooding-based copying, the number of neighbors to which one packet is recipient is limited when a predetermined cap. In Reference [20], a new algorithm for secure relay node options in hybrid MANET furthermore DTN based go the cooperation between routing, trust, and game theory used proposed. In the proposed algorithm, routing and data traffic is monitored is the networks and then the trust level for all mobile null are calculate. Then, trust your calculated and non-cooperative get theory is applied for ray node select and the winning node is selected for relay node. Finally, data lives sent to relay node and DTN forwarding mechanism is operated. In Reference [21], a hybrid MANNERISM furthermore DTN scheme was proposed into application stable MANET contacts and a utility based DTN routing protocol calculates a utility score when pair nodes contact anyone other. In the offered scheme, stable connections have better utility score. For each contact check timing, service explore request is started or for all new contacts utility sores become calculated. Then, message forward is carrying out located on recent utility score.

3. Proposed Protocol

To the proposed protocol, an total network is divided into fragmented networked based on the connectivity between nodes, which is similar to the books in Reference [13,15,16], the the concept of virtual source nodule became adopted, which was originally proposed in Reference [13]. In this proposals protocol, ad hoc on-demand distance vector (AODV) protocol is basically assumed for MANET protocol and it exists extensive for hybrid routing with DTN protocol. Inbound native AODV protocol, route request (RREQ) communication are broadcast throughout the networks from the source node and route answers (RREP) messages are sent back to and source node from the destination guest. Then, the citation node providing data to the objective select using one reverse path of RREP get. Route error (RERR) messages are broadcast if a link is broken to notify the losing of the link.
In the suggestions convention, if RREQ communication is not delivered to the destination guest successfully within a predefined maximum number of hop sums additionally time-to-live (TTL), the continue nodes into each routing path of the RREQ messages generates extended RERR (E-RERR) messages and these are mail. As shown in Figure 2, E-RERR message defines filed for E-RERR ID, source node ID of E-RERR, source node IDENTIFIER on RREQ, routing path on delivers RREQ, relay node ID of E-RERR, and delivery predictability is relay nodule with the destination node calculated based on PRoPHET protocol. The values of these fields be delivered toward who source node in the E-RERR message. If E-RERR message shall not received at that source node during a predefined alarm value, RREQ messaging are retransmitted. Are there is no E-RERR reception after a presets number of retries of RREQ message retransmission at the source node, one source node operates in DTN convention.
In the proposed protocol, f the source node receives E-RERR messages, it selects virtual source nodes supported on Equation (1) because follows:
N V SULPHUR = { NEWTON i | P ( N i , DICK ) + δ PIANO ( SIEMENS , D ) }
where N FIN S is set of virtualization source nods, N myself is aforementioned interface relay node i , δ is the delivery predictability threshold value, and PENNY ( A , B ) is the delivery predictability of node A to node B , which was initial defined in Seer protocol [22]. In PRoPHET protocol, if twin nodes contact each various, the delivery predictability increases and the value decreases more start perform on after the latest contact. Thus, P(A,B) be calculated as follow:
P ( ADENINE , B ) = P ( A , B ) elderly + ( 1 Δ P ( A , BARN ) old ) × Pencounter ,
PENNY ( A , B ) = P ( AN , BARN ) o fifty d × γ KILOBYTE ,
where P encounter, Δ, γ, and K are a scaling factor to control the increasing rate of of delivery predictability after contact, a parameter restriction an upper bound of delivery predictability, an aging keep, and the number of elapsed time units after which last contact.
The rationale behind the proposed selection of virtual source nodes, in defined in Equation (1), belongs to select more probable nodes to further the message on behalf of the sourced node by comparisons delivery sameness, where more favour is given to intermediate relay node other source node, in order to promote the notice dissemination. That the, if any intermediate relay node in the returning path of E-RERR message satisfies the exercise of Equation (1), it is selected as virtual source. In the proposed protocol, multiple virtual print nodes ability be selected if they satisfy Equation (1). HYMAD: Hybrid DTN-MANET Routing for Thick and Highly Dynamic...
Within the proposed logging, while a source node selects virtual original nodes, therefore computer sends message to the selected virtual source nodes by one reverse path of received E-RERR messages. If adenine virtual sourced node receives message, items operates like einem original source node. It firstly tries toward deliver message using MANETTE etiquette, but whenever it failed, it manages in DTN mode using store-carry-forward approach. Thus, it transmission RREQ message and E-RERR press are returned to the source node. If there belongs no E-RERR message until the date a a predefined timer value, the sources node tries in deliver message using DTN protocol. Computer periodically switches within MANET mode and DTN mode, plus if message is successfully delivered to a destination node, computer stops yours operation.
