Skip to main content

Advertisement

Log in

History and buffer rule based (forward chaining/data driven) intelligent system for storage level big data congestion handling in smart opportunistic network

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Delay tolerant networks (DTN’s) is the most growing application of wireless multi-hop networking under the umbrella of research done so far in sensor networks. Numerous challenges have to be faced by such networks; because of disconnection in terms of intermittent community, long delays etc in network due to drastic mobility. An intermediate node therefore interested to take custody of the transmission till subsequent notable appropriate is located toward destination. This study specializes on this key issue how selection as best custodian node in terms of storage capacity as mobile devices have limited storage capacity for the transmission to raise delivery of the packets with less drop rate. In this research a history and buffer based totally intelligent approach based expert gadgets has been added and validated and compared with existing MAXPROP protocol. Simulation outcomes shows proposed technique outperforms MAXPROP in overall over node, network and buffer level.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18

Similar content being viewed by others

References

  • Alrajeh NA, Lloret J (2013) Intrusion detection systems based on artificial intelligence techniques in wireless sensor networks. Int J Distrib Sens Netw. https://doi.org/10.1155/2013/351047

    Google Scholar 

  • Bahrepour M, Meratnia N, Havinga PJM (2009) Use of AI techniques for residential fire detection in wireless sensor networks. In: CEUR workshop Proceedings, vol 475, pp 311–321

  • Borah SJ, Dhurandher SK, Woungang I, Kumar V, Barolli L (2017) A multi-objectives based technique for optimized routing in opportunistic networks. J Ambient Intell Humaniz Comput 9(3):655–666. https://doi.org/10.1007/s12652-017-0462-z

    Article  Google Scholar 

  • Cuka M, Elmazi D, Bylykbashi K, Spaho E, ikeda M, Barolli L (2018) Implementation and performance evaluation of two fuzzy-based systems for selection of IoT devices in opportunistic networks. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-017-0676-0

    Google Scholar 

  • Engineering C, Pradesh A (2014) A study of opportunistic networks for efficient ubiquitous computing. Int J Adv Res Comput Commun Eng 3(1):5187–5191 (1132–1138, 2014)

    Google Scholar 

  • George S, Patel S (2014) Congestion avoidance in mobile ad-hoc networks, through cooperative AODV routing. Int J Comput Sci Inf Technol Res 2(2):348–353

    Google Scholar 

  • Haigh K, Partridge C (2011) Can artificial intelligence meet the cognitive networking. http://www-2.cs.cmu.edu/~khaigh/2011-haigh-EURASIP-JWCN.pdf. Accessed 10 May 2015

  • Islam RU, Andersson K, Hossain MS (2015) A web based belief rule based expert system to predict flood. In: Proceedings of the 17th international conference on information integration and web-based applications and services—iiWAS’15, 1–8 Dec. https://doi.org/10.1145/2837185.2837212

  • Keränen A (2009) The ONE simulator for DTN protocol evaluation. In: Proceedings of the second international ICST conference on simulation tools and techniques, p 55

  • Khalid RA, Jassim RO (2014) Expert system to troubleshoot the wireless connection problems. Int J Comput Sci Eng Technol 4(8), 238–241

    Google Scholar 

  • Kumar CRP, Kumar BU, Rao VM, Kaladhar D (2013) Prediction of effective mobile wireless network data profiling using data mining approaches. J Algorithms Res 2(1), 18–23. https://doi.org/10.5923/j.algorithms.20130201.03

    Google Scholar 

  • Lakkakorpi J, Pitkänen M, Ott J (2010) Adaptive routing in mobile opportunistic networks. In: Proceedings of the 13th ACM international conference on modeling, analysis and simulation of wireless and mobile systems, pp 101–109

  • Lan K, Huang CM, Tsai CZ (2008) A survey of opportunistic networks. In: 22nd international conference advanced information networking and applications—workshops. IEEE, pp 1672–1677

  • Madigan D, Ju W (2006) Location estimation in wireless networks: a bayesian approach. Statistica 16:495–522. http://etd.auburn.edu:8080/etd/handle/10415/494%5Cn. http://www3.stat.sinica.edu.tw/statistica/oldpdf/A16n210.pdf. Accessed 20 June 2015

  • Ming Y, Hsueh CC (2016) Data mining of bayesian networks to select fusion nodes from wireless sensor networks. Int J Comput Sci Issues 13(4):11–15. https://doi.org/10.20943/01201604.1115

    Article  Google Scholar 

  • Pan D, Ruan Z, Zhou N, Liu X, Song Z (2013) A comprehensive-integrated buffer management strategy for opportunistic networks. EURASIP J Wirel Commun Netw 1:103

    Article  Google Scholar 

  • Prerna, Bandana S (2014) effective flow count mechanism for congestion control avoidance. Int J Emerg Res Manag Technol 3(6):34–40

    Google Scholar 

  • Quer G, Meenakshisundaram H, Tamma BR, Manoj BS, Rao R, Zorzi M (2010) Using Bayesian networks for cognitive control of multi-hop wireless networks. U.S. Army Research Office, Grant. No. W911NF-09-1-0456 and by UCSDCWC (Center for Wireless Communications). In: The 2010 Military Communications Conference - Unclassified Program - Networking Protocols and Performance Track. pp 201–206. http://www.studioquer.it/giorgio/content/milcom10.pdf

  • Radenkovic M, Grundy A (2011) Framework for utility driven congestion control in delay tolerant opportunistic networks. In: 2011 7th international wireless communications and mobile computing conference, pp 448–454, July 2011

  • Rana S, Pundir V, Singh RS, Yadav D (2012) Congestion control in mobile ad-hoc networks. Int J Sci Res Eng Technol 1(5):194–198

    Google Scholar 

  • Samy SAN, Wadee WA,Mostafa FA (2016) Rule Based System for Diagnosing Wireless Connection Problems Using SL5 Object. Inf Technol Electr Eng 05(06):26–33. Retrieved 15 July 2018, from http://www.iteejournal.org/Download_dec16_pdf_5.pdf

  • Sangeetha M, Sabari A (2018) Genetic optimization of hybrid clustering algorithm in mobile wireless sensor networks. Sens Rev 38(4):526–533. https://doi.org/10.1108/SR-08-2017-0149

    Article  Google Scholar 

  • Serpen G, Li J, Liu L (2013) AI-WSN: Adaptive and intelligent wireless sensor network. Proc Comput Sci 20:406–413. https://doi.org/10.1016/j.procs.2013.09.294

    Article  Google Scholar 

  • Sharma DK, Kukreja D, Chugh S, Kumaram S (2018) Supernode routing: a grid based message passing scheme for sparse opportunistic networks. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-018-0993-y

    Google Scholar 

  • Soelistijanto B, Howarth MP (2013) Transfer reliability and congestion control strategies in opportunistic networks: a survey. IEEE Commun Surv Tutor 16(1):538–555

    Article  Google Scholar 

  • Sreenivasa BC, Bhanuprakash BC, Ramakrishnan KV (2011) A survey on congestion control techniques in AD-HOC network. Elixir Adoc.Net. 32:2061–2067

    Google Scholar 

  • Subburam S (2012) Predictive congestion control mechanism for MANET. Indian J Comput Sci Eng 3(5):640–651

    Google Scholar 

  • Yahaya B (2015) Congestion control strategies on integrated routing protocol for the opportunistic network: a comparative study and performance analysis. J Comput Appl 117(4):5–10

    Google Scholar 

Download references

Acknowledgements

This work could not be possible without the help of almighty God first and then BUITEMS as my parent affiliated organization, where I am serving as Assistant Professor. It’s provides me an opportunity to accomplish my higher studies and conducting this research contribution successfully without their support it would not be possible indeed.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ahthasham Sajid.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sajid, A., Hussain, K., Shah, S.B.H. et al. History and buffer rule based (forward chaining/data driven) intelligent system for storage level big data congestion handling in smart opportunistic network. J Ambient Intell Human Comput 10, 2895–2905 (2019). https://doi.org/10.1007/s12652-018-1030-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-018-1030-x

Keywords

Navigation