Packet-Forwarding Algorithm in DTN Based on the Pheromone of Destination Node
نویسندگان
چکیده
The pheromone can be used for target tracking and, consequently, for packet forwarding to the destination node in delay-tolerant networking. In this study, an initiative community model is proposed by simulating pheromone production and diffusion, which contains all of the nodes that can receive the core node pheromone. We can set the distance of the edge node to the core to be less than five hops by establishing the appropriate spread coefficientω. Packet forwarding is then converted into the process of tracing the pheromone of the destination node. A set of simulation results shows that the proposed initiative community model can effectively increase the delivery ratio and reduce delay when the community structure is relatively stable.
منابع مشابه
Energy-Aware Probabilistic Epidemic Forwarding Method in Heterogeneous Delay Tolerant Networks
Due to the increasing use of wireless communications, infrastructure-less networks such as Delay Tolerant Networks (DTNs) should be highly considered. DTN is most suitable where there is an intermittent connection between communicating nodes such as wireless mobile ad hoc network nodes. In general, a message sending node in DTN copies the message and transmits it to nodes which it encounters. A...
متن کاملHybrid Geographic and Contact-Based Forwarding in Delay-Tolerant Networks
Delay Tolerant Network(DTN) is a wireless network in which there will be no connectivity exists between source and destination in a given time. Due to the absence of fully connected path between the source and destination, there will be a problem to route a packet from one node to another in DTN .Similarity based techniques relying on contact patterns among nodes provide routing in DTN provides...
متن کاملIsolating Packet Dropping Misbehavior in VANET using Ant Colony Optimization
Vehicular Ad Hoc Networks (VANETs) are special type of decentralized wireless networks among the various mobile nodes. In VANET decision of forwarding the data packets from one node to other node is dynamic and based on the network connectivity. So efficient, optimized and secure techniques are required for secure transmission of data packets and tracking the changing topology of the network. W...
متن کاملEnergy Efficiency and Reliability in Underwater Wireless Sensor Networks Using Cuckoo Optimizer Algorithm
Energy efficiency and reliability are widely understood to be one of the dominant considerations for Underwater Wireless Sensor Networks (UWSNs). In this paper, in order to maintain energy efficiency and reliability in a UWSN, Cuckoo Optimization Algorithm (COA) is adopted that is a combination of three techniques of geo-routing, multi-path routing, and Duty-Cycle mechanism. In the proposed alg...
متن کاملبهبود پروتکل AODV جهت مقابله با حملات کرمچاله در شبکههای اقتضایی
Mobile Ad hoc Networks (MANET) are vulnerable to both active and passive attacks. The wormhole attack is one of the most severe security attacks in wireless ad hoc networks, an attack that can be mounted on a wide range of wireless network protocols without compromising any cryptographic quantity or network node. In Wormhole attacks, one malicious node tunnels packets from its location to the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Information
دوره 7 شماره
صفحات -
تاریخ انتشار 2016