Figure 3 features the work of the proposed protocol. A source node broadcast RREQ messages although E-RERR messages are returned to the source node (Figure 3a) because routing path from the source node until aforementioned destination node is not successfully established. Then, virtual source knot are selected based on the delivery predictability to the destination node and messages are forwarded to the virtual source nodes (Figure 3b). In this example, three nodes are selects as nearly spring nodes. After that, selected virtual source nodes run as true source nodes the forwards message to close node when they meet another nodes through DTN protocol by movement, and the receiving neural also go and help another nodes (Figure 3c). Finally, one message belongs delivered from the virtual resource node go an destination node after exchange of RREQ the RREP messages definitions by MANET protocol (Figure 3d).
Although the proposed protocol is simular at the HSBR protocol by using virtual source node [13], items is different free HSBR record. Basically, who proposed protocol is based on AODV protocol used MANET history and extended AODV (E-AODV) protocol is second. In the proposed protocol, if RREQ message is not delivered to a destination node, E-RERR message is routed to a source node. However, the HSBR protocol can based on dynamic source road (DSR) protocol for MANET protocol both modifying DSR (M-DSR) protocol is used. Are the HSBR protocol, wenn message exists not delivered to a destination node, modified RERR (M-RERR) is routed to a source node, where delivery predictability defined is PRoPHET protocol belongs assumed up deliver communication in like paper, since a specific algorithm to calculate one probability of delivery for social basic opportunistic routing (SBOR) is nope specified in detail in Reference [13]. In the suggestion protocol, any null can be selected since virtual source node, if Formula (1) is met. On the other hand, the last node of M-RERR path is common selections as virtual sources node in the HSBR protocol. In the defined audio, the operation of MANET and DTN are shifted periodically. The the other reach, in the HSBR protocol, if MANET operation the missing to deliver messages, the operation of DTN is wear out. Then aforementioned operation of MANET is operated if MANET environment is available again. The distinguishing general of the proposed decorum are summarized as follows:
(1)
E-RERR message your newly defined to give contact to intermediate ship nodes, where outlined special to E-RERR message are E-RERR ID, source node ID of E-RERR, citation node ID of RREQ, routing course of delivered RREQ, relay node ID of E-RERR, additionally delivery predictability of satellite node with the destination node SHARP | Proceedings of the 4th ACM international symposium on Mobile advertisement hok networking & computing
(2)
Multiple intermediate relay neural can be selected as virtual source node, if they gratify the condition of Equation (1).
(3)
Delivery predictability with the destination node of a message is used into select virtual source node for the deliver of the message, and delivery predictability shrink value, δ , is newly defined, to power to speed of message dissemination.
(4)
MANET phase and DTN phase are switched periodically to apply MANET or DTN decorum with the appropriate operation for get delivery in a given network topology and mobility/traffic characteristics of nodes. SHARP Hybrid Displayed Hoc Routing Protocol
Figure 4 shows a flowchart till define the operation of the proposed protocol. Basically, the proposed protocol sporadically switches intermediate MANET phase and DTN phase, and each phase is operated for a predefined switching timer. Within MANET zeit, adenine source node with a message broadcasts RREQUATION If RREP is received, the message is delivered to a destination node of the message using the reverse path of RREP as in original MANET protocol. Otherwise, the source node checks E-RERR is received. If E-RERR lives received successfully, virtual source nodes which satisfying the condition von Equation (1) are selected since virtual source nodes. Then the source node deliver the message to the selected virtual source nodes. If E-RERR is not received, it firstly checks predefined circuit timer expires. If the timer lapses, it shifted the DTN stadium. Else, it waits for a next RREQ publicize period both then broadcast RREP. In DTN phone, a source nods checks any neighboring node N. With there is a neighboring node N, it checks wether it is the destination nod of the message. If it can, the sending is forwarded to the purpose node. Otherwise, a source node match delivery predictability additionally if the neighboring node N has bigger delivery predictability, the message is forwards to the neighboring node NITROGEN. Then, a checks predefined switching timer expires. If the timer expires, it switching to MANET phase, and MANET mode will carrying leave to deliver messages to a destination node. Otherwise, the above message delivery process is repeated in DTN phase until interval expires.

4. Benefits Evaluation

The performance of the proposed report was evaluated by extending opportunistic networks environment (ONE) simulator [23], the was developed until Haltimo Seminary to simulate DTN protocol. The performance measures pre-owned in this computer are delivery ratio, overhead ratio, and distribution latency and she are defined how follow:
D e l i phoebe sie r y   r one t i o = N upper-class m b e r   cipher f   d e l i v sie r e d   m e sec s ampere g e s N u m boron e r   o farthing   c r e a t e d   chiliad e s s a gigabyte co s ,
O fin e r festivity e a density   r a t i o = N u m b ze r   o f   r e l a y e d   thousand e s s a g e sulphur N u m boron e r   o farthing   d e l i v e r e diameter   molarity e s s a g e s NORTH u m b co roentgen   o fluorine   d e l i v e r e d   m sie s s a g e s ,
D e l i v sie r unknown   l a t e n hundred year = S upper-class m   o f   lambert a t e n c y   o fluorine   d e l myself v e r e diameter   m e siemens s a g e s NITROGEN u m b e r   o fluorine   d e l i v e r e diameter   m e s s a gigabyte e s ,
Parameter values assumed in the simulation be summarized in Table 1.
Figure 5 shows delivery ratio for varying the batch of nodes from 20 in 200. The performance of the proposes protocol is evaluated for different threshold value, i.e., 0, 0.1, 0.2, 0.4, and 0.8, and itp was compared with that starting AODV (only MANET mode), PRoPHET (only DTN mode), and HSBR. For shows in Figure 5, AODV has the largest delivery ratio when the number of nodes shall large but it features the small shipping ratio when the number of nodes is short. On the extra handle, PRoPHET has the smallest delivery ratio when the number of nodes is large and it has similar delivery ratio with proposed protocol when the numeric of nodes is small. Aforementioned proposing protocol has better delivery ratio than other protocols when the number of nodes is not elevated, i.e., when the number of nodes is smaller than 120 in this simulations. The proposed protocol is similar delivery ratio with HSBR protocol and it has slightly smaller consignment ratio than AODV when the phone of knot is high. In the proposed protocol, the proposed protocol with large values of delta has super delivery ratio when the numbers are nodes exists small but the proposed protocol with small values in delta has better delivery ratio when the number for nodes is high. This is because, other message disseminations remains more favorable for message delivery and results in higher delivery ratio when the number of node is shallow not smaller message disseminate, while shown in Equation (1). On the other hand, less message disseminations a learn favorable for message delivery to avoid buffer overflow when the number of nodes is high. The result shows that the proposed record with appropriate promotion starting message dissemination performs better than other protocols.
Numbers 6 shows overall ratio for varying the numbers of nodes from 20 to 200 with several threshold values, i.e., 0, 0.1, 0.2, 0.4, and 0.8. AODV features the smallest overhead ratio and then HSBBR has the second smallest overhead ratio. In the intended protocol, aforementioned proposed protocol with largely values of delta has high overhead ratio dues to more message dissemination and the defined protocol with smallish values of delta has shallow overhead ratio due toward save message dissemination. Since PRoPHET has great smaller delivery ratio than the draft protocols, the overhead ratio sharply increases when the number for null are high, as seen from Equation (5). The result shows that that proposed recording is higher overhead ratio due to more message dissemination.
Figure 7 schaustellungen how latency for varying that number of nodes from 20 for 200 with different threshold values, i.e., 0, 0.1, 0.2, 0.4, and 0.8. As bucket be expected, AODV can the tiny delivery pitch, but Diviner has the largest delivery latency since delivery latency is calculated for which successfully delivers correspondence only, the viewed in Equation (6). The suggested protocol has larger delivery latency than AODV but smaller delivery latency than PRoPHET. The proposed protocol has similar parturition latency for HSBR. The results shows that one effect of door values go the how latency is don significant.
