Beruflich Dokumente
Kultur Dokumente
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 46
Abstract—Network architectures like TCPIP, AODV, OSPF perform communication in environments where end-to-end path must exist be-
fore the start of transmission and is not devisable in most of advanced wireless applications for example military networks , vehicular ad hoc
networks, pocket switched networks, deep space communication. Delay Tolerance network (DTN) build communication infrastructure
through intermittently connected mobile nodes where each node store the message in its buffer, carries the message while moving and for-
ward it when encounter with other nodes. To maximize the delivery probability, a node while moving replicate message copies to all encoun-
ters nodes. This iterative replication and storage of message produce congestion which is override by dropping message(s). An efficient buf-
fer management policy to improve quality of service is required to decide which message will be dropped, when buffer run out of its capaci-
ty.In this paper we proposed a new buffer management policy which drops the message from congested buffer only if size of existing queued
message(s) falls in Threashhold range (T).This technique is called as T-Drop. We prove through simulations that propose T-Drop policy mi-
nimize the message drop, hop count average, overhead while increase the delivery probability as compared to existing DOA.
Index Terms — Algorithms. Network communication, Routing protocols, Store and forward networks.
—————————— ——————————
1 INTRODUCTION
2.5 N-Drop
In N-Dropt [9], the message that does N number of for-
warding will be selected to drop.
5 APPROACH
Check available buffer space
Fig 3 depicts the snapshot of epidemic routing protocol
for each message M in MRi
under congested DOA queue mode where nodes B has
Bui = getsize (M)+Bui;
transmited its summery vector SVB to node A. Node A
end loop;
then send request summery vector SVR to node B for
BAi = Bi ‐ Bui
transmission of missing packets as eq(1).
if SMN (source or Relay) < BAi THEN
ADD (MRiBAi, MN)
SVR = M8, M21, M32, M43, M76, M90
return true; //Message successfully store in buffer
end if;
// If SMN > BAi drop some message to make room for
While (SMN >BAi)
begin
//function call to drop threashhold message
T_M = SearchThreashHold ();
If T_M is null then
Fig 3 Messge drop with DOA
Return false; // no drop
end if;
)
DropMessage (T_M))
Nodes B first transmit the message M8 to node A. In or-
BAi = sizeof (T_M) +BAi;
der to accommodate M8, Node A will drop (M1, M2, M3)
End loop;
resulting more drop and raise overhead.
ADD(MRBAi, MN)
return true;//message stored in buffer
Figure 4 depicts the drop of message with T drop (Thre-
end while;
shold drop), where the message will be dropped only if
end; //end of method
its size fall with in a range of threshold.
int SearchThreashhold()
begin
for each message M in MR
if Size of(M ) between T
T_M = M;
retrun T_M; //return message;
end if
Fig 4 Message drop with T-Drop
end loop;
return null; // no threashhold message found
When Node B transmits the message M8, node A will
end;//end of method
check its queue for available buffer space. As we can see
that the queue of Node A is congested and it needs to
drop a message. Assume the range of threshold T is be-
tween 400kb and 900kb therefore node A will not drop
any message. This technique give high buffer time to
small messages results in less message drop ,overhead, 6 SIMULATION AND RESULTS
hop count with high delivery probability and buffer time All the experiments were performed using ONE Simula-
average and improve protocols in term of QOS. tor. The ONE [16] Simulator is a discrete event simulator
written in Java. The main objective of simulator is to im-
4.5 Algorithm plement DTN (store-carry-forward) of message for long
TABLE 1 time, where the probability of disconnections and failures
VARIABLE AND MEANINGS is very high.
JOURNAL OF COMPUTING, VOLUME 2, ISSUE 10, OCTOBER 2010, ISSN 2151-9617
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 49
In fig 7 we conclude the effect of drop messages with T- Fig 7 Buffer time average with respect to time
Drop and existing DOA under epidemic and prophet
routing protocols. In order to increase the accuracy we
have perform the simulation for different time spans. We In fig 9 we have observe the occupancy of message buffer
can see that proposed T-Drop policy reduce the message time by executing simulation at different time lengths
drop to a huge extent and by increasing simulation time it with existing FIFO and proposed T-drop. We can see with
is getting better. We can examine that FIFO policy cased proposed T-Drop policy messages stay in the buffer for
higher drops while additional loss is consumption of re- long time. This storage of message and prevention against
sources gained by the dropped message during its mobili- drop makes most of messages to be delivered to destina-
ty. T-Drop has control this ambiguity by defining a tion i.e high delivery probability as proved in fig 8.
Threashhold value, if queue is congested only threash-
hold message will be dropped otherwise no drop will
occur.