Skip to main content

Mobility Models-Based Performance Evaluation of the History Based Prediction for Routing Protocol for Infrastructure-Less Opportunistic Networks

  • Conference paper
  • First Online:
Mobile and Ubiquitous Systems: Computing, Networking, and Services (MobiQuitous 2013)

Abstract

In Opportunistic Networks (OppNets), the sender and receiver of a packet are not assumed to be connected with each other through an end-to-end continuous path. They exploit the contact opportunity that arises between the nodes due to their mobility to pass the messages from one place to another in the network. They do not rely on any pre-existing topology; rather they belong to a dynamic network topology. In this paper, the performance of our recently proposed History-Based Prediction for Routing protocol for infrastructure-less OppNets (so-called HBPR) is evaluated on two different mobility models – the Random Waypoint (RWP) and the Custom Human Mobility Model (CHMM). The HBPR protocol is evaluated against four performance metrics, namely, the number of messages delivered, the overhead ratio, the average hop count, and the average latency. Simulation results show a significant decline in the performance of HBPR for the RWP model compared to the CHMM model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Lilien, L., Kamal, Z.H., Bhuse, V., Gupta, A.: Opportunistic networks: the concept and research challenges in privacy and security. In: Proceedings of NSF International Workshop on Research Challenges in Security and Privacy for Mobile and Wireless Networks (WSPWN 2006), Miami, pp. 134–147, March 2006

    Google Scholar 

  2. Fall, K.: A delay-tolerant network architecture for challenged internets. In: Proceedings of ACM SIGCOMM 2003, Karlsruhe, Germany, pp. 27–34, 25–29 August 2003

    Google Scholar 

  3. Toh, C.-K.: Ad Hoc Mobile Wireless Networks: Protocols and Systems. Prentice Hall PTR, Englewood Cliffs, ISBN: 0-13-007817-4 (2002)

    Google Scholar 

  4. Perkins, C.E., Belding-Royer, E.M., Das, S.: Ad hoc on demand distance vector (AODV) routing. IETF, RFC 3561, July 2003

    Google Scholar 

  5. Johnson, D., Maltz, D.: Dynamic source routing. In: Imielinski, T., Korth, H. (eds.) Mobile Computing, vol. 353, Chap. 5, pp. 153–181. Kluwer Academic Publishers, Dordrecht (1996)

    Google Scholar 

  6. Dhurandher, S.K., Sharma, D.K., Woungang, I., Chao, H.-C.: Performance evaluation of various routing protocols in opportunistic networks. In: Proceedings of IEEE GLOBECOM Workshop 2011, Houston, TX, USA, pp. 1067–1071, 5–9 December 2011

    Google Scholar 

  7. Huang, C.-M., Lan, K.-C., Tsai, C.-Z.: A survey of opportunistic networks. In: Proceedings of the 22nd International Conference on Advanced Information Networking and Applications Workshops (AINAW 2008), Okinawa, Japan, pp. 1672–1677, 25–28 March 2008

    Google Scholar 

  8. Pelusi, L., Passarella, A., Conti, M.: Opportunistic networking: data forwarding in disconnected mobile ad hoc networks. IEEE Commun. Mag. 44(11), 134–141 (2006)

    Article  Google Scholar 

  9. Dhurandher, S.K., Sharma, D.K., Woungang, I., Bhati, S.: HBPR: history based prediction for routing in infrastructure-less opportunistic networks. In: Proceedings of 27th IEEE International Conference on Advanced Information Networking and Applications (AINA-2013), Barcelona, Spain, pp. 931–936, 25–28 March 2013

    Google Scholar 

  10. Camp, T., Boleng, J., Davies, V.: A survey of mobility models for ad hoc network research. Wirel. Commun. Mob. Comput. (WCMC) (Special Issue on Mobile Ad Hoc Networking: Research, Trends and Applications) 2(5), 483–502 (2002)

    Google Scholar 

  11. Ross, S.M.: Introduction to Probability Models. Academic Press, New York, ISBN-10: 0123756863 (1985)

    Google Scholar 

  12. Song, C., Qu, Z., Blumm, N., Barabasi, A.: Limits of predictability in human mobility. Science 327(5968), 1018–1021 (2010). doi:10.1126/science.1177170

    Article  MathSciNet  MATH  Google Scholar 

  13. Keranen, A.: Opportunistic network environment simulator. Special Assignment Report, Helsinki University of Technology, Department of Communications and Networking, May 2008

    Google Scholar 

Download references

Acknowledgment

This work was supported in part by a grant from the Natural Sciences and Engineering Research Council of Canada (NSERC) held by the third author, under Ref# RGPIN/293233-2011.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Isaac Woungang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Dhurandher, S.K., Sharma, D.K., Woungang, I. (2014). Mobility Models-Based Performance Evaluation of the History Based Prediction for Routing Protocol for Infrastructure-Less Opportunistic Networks. In: Stojmenovic, I., Cheng, Z., Guo, S. (eds) Mobile and Ubiquitous Systems: Computing, Networking, and Services. MobiQuitous 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 131. Springer, Cham. https://doi.org/10.1007/978-3-319-11569-6_66

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-11569-6_66

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-11568-9

  • Online ISBN: 978-3-319-11569-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics