Abstract
Delay tolerant networks (DTN’s) is the most growing application of wireless multi-hop networking under the umbrella of research done so far in sensor networks. Numerous challenges have to be faced by such networks; because of disconnection in terms of intermittent community, long delays etc in network due to drastic mobility. An intermediate node therefore interested to take custody of the transmission till subsequent notable appropriate is located toward destination. This study specializes on this key issue how selection as best custodian node in terms of storage capacity as mobile devices have limited storage capacity for the transmission to raise delivery of the packets with less drop rate. In this research a history and buffer based totally intelligent approach based expert gadgets has been added and validated and compared with existing MAXPROP protocol. Simulation outcomes shows proposed technique outperforms MAXPROP in overall over node, network and buffer level.
Similar content being viewed by others
References
Alrajeh NA, Lloret J (2013) Intrusion detection systems based on artificial intelligence techniques in wireless sensor networks. Int J Distrib Sens Netw. https://doi.org/10.1155/2013/351047
Bahrepour M, Meratnia N, Havinga PJM (2009) Use of AI techniques for residential fire detection in wireless sensor networks. In: CEUR workshop Proceedings, vol 475, pp 311–321
Borah SJ, Dhurandher SK, Woungang I, Kumar V, Barolli L (2017) A multi-objectives based technique for optimized routing in opportunistic networks. J Ambient Intell Humaniz Comput 9(3):655–666. https://doi.org/10.1007/s12652-017-0462-z
Cuka M, Elmazi D, Bylykbashi K, Spaho E, ikeda M, Barolli L (2018) Implementation and performance evaluation of two fuzzy-based systems for selection of IoT devices in opportunistic networks. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-017-0676-0
Engineering C, Pradesh A (2014) A study of opportunistic networks for efficient ubiquitous computing. Int J Adv Res Comput Commun Eng 3(1):5187–5191 (1132–1138, 2014)
George S, Patel S (2014) Congestion avoidance in mobile ad-hoc networks, through cooperative AODV routing. Int J Comput Sci Inf Technol Res 2(2):348–353
Haigh K, Partridge C (2011) Can artificial intelligence meet the cognitive networking. http://www-2.cs.cmu.edu/~khaigh/2011-haigh-EURASIP-JWCN.pdf. Accessed 10 May 2015
Islam RU, Andersson K, Hossain MS (2015) A web based belief rule based expert system to predict flood. In: Proceedings of the 17th international conference on information integration and web-based applications and services—iiWAS’15, 1–8 Dec. https://doi.org/10.1145/2837185.2837212
Keränen A (2009) The ONE simulator for DTN protocol evaluation. In: Proceedings of the second international ICST conference on simulation tools and techniques, p 55
Khalid RA, Jassim RO (2014) Expert system to troubleshoot the wireless connection problems. Int J Comput Sci Eng Technol 4(8), 238–241
Kumar CRP, Kumar BU, Rao VM, Kaladhar D (2013) Prediction of effective mobile wireless network data profiling using data mining approaches. J Algorithms Res 2(1), 18–23. https://doi.org/10.5923/j.algorithms.20130201.03
Lakkakorpi J, Pitkänen M, Ott J (2010) Adaptive routing in mobile opportunistic networks. In: Proceedings of the 13th ACM international conference on modeling, analysis and simulation of wireless and mobile systems, pp 101–109
Lan K, Huang CM, Tsai CZ (2008) A survey of opportunistic networks. In: 22nd international conference advanced information networking and applications—workshops. IEEE, pp 1672–1677
Madigan D, Ju W (2006) Location estimation in wireless networks: a bayesian approach. Statistica 16:495–522. http://etd.auburn.edu:8080/etd/handle/10415/494%5Cn. http://www3.stat.sinica.edu.tw/statistica/oldpdf/A16n210.pdf. Accessed 20 June 2015
Ming Y, Hsueh CC (2016) Data mining of bayesian networks to select fusion nodes from wireless sensor networks. Int J Comput Sci Issues 13(4):11–15. https://doi.org/10.20943/01201604.1115
Pan D, Ruan Z, Zhou N, Liu X, Song Z (2013) A comprehensive-integrated buffer management strategy for opportunistic networks. EURASIP J Wirel Commun Netw 1:103
Prerna, Bandana S (2014) effective flow count mechanism for congestion control avoidance. Int J Emerg Res Manag Technol 3(6):34–40
Quer G, Meenakshisundaram H, Tamma BR, Manoj BS, Rao R, Zorzi M (2010) Using Bayesian networks for cognitive control of multi-hop wireless networks. U.S. Army Research Office, Grant. No. W911NF-09-1-0456 and by UCSDCWC (Center for Wireless Communications). In: The 2010 Military Communications Conference - Unclassified Program - Networking Protocols and Performance Track. pp 201–206. http://www.studioquer.it/giorgio/content/milcom10.pdf
Radenkovic M, Grundy A (2011) Framework for utility driven congestion control in delay tolerant opportunistic networks. In: 2011 7th international wireless communications and mobile computing conference, pp 448–454, July 2011
Rana S, Pundir V, Singh RS, Yadav D (2012) Congestion control in mobile ad-hoc networks. Int J Sci Res Eng Technol 1(5):194–198
Samy SAN, Wadee WA,Mostafa FA (2016) Rule Based System for Diagnosing Wireless Connection Problems Using SL5 Object. Inf Technol Electr Eng 05(06):26–33. Retrieved 15 July 2018, from http://www.iteejournal.org/Download_dec16_pdf_5.pdf
Sangeetha M, Sabari A (2018) Genetic optimization of hybrid clustering algorithm in mobile wireless sensor networks. Sens Rev 38(4):526–533. https://doi.org/10.1108/SR-08-2017-0149
Serpen G, Li J, Liu L (2013) AI-WSN: Adaptive and intelligent wireless sensor network. Proc Comput Sci 20:406–413. https://doi.org/10.1016/j.procs.2013.09.294
Sharma DK, Kukreja D, Chugh S, Kumaram S (2018) Supernode routing: a grid based message passing scheme for sparse opportunistic networks. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-018-0993-y
Soelistijanto B, Howarth MP (2013) Transfer reliability and congestion control strategies in opportunistic networks: a survey. IEEE Commun Surv Tutor 16(1):538–555
Sreenivasa BC, Bhanuprakash BC, Ramakrishnan KV (2011) A survey on congestion control techniques in AD-HOC network. Elixir Adoc.Net. 32:2061–2067
Subburam S (2012) Predictive congestion control mechanism for MANET. Indian J Comput Sci Eng 3(5):640–651
Yahaya B (2015) Congestion control strategies on integrated routing protocol for the opportunistic network: a comparative study and performance analysis. J Comput Appl 117(4):5–10
Acknowledgements
This work could not be possible without the help of almighty God first and then BUITEMS as my parent affiliated organization, where I am serving as Assistant Professor. It’s provides me an opportunity to accomplish my higher studies and conducting this research contribution successfully without their support it would not be possible indeed.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Sajid, A., Hussain, K., Shah, S.B.H. et al. History and buffer rule based (forward chaining/data driven) intelligent system for storage level big data congestion handling in smart opportunistic network. J Ambient Intell Human Comput 10, 2895–2905 (2019). https://doi.org/10.1007/s12652-018-1030-x
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-018-1030-x