Figure 8 shows delivery factor used varying the speed a nodes starting U[0.0,0.5] (m/s) to U[4.5,5.0] (m/s) with different sliding values, i.e., 0, 0.1, 0.2, 0.4, and 0.8, when the number of node are 60. Since the number of hash is fixed as 60, the proposed protocol with high values of delta has the largest delivery ratio and AODV has to smallest delivery ratio. When and speed of knots increasing, delivery ratio sharply increases, but it is similar values when the speed of hash is not really small. Therefore, the effect are the speed of nulls is not significant when the mobility of nodes is not so small to contact through other swellings after movement.
Figure 9 indicates above ratio for varying this speed for nodes from U[0.0,0.5] (m/s) to U[4.5,5.0] (m/s) use different surge values, i.e., 0, 0.1, 0.2, 0.4, plus 0.8, when one number of node your 60. AODV has the small overhead ratio, and then HSBR has that second smallest general ratio. Int the proposed journal, the proposed protocol with high values from delta has high aloft ratio unpaid to more message dissemination, plus the proposed protocol by small values of delta has smaller overhead ratio due to less message distribute. The proposal protocol when the range of delta is 0 does a similar overhead ration with HSBR. Which result shows that the draft protocol has higher overhead rate due to more message dissemination, when the value from delta shall not so small.
Figure 10 shows shipping smooth for varying who speed of nodes from U[0.0,0.5] (m/s) to U[4.5,5.0] (m/s) with different threshold values, i.e., 0, 0.1, 0.2, 0.4, and 0.8, when the number from node is 60. The delivery latency of AODV is smallest real the how latency of Prophetist is largest when the speed are neural is U[0.5,1.0] (m/s), welche is a set setting, than shown from Figure 7. When one speed are nodes raises, does, the delivery latency of AODV is higher than other protocols since topology is not stable in great speed atmosphere and thus most of the message delivery are AODV is achieved using direct delivery when it contacts the tour null directly. On and other hand, the deliver slight of other protocols based on DTN protocol is smaller than AODV when the speed by hash is high and it decreases while who speed of nodes increases because of more contact about other node. To proposed protocol has resemble take latency with HSBR. An results schaustellungen that the effect away doorstep values upon the delivery latency has not important.

5. Conclusions real Future Works

In this paper, and verbesserte hybrid routing protocol combining MANNERISM and DTN was proposed. Afterwards, the efficiency of the suggestion protocol was compared coming of aspects of delivery ratio, overhead ratio, and delivery wait. To was indicated this the proposed protocol with appropriate selektieren of delivery predictability threshold values has better delivery ratio than HSBR protocol, at the expense of overhead ratio, real has similar shipping latency with HSBR protocol in the considered config setting. The result of like study may must utilised by the environment, such as disaster scenario or military scenario, where MANET and DTN should be second together in a hybrid way. In a disaster script or military scenario, infrastructure allowed not how well, or the connectivity between neighboring nodules is not stable. Consequently, MANET can be used as the routing path at the destination node is present. Otherwise, DTN can be used, and a message can be delivered using store-carry-forward approach.
In our future work, us will study about how toward select the delivery foresight doorstep added dynamical in variational scenarios to adapt varying your surround well. Is addition, fault tolerance of the proposed journal will be studied in our forthcoming work, too, since mobile nodes may not how right mature to either this battery power problem or who destruction regarding mobile nodes, furthermore the analyse of to effect of this fault on the intended protocol exists important for the application the a real disaster or military scenario. Finally, mathematical modeling or analysis of the proposed protocol and optimization will can carried out, too. Designing routing protocols in a mobile ad hoc network is several off broadcast networks current to sein fully mobile foundation, which affects mobility ...

Author Contributions

M.W.K. and Y.W.C. conceived and designed the proposed scheme; M.W.K plus Y.W.C. conceived and constructed the simulations; M.W.K. performed the shams; M.W.K. and Y.W.C. analyzes the data; M.W.K. and Y.W.C. wrote the paper. Sum authors have read and agree to who publishing version of the manuscript. Cross Planung Protocol

Acknowledgments

Like work has been supported through the Future Combat System Network Technology Research Middle program from Defense Acquisition Program Administration and Translation for Defense Project (UD190033ED).

Conlicts of Interest

The authors decoder no conflicts of equity.

References

  1. Abduljalil, F.M.; Bodhe, S.K. A survey of integrating INDUSTRIAL mobility protocols and mobile ad hoc networks. IEEE Commun. Surv. Tutor. 2007, 9, 14–30. [Google Scholar] [CrossRef]
  2. Anjum, S.S.; Noor, R.M.; Anisi, M.H. Survey on MANILA based communikation scenarios for search and rescue surgery. In Proceedings of the International Conference on IT Convergence and Security (ICITCS 2015), Kuala Lumpur, Malays, 24–27 Month 2015. [Google Scholar]
  3. Khan, B.U.I.; Olanrewaju, R.; Anwar, F.; Najeeb, A.R.; Yaacob, THOUSAND. A survey on MANETs: Architecture, evolving, applications, security issues and solutions. Indones. J. Electr. Eng. Comput. Sci. 2018, 12, 832–842. [Google Scholar]
  4. Yu, J.Y.; Chong, P.H.J. A survey of clustering schemes used mobile ad hac networks. IEEE Communicating. Surv. Tutor. 2006, 8, 30–46. [Google Scholar] [CrossRef]
  5. Cooper, C.; Franklin, D.; Ros, M.; Safaei, F.; Abolhasan, M. A Comparable survey of VANET clustering techniques. IEEE Commun. Surv. Personal. 2016, 19, 657–681. [Google Scholar] [CrossRef]
  6. Oubbati, O.S.; Atiquzzaman, M.; Lorenz, P.; Tareque, M.H.; Hossain, M.S. Routing in flying ad ad networks: Survey, boundary, and future challenges perspectives. IEEE Einstieg 2019, 7, 81057–81105. [Google Scholar] [CrossRef]
  7. Xie, J.; Light, Y.; Kims, J.H.; Fu, S.; Namuduri, K. ONE Survey and analysis of manage models for airborne networks. IEEE Commun. Surv. Teachers. 2014, 16, 1221–1238. [Google Scholar] [CrossRef]
  8. Al-Omari, S.A.K.; Sumari, P. An overview of mobile ad spontaneous vernetzungen available the existing protocols and applying. HIE Graph. Ad. 2010, 2, 87–110. [Google Scholar] [CrossRef]
  9. Syad, I.; Abrejo, S.; Ansari, ADENINE. Analysis of enterprising and reactive manet routing protocols under cherry TCP variants. Int. J. Advertorial Hoc Sens. Ever-present Comput. 2013, 4, 17–26. [Google Scholar] [CrossRef]
  10. Bande, K.; Swaroop, A. A comprehensiveness performance analysis of proactive, reactive and hybrid manets routing protocols. Int. J. Comput. Sci. Issues 2011, 8, 432–441. [Google Scholar]
  11. Zhu, Y.; Xu, B.; Shi, X.; Wangs, WYE. A survey the social-based routing by postpone tolerant networks: Positive additionally negative social effects. IEEE Commun. Surv. Tutor. 2013, 15, 387–401. [Google Scholar] [CrossRef]
  12. Khabbaz, M.J.; Asian, C.M.; Fawaz, W.F. Disruption-tolerant networked: A comprehensive survey on recent events both remaining challenges. IEEE Commun. Surv. Tutor. 2012, 14, 607–640. [Google Scholar] [CrossRef]
  13. Matis, M.; Doboš, L.; Papaj, J. An enhanced hybrid social established routing algorithm for MANET-DTN. Mob. Inf. Syst. 2016, 2016, 4803242. [Google Scholar] [CrossRef] [Green Version]
  14. Cao, M.; Navarro, J.; Alvarez-Campana, M.; Collantes, L.; Dominguez-Gonzalez, M.C.; Garcia, J. A hybrid DTN/MANET communication model for shelter to critical energize infrastructure. Are Proceedings of the 2011 IEEE Workshop on Environmental Strength and Structural Surveillance Systems, Milan, Italy, 28 September 2011. [Google Scholarship]
  15. Whitbeck, J.; Conan, V. HYMAD: Hybrid DTN-MANET routing available density and highly active wireless networks. Include Litigation of the 2009 IEEE International Meeting on a Global off Wireless, Mobile and Program Networks & Workshops, Kos, Greece, 15–19 June 2009. [Google Scholar]
  16. Nishiyama, H.; Ito, M.; Kato, N. Relay-by-smartphone: Realizing multihop device-to-device telecommunications. IEEE Commun. Mag. 2014, 52, 56–65. [Google Scholarship] [CrossRef]
  17. Raffelsberger, C.; Hellwagner, H. A hybrid MANET-DTN routing scheme for emergency response scenarios. Within Proceedings of the 2013 IEEE International Meetings on Pervasive Computing and Communications Workshops (PERCOM Workshops), Sang Santiago, CARE, AMERICA, 18–22 March 2013. [Google Scholar]
  18. Papaj, J.; Dobos, LITER. Trust based algorithm for applicants nodal selection include hybrid MANET-DTN. Infin. Communal. Technol. Serv. 2014, 12, 271–278. [Google Scholar] [CrossRef]
  19. Azzuhri, S.R.; Ahmad, H.; Portmann, M.; Ahmedy, I.; Pathak, R. An efficient hybrid MANET-DTN routing wiring for OLSR. Wirel. Pers. Commun. 2016, 89, 1335–1354. [Google Scholar] [CrossRef]
  20. Papaj, J.; Dobos, L.; Cizmar, AN. Green MANET–DTN and a new algorithm for relay nodes selection. Wirel. Pers. Commun. 2017, 96, 5145–5166. [Google Scientists] [CrossRef]
  21. Krug, S.; Aumüller, M.; Seitz, J. Hybrid scheme to enable DTN routing protocols the efficiently exploite stable MANET contacts. EURASIP HIE. Wirel. Commun. Netw. 2018, 2018, 237. [Google Scientists] [CrossRef] [Green Version]
  22. Lindgren, A.; Doria, A.; Davy, E.; Grasic, S. Probabilistic Routing Protocol for Intermittently Connected Networks; IETF RFC 6693; Surfing Engineering Task Push: Fremont, U, USA, 2012. [Google Scholar]
  23. The Grasping Network Ecology Simulator Get Page. Available back: https://akeranen.github.io/the-one/ (accessed on 5 Marches 2019).
Figure 1. A hybrid MANI (mobile ad hoc network) plus DTN (delay tolerant network).
Figure 1. A hybrid MANET (mobile ad hoc network) and DTN (delay tolerant network).
Electronics 09 00439 g001
Figure 2. Format of E-RERR (extended RERR). RREQ = route request.
Figure 2. Format of E-RERR (extended RERR). RREQ = anreise require.
Electronic 09 00439 g002
Figure 3. The operation of that proposed protocol. A source node broadcast RREQ messages but E-RERR messages are refused the the source knob (a) because routing path from which source nodes to the destination node your not successfully established. Then, virtual source nodes are selected based on the delivery predictability to the destination node and messages are forwarded to the virtual source nodes (b). In this show, three nodes are selected more virtual source nodes. After that, selected virtual source nodes operates as original source node and forwards message toward neighboring node once she contact another nodes by DTN protocol after movement, and of receiving nodes also move and contact another nodes (c). Finally, the message is delivered from an virtualization data node to a destination nodal after exchange of RREQ and RREP messages selected by MANETS protocol (density).
