Analysis and evaluation of probabilistic routing protocol for intermittently connected network
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 9, Issue 1
Abstract
Intermittently connected network often referred to as Delay/Disruption Tolerant Network which is an infrastructure less network suffers from intermittent connection i.e. a connected path from the source to the destination may be absent or a given destination may not be reachable at the moment a message is sent. As a result traditional routing protocols for Ad hoc networks cannot serve the purpose of this type of intermittently connected network. PROPHET routing protocol works on the principle of history of encounters and transitivity. It is called Probabilistic routing protocol since it uses a parameter ‘Delivery of Predictability’. In this paper the architecture of delay tolerant network is being discussed and PROPHET protocol is implemented
Authors and Affiliations
Jahnabi Borah
Survey on Restful Web Services Using Open Authorization (Oauth)
Web services are application based programming interfaces (API) or web APIs that are accessed through Hypertext Transfer Protocol (HTTP) to execute on a remote system hosting the requested services. A RESTF...
Assessing Buffering with Scheduling Schemes in a QoS Internet Router
A key requirement for service differentiation as required in Internet of the future and QoS to work effectively is the extension of traffic management routines of the current TCP/IP protocol. Two among of such &n...
Adaptive Personalized Web Search with Safety Seclusion
Abstract: The Comprehensive research demonstrations the competence of our framework. We additionally give an online expectation component to choosing whether customizing a query is beneficial. Personalized web search (PW...
Implementing High Performance Retrieval Process by Max-Score Ranking
This paper presents a comparison report of two different processes of retrieving a keyword or data’s from a given database or from a multiple databases. The process1 known as Extended Boolean Retrieval (EBR)model...
Buffer Overflow Attack
- Exploits, vulnerabilities, and buffer-overflow techniques have been used by malicious hackers and virus writers for a long time. In order to attack and get the remote root privilege, using buffer overflow and...