19
Views
3
CrossRef citations to date
0
Altmetric
Original Articles

Relative study of steering protocols in delay tolerant network

, &

References

  • Cao, Yue, and Zhili Sun. “Routing in delay/ disruption tolerant networks: A taxonomy, survey and challenges.” IEEE Communications surveys & tutorials Vol. 15, Issue 2 , pp. 654–677, 2013. doi: 10.1109/SURV.2012.042512.00053
  • N. Benamar et al., “Routing Protocols in Vehicular Delay Tolerant Networks: A Comprehensive Survey,” Comp. Commun., Vol. 48, pp. 141–58, 2014. doi: 10.1016/j.comcom.2014.03.024
  • J. Ott and D. Kutscher, “Drive-Thru Internet: IEEE 802.11b for Automobile Users,” Proc. IEEE INFOCOM 2004, Mar. 2004.
  • Tamer Abdelkader et.al, “A performance comparison of delay-tolerant network routing protocols.” IEEE Network Vol. 30, Issue 2, pp.46–53, 2016. doi: 10.1109/MNET.2016.7437024
  • Yousefi, Saleh, and Mahmood Fathy. “Metrics for performance evaluation of safety applications in vehicular ad hoc networks.” Transport 23.4 (2008): 291–298. doi: 10.3846/1648-4142.2008.23.291-298
  • Scott, K., and S. Burleigh. “Bundle Protocol Specification, IETF RFC 5050, Experimental, 2007.
  • Massri, Khalil, Alessandro Vernata, and Andrea Vitaletti. “Routing protocols for delay tolerant networks: a quantitative evaluation.” Proceedings of the 7th ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks, pp. 107–114, 2012.
  • Wischhof L, A. Ebner, H. Rohling, M. Lott and R. Halfmann, “SOTIS a self-organizing traffic information system”, 57th IEEE Semiannual Vehicular Technology Conference, pp. 2442–2446, 2003.
  • Chen, Xiao, Jian Shen, and Jie Wu. “Enhanced delegation forwarding in delay tolerant networks.” International Journal of Parallel, Emergent and Distributed Systems 26.5 (2011): 331–345. doi: 10.1080/17445760903548317
  • Demmer, Michael and Kevin Fall. “DTLSR: delay tolerant routing for developing regions.” ACM Proceedings of the workshop on Networked systems for developing regions, pp.5, 2007.
  • Ilham et. al, “Evaluated and optimized of routing model on delay tolerant network (dtn) for data transmission to remote area.” Proceedings of FORTEI, Indonesia University Jakarta, pp. 24–28, 2012.
  • Zhang, Zhensheng. “Routing in intermittently connected mobile ad hoc networks and delay tolerant networks: overview and challenges.” IEEE Communications Surveys & Tutorials, Vol. 8, Issue 1, pp. 24–37, 2006. doi: 10.1109/COMST.2006.323440
  • Soares, Vasco NGJ, Joel JPC Rodrigues, and Farid Farahmand. “GeoSpray: A geographic routing protocol for vehicular delay-tolerant networks.” Information Fusion, Vol. 15, pp. 102–113, 2014. doi: 10.1016/j.inffus.2011.11.003
  • Lindgren, Anders, Avri Doria, and Olov Schelén. “Probabilistic routing in intermittently connected networks.” ACM SIGMOBILE mobile computing and communications review Vol. 7, Issue 3, pp. 19–20, 2003. doi: 10.1145/961268.961272
  • Jun, Hyewon, et al. “Hierarchical power management in disruption tolerant networks with traffic-aware optimization.” Proceedings of the 2006 SIGCOMM workshop on Challenged networks. ACM, pp. 245–252, 2006.
  • Available:https://www.techopedia.com/definition/25704/bundle-protocol.
  • Wang, Ruhai, et al. “Which DTN CLP is best for long-delay cislunar communications with channel-rate asymmetry?” IEEE Wireless Communications, Vol.18, Issue 6, 2011.
  • Adamson, B., et al. Negative-acknowledgment (NACK)-oriented reliable multicast (NORM) protocol. No. RFC 3940. 2004.
  • Tuan Le, Mario Gerla, Social contact graph-based group communication schemes for delay tolerant networks, Available online at: http://dx.doi.org/10.1080/17445760.2017.1300802.
  • Singh, Vijander, and Reena Dadhich. “Efficient routing by minimizing end to end delay in delay tolerant enabled VANETs.” International Journal of Computer Engineering and Applications, Volume IX, Issue II, February 2015, ISSN 2321–3469.
  • Kumar, D. S., & Nagarajan, N. (2012). An Improved Network Topology Acquisition process in IEEE 802.16 j non-transparent mode relay networks. Journal of Discrete Mathematical Sciences and Cryptography, 15(1),57–71. doi: 10.1080/09720529.2012.10698364

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.