Survey of Acknowledgement based Vector Routing for Opportunistic Networks
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 5
Abstract
Opportunistic networks are one of the most challenging area of interest MANETs. Here nodes communicate with each other when they get opportunity because path joining two mobile nodes never exists. Again nodes do not contain any knowledge about the network terminology. If they want to deliver message to the destination the routes are built dynamically furthermore, nodes are not having or possess any knowledge about the network terminology and any intermediate node selected as a next hop which brings the message closer up to the destination. These requirements make opportunistic networks most interesting evolutions of MANETs & challenging and promising research field. In this paper we describe composite approach for routing in opportunistic networks, considering traditional different routing protocols unable to deliver messages between hosts. Thus, there is a need for a path to route from source to destination through such networks. We propose composite approach which combines Epidemic Routing and Probabilistic Routing approaches together. When two hosts come into contact of one another, they exchange their summary vectors to determine which messages stored remotely have not been seen by the local host. In turn, each host then requests copies of messages that it has not yet seen. When message reaches to destination, acknowledgment is sent in the same manner to the sender of the message.
Authors and Affiliations
Mr. Prashant Rewagad*1
A REVIEW ON SKEW DETECTION AND CORRECTION IN A TEXT DOCUMENT IMAGE
Document image processing has become an increasingly important technology in the automation of office documentation tasks. Automatic document scanners such as text readers and OCR (Optical Character Recognition)...
DEVELOPMENT OF DATA LOGGER FOR MAV USING FREE RTOS ON PIC32
In this paper integration of Micro Electro-Mechanical Systems (MEMS) based Inertial Measurement Unit (IMU), Magnetometer, Global Positioning System (GPS) and Pressure sensors for data logging using PIC32 is propos...
A REVIEW ON VARIOUS TECHNIQUES OF STEGAN OGRAPHY TO HIDE THE DATA INTO DIGITAL IM AGES
Steganography could be a technique of concealing secret messages in a very cowl object whereas communication takes place between sender and receiver. Security of wind has forever been a serious issue from the interests...
Geological CO2 Monitoring Methods: A Review
This review paper discusses various methods of monitoring of atmospheric geological CO2. The report presents a detailed description of the technologies that can measure CO2 leakage from potential point or diffuse source...
Design Optimization of Stationary Platen of Plastic Injection Molding Machine Using FEA
Plastic are certainly most versatile of all known materials today and have therefore, established themselves in enviable position from where are not even possible to replaced. Injection molding machine is one of t...