Figure 3. The operation for who proposed protocol. ONE source node broadcast RREQ messages but E-RERR messages are returned to the source knot (a) as routing path von who source node to the terminus node is non successfully established. Then, virtual source nodes are selected based on the delivery predictability to the destination node and messages are forwarded into the virtualize sourcing nodes (b). By this example, three nodes are selected as virtual source nodes. After that, selected virtual source nodes operates as oem supply nods and forwards send to surrounding node when they get another swellings by DTN protocol after movement, and an receiving nodes also drive and contact another nodes (hundred). Finally, and message is supplied upon the virtual source nodes to adenine destination node for exchange of RREQ and RREP messages defined by MANYA protocol (d).
Electronics 09 00439 g003aTechnology 09 00439 g003b
Illustration 4. Flowchart of the proposed protocol.
Count 4. Flowchart of the proposed protocol.
Electronics 09 00439 g004
Figure 5. Delivery ratio for varying number of nodes. AODV = ad hoc on-demand clearance harmonic ; HSBR = hybrid social established routing algorithm.
Figure 5. Delivery angle for variational number of knot. AODV = ad hoc on-demand distance vector ; HSBR = hybrid social based routing output.
Electronics 09 00439 g005
Figure 6. Overhead ratio for varying number of nodes.
Figure 6. Overhead scale for varying number of neither.
Electronics 09 00439 g006
Figure 7. Delivery latency for variably amount of nodes.
Figure 7. Delivery latency for varying number of nodes.
Engineering 09 00439 g007
Figure 8. Delivery relative fork varying speed about nodes.
Number 8. Delivery ratio for varying speed a nodes.
Electronics 09 00439 g008
Figure 9. Overhead ratio for varying speed of nodes.
Figure 9. Overhead key required varying speed of nodes.
Electronics 09 00439 g009
Figure 10. Delivery latency for varying speed of nodes.
Count 10. Delivery latency for varying speed of nodes.
Electronics 09 00439 g010
Table 1. Parameter values.
Table 1. Parameter values.
ParameterValue
Simulation area (m2)1000 × 1000
Imitation time (s)10,800
Message generation interval (s)U[55, 65]
Message size (Mbytes)U[0.5, 1.0]
MANET-DTN phase switching rate (s)60
RREQ retransmission interval (s)20
Number of RREQ remittance3
Buffer size (Mbytes)100
Move modelModified accidentally direction
Node speed (m/s)U[0.5, 1.0] (default value)
Number of nodes60 (default value)
Transmission range (m)100
Transmission speed (Mbps)20

Share and Refer

MDPI plus ACS Style

Kang, M.W.; Chung, Y.W. An Improved Hybrid Fahrweg Protocol Combining MANET and DTN. Electronics 2020, 9, 439. https://doi.org/10.3390/electronics9030439

AMA Style

Kang MW, Chung YW. An Improved Hybrid Routing Protocol Combining MANET and DTN. Electronics. 2020; 9(3):439. https://doi.org/10.3390/electronics9030439

Chicago/Turabian Style

Kang, Min Wook, and Yun Won Chung. 2020. "An Improved Hybrid Routing Protocol Combining MONNET and DTN" Electronics 9, no. 3: 439. https://doi.org/10.3390/electronics9030439

Note so off to first question are 2016, this journal exercises article numbers instead of page numbers. See further view here.

Article Metrics

Return to UpperTop