Analysis and evaluation of probabilistic routing protocol for intermittently connected network
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 9, Issue 1
Abstract
Intermittently connected network often referred to as Delay/Disruption Tolerant Network which is an infrastructure less network suffers from intermittent connection i.e. a connected path from the source to the destination may be absent or a given destination may not be reachable at the moment a message is sent. As a result traditional routing protocols for Ad hoc networks cannot serve the purpose of this type of intermittently connected network. PROPHET routing protocol works on the principle of history of encounters and transitivity. It is called Probabilistic routing protocol since it uses a parameter ‘Delivery of Predictability’. In this paper the architecture of delay tolerant network is being discussed and PROPHET protocol is implemented
Authors and Affiliations
Jahnabi Borah
Automatic Detection of Non-Proliferative Diabetic Retinopathy Using Fundus Images
Abstract: To diagnosis of Diabetic Retinopathy (DR) it is the prime cause of blindness in the working age population of the world. Detection method is proposed to detect dark or red lesions such as microaneurysms a...
Object Detection & Tracking in Moving Background Under Different Environmental Conditions
Abstract: Object detection and tracking has been a widely studied research problem in recent years. Currently system architectures are service oriented i.e. they offer number of services. All such common services are gro...
An Analysis of VANET Topology Based Routing Approach on Various Parameters
Abstract: Vehicular ad hoc network (VANET) is a peculiar subclass of mobile ad-hoc network (MANET) that has the potential in improving road safety and in providing travellers comfort. Currently it has gained an imp...
Enhancement of Dynamic Load Balancing Using Particle Swarm Algorithm in Cloud Environment
Abstract: Dynamic load balancing with decentralized load balancer using PSO technique: Cloud consists of multiple resources and various clients request to the cloud for allocation of shared resources. Each request will b...
Image Based Authentication for Folder Security using Persuasive Cued Click-Points and SHA
Abstract: In this paper Image Based Authentication application is applied on folder’s (folders that are confidential to user) ,since the studies till date have shown that textual passwords are more prone that the...