SlideShare a Scribd company logo
Transfer Reliability and Congestion Control Strategies in
Opportunistic Networks A Survey
ABSTRACT
Opportunistic networks are a class of mobile ad hoc networks (MANETs)
where contacts between mobile nodes occur unpredictably and where a
complete end-to-end path between Source and destination rarely exists at one
time. Two important functions, traditionally provided by the transport layer,
are ensuring the reliability of data transmission between source and
destination, and ensuring that the network does not become congested with
traffic. However, modified versions of TCP that have been proposed to support
these functions in MANETs are ineffective in opportunistic networks. In
addition, opportunistic networks require different approaches to those
adopted in the more common intermittently connected networks, e.g. deep
space networks. In this article we capture the state of the art of proposals for
transfer reliability and storage congestion control strategies in opportunistic
networks. We discuss potential mechanisms for transfer reliability service, i.e.
hop-by-hop custody transfer and end-to-end return receipt. We also identify
the requirements for storage congestion control and categorise these issues
GLOBALSOFT TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
based on the number of message copies distributed in the networks. For
single-copy forwarding, storage congestion management and congestion
avoidance mechanism are discussed. For multiple-copy forwarding, the
principal storage congestion control mechanisms are replication management
and drop policy. Finally, we identify open research issues in the field where
future research could usefully be focused.
SYSTEM ANALYSIS
Existing System:
Existing storage congestion management proposals can be divided into two categories: those
that use economic models to determine whether custody of a message should be transferred
to a new node, and those that analyse network traffic levels to make this decision.
Disadvantages:
One drawback of the greedy scheme is that it does not consider the cooperation
between the neighboring nodes and hence its performance may be limited.
Proposed System:
In this paper, we propose two important functions, traditionally provided by
the transport layer, are ensuring the reliability of data transmission between source and
destination, and ensuring that the network does not become congested with traffic. However,
modified versions of TCP that have been proposed to support these functions in MANETs are
ineffective in opportunistic networks. In addition, opportunistic networks require different
approaches to those adopted in the more common intermittently connected networks, e.g.
deep space networks. In this article we capture the state of the art of proposals for transfer
reliability and storage congestion control strategies in opportunistic networks. We discuss
potential mechanisms for transfer reliability service, i.e. hop-by-hop custody transfer and end-
to-end return receipt.
We have reviewed and discussed proposals for transfer reliability and storage congestion
control in opportunistic networks. We provide a summary of the congestion control strategies
in Table I. This table includes the service target of each strategy, giving the principal delivery
objective as either maximum delivery ratio or minimum delivery delay or both. The authors of
some papers clearly state the service target of their proposal, whereas other authors use the
delivery ratio and/or delivery delay as metric(s) to measure the proposal’s performance in
computer simulations or mathematical models.
ICNs do not satisfy traditional networking assumptions, where end-to-end paths always exist,
and the networks have low propagation delays or round-trip times, low bit error rates, and
high bandwidth. As a result, communication protocols built for these conventional networks,
e.g. the Internet and MANETs,
Advantages:
1. Low query delay.
2. Data Availability is high.
Modules:
a. Data Replication
b. The One-To-One Optimization (OTOO) Scheme
c. The Reliable Neighbor (RN) Scheme
d. Reliable Grouping (RG) Scheme
1. Data Replication:
Data replication has been extensively studied in the Web
environment and distributed database systems. However, most of them either
do not consider the storage constraint or ignore the link failure issue. Before
addressing these issues by proposing new data replication schemes, we first
introduce our system model. In a MANET, mobile nodes collaboratively share
data. Multiple nodes exist in the network and they send query requests to
other nodes for some specified data items. Each node creates replicas of the
data items and maintains the replicas in its memory (or disk) space. During
data replication, there is no central server that determines the allocation of
replicas, and mobile nodes determine the data allocation in a distributed
manner.
2. The One-To-One Optimization (OTOO) Scheme:
1) It considers the access frequency from a neighboring node to improve
data availability.
2) It considers the data size. If other criteria are the same, the data item
with smaller size is given higher priority for replicating because this can
improve the performance while reducing memory space.
3) It gives high priority to local data access, and hence the interested
data should be replicated locally to improve data availability and reduce
query delay.
4) It considers the impact of data availability from the neighboring node
and link quality. Thus, if the links between two neighboring nodes are
stable, they can have more cooperation’s in data replication.
3. The Reliable Neighbor (RN) Scheme:
OTOO considers neighboring nodes when making data
replication choices. However, it still considers its own access frequency as the
most important factor because the access frequency from a neighboring node
is reduced by a factor of the link failure probability. To further increase the
degree of cooperation, we propose the Reliable Neighbor (RN) scheme which
contributes more memory to replicate data for neighboring nodes. In this
scheme, part of the node’s memory is used to hold data for its Reliable
Neighbors. If links are not stable, data on neighboring nodes have low
availability and may incur high query delay. Thus, cooperation in this case
cannot improve data availability and nodes should be more “selfish” in order
to achieve better performance.
4. Reliable Grouping (RG) Scheme:
OTOO only considers one neighboring node when making data
replication decisions. RN further considers all one-hop neighbors. However,
the cooperation’s in both OTOO and RN are not fully exploited. To further
increase the degree of cooperation, we propose the reliable grouping (RG)
scheme which shares Replicas in large and reliable groups of nodes, whereas
OTOO and RN only share replicas among neighboring nodes. The basic idea of
the RG scheme is that it always picks the most suitable data items to replicate
on the most suitable nodes in the group to maximize the data availability and
minimize the data access delay within the group. The RG scheme can reduce
the number of hops that the data need to be transferred to serve the query.
Congestion-aware forwarding module in opportunistic network nodes
Traffic distribution in social opportunistic networks
SYSTEM SPECIFICATION
Hardware Requirements:
• System : Pentium IV 2.4 GHz.
• Hard Disk : 80 GB.
• Floppy Drive: 1.44 Mb.
• Monitor : 15’ VGA Colour.
• Mouse : Optical Mouse
• RAM : 512 MB.
Software Requirements:
• Operating system : Windows 7 32 Bit.
• Coding Language : ASP.Net 4.0 with C#
• Data Base : SQL Server 2008

More Related Content

PPTX
Transfer reliability and congestion control strategies in opportunistic netwo...
PDF
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
PDF
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
PDF
A New Efficient Cache Replacement Strategy for Named Data Networking
PDF
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
PDF
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
PDF
1. 8481 1-pb
PDF
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Transfer reliability and congestion control strategies in opportunistic netwo...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
A New Efficient Cache Replacement Strategy for Named Data Networking
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
1. 8481 1-pb
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN

What's hot (16)

PDF
Tree Based Proactive Source Routing Protocol for MANETs
PDF
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
DOCX
Dynamic control of coding for progressive packet arrivals in dtns
PDF
Review on Clustering and Data Aggregation in Wireless Sensor Network
PDF
Analytical average throughput and delay estimations for LTE
DOCX
Dynamic control of coding for progressive packet arrivals in dt ns
PDF
SSI Routing Scheme for Heterogeneous MANETs
PDF
A novel routing technique for mobile ad hoc networks (manet)
PDF
C0351725
PDF
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
PDF
Analysis of LTE Radio Load and User Throughput
PDF
A Distributed Approach to Solving Overlay Mismatching Problem
PDF
Dynamic Layer Management in Super-Peer Architectures
PDF
E42062126
PDF
Hybrid Periodical Flooding in Unstructured Peer-to-Peer Networks
Tree Based Proactive Source Routing Protocol for MANETs
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
Dynamic control of coding for progressive packet arrivals in dtns
Review on Clustering and Data Aggregation in Wireless Sensor Network
Analytical average throughput and delay estimations for LTE
Dynamic control of coding for progressive packet arrivals in dt ns
SSI Routing Scheme for Heterogeneous MANETs
A novel routing technique for mobile ad hoc networks (manet)
C0351725
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
Analysis of LTE Radio Load and User Throughput
A Distributed Approach to Solving Overlay Mismatching Problem
Dynamic Layer Management in Super-Peer Architectures
E42062126
Hybrid Periodical Flooding in Unstructured Peer-to-Peer Networks
Ad

Similar to Transfer reliability and congestion control strategies in opportunistic networks a survey (20)

PDF
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...
PDF
ODRS: Optimal Data Replication Scheme for Time Efficiency In MANETs
PDF
Graph Theoretic Routing Algorithm (GTRA) for Mobile Ad-Hoc Networks (MANET)
PDF
Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANET
PDF
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
DOCX
JAVA 2013 IEEE NETWORKING PROJECT Dynamic control of coding for progressive p...
PDF
Evaluation of a topological distance
PDF
A comparative study in wireless sensor networks
PDF
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
PDF
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
PDF
Link aware nice application level multicast protocol
PDF
Content Sharing over Smartphone-Based Delay-Tolerant Networks
PDF
Traffic-aware adaptive server load balancing for softwaredefined networks
PDF
IEEE 2015 NS2 Projects
PDF
IEEE 2015 NS2 Projects
PDF
A survey on mac strategies for cognitive radio networks
PDF
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
 
PDF
Analytical Study of Cluster Based Routing Protocols in MANET
PDF
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
PDF
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...
ODRS: Optimal Data Replication Scheme for Time Efficiency In MANETs
Graph Theoretic Routing Algorithm (GTRA) for Mobile Ad-Hoc Networks (MANET)
Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANET
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
JAVA 2013 IEEE NETWORKING PROJECT Dynamic control of coding for progressive p...
Evaluation of a topological distance
A comparative study in wireless sensor networks
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Link aware nice application level multicast protocol
Content Sharing over Smartphone-Based Delay-Tolerant Networks
Traffic-aware adaptive server load balancing for softwaredefined networks
IEEE 2015 NS2 Projects
IEEE 2015 NS2 Projects
A survey on mac strategies for cognitive radio networks
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
 
Analytical Study of Cluster Based Routing Protocols in MANET
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
Ad

More from IEEEFINALYEARPROJECTS (20)

DOCX
Scalable face image retrieval using attribute enhanced sparse codewords
DOCX
Scalable face image retrieval using attribute enhanced sparse codewords
DOCX
Reversible watermarking based on invariant image classification and dynamic h...
DOCX
Reversible data hiding with optimal value transfer
DOCX
Query adaptive image search with hash codes
DOCX
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
DOCX
Local directional number pattern for face analysis face and expression recogn...
DOCX
An access point based fec mechanism for video transmission over wireless la ns
DOCX
Towards differential query services in cost efficient clouds
DOCX
Spoc a secure and privacy preserving opportunistic computing framework for mo...
DOCX
Secure and efficient data transmission for cluster based wireless sensor netw...
DOCX
Privacy preserving back propagation neural network learning over arbitrarily ...
DOCX
Non cooperative location privacy
DOCX
Harnessing the cloud for securely outsourcing large
DOCX
Geo community-based broadcasting for data dissemination in mobile social netw...
DOCX
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
DOCX
Dynamic resource allocation using virtual machines for cloud computing enviro...
DOCX
A secure protocol for spontaneous wireless ad hoc networks creation
DOCX
Utility privacy tradeoff in databases an information-theoretic approach
DOCX
Two tales of privacy in online social networks
Scalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewords
Reversible watermarking based on invariant image classification and dynamic h...
Reversible data hiding with optimal value transfer
Query adaptive image search with hash codes
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
Local directional number pattern for face analysis face and expression recogn...
An access point based fec mechanism for video transmission over wireless la ns
Towards differential query services in cost efficient clouds
Spoc a secure and privacy preserving opportunistic computing framework for mo...
Secure and efficient data transmission for cluster based wireless sensor netw...
Privacy preserving back propagation neural network learning over arbitrarily ...
Non cooperative location privacy
Harnessing the cloud for securely outsourcing large
Geo community-based broadcasting for data dissemination in mobile social netw...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Dynamic resource allocation using virtual machines for cloud computing enviro...
A secure protocol for spontaneous wireless ad hoc networks creation
Utility privacy tradeoff in databases an information-theoretic approach
Two tales of privacy in online social networks

Recently uploaded (20)

PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
cloud_computing_Infrastucture_as_cloud_p
PPTX
Machine Learning_overview_presentation.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
August Patch Tuesday
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Approach and Philosophy of On baking technology
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
A comparative analysis of optical character recognition models for extracting...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
A comparative study of natural language inference in Swahili using monolingua...
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Spectral efficient network and resource selection model in 5G networks
cloud_computing_Infrastucture_as_cloud_p
Machine Learning_overview_presentation.pptx
Unlocking AI with Model Context Protocol (MCP)
Group 1 Presentation -Planning and Decision Making .pptx
August Patch Tuesday
MIND Revenue Release Quarter 2 2025 Press Release
Programs and apps: productivity, graphics, security and other tools
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Approach and Philosophy of On baking technology
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Univ-Connecticut-ChatGPT-Presentaion.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Building Integrated photovoltaic BIPV_UPV.pdf

Transfer reliability and congestion control strategies in opportunistic networks a survey

  • 1. Transfer Reliability and Congestion Control Strategies in Opportunistic Networks A Survey ABSTRACT Opportunistic networks are a class of mobile ad hoc networks (MANETs) where contacts between mobile nodes occur unpredictably and where a complete end-to-end path between Source and destination rarely exists at one time. Two important functions, traditionally provided by the transport layer, are ensuring the reliability of data transmission between source and destination, and ensuring that the network does not become congested with traffic. However, modified versions of TCP that have been proposed to support these functions in MANETs are ineffective in opportunistic networks. In addition, opportunistic networks require different approaches to those adopted in the more common intermittently connected networks, e.g. deep space networks. In this article we capture the state of the art of proposals for transfer reliability and storage congestion control strategies in opportunistic networks. We discuss potential mechanisms for transfer reliability service, i.e. hop-by-hop custody transfer and end-to-end return receipt. We also identify the requirements for storage congestion control and categorise these issues GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
  • 2. based on the number of message copies distributed in the networks. For single-copy forwarding, storage congestion management and congestion avoidance mechanism are discussed. For multiple-copy forwarding, the principal storage congestion control mechanisms are replication management and drop policy. Finally, we identify open research issues in the field where future research could usefully be focused. SYSTEM ANALYSIS Existing System: Existing storage congestion management proposals can be divided into two categories: those that use economic models to determine whether custody of a message should be transferred to a new node, and those that analyse network traffic levels to make this decision. Disadvantages: One drawback of the greedy scheme is that it does not consider the cooperation between the neighboring nodes and hence its performance may be limited. Proposed System: In this paper, we propose two important functions, traditionally provided by the transport layer, are ensuring the reliability of data transmission between source and destination, and ensuring that the network does not become congested with traffic. However, modified versions of TCP that have been proposed to support these functions in MANETs are ineffective in opportunistic networks. In addition, opportunistic networks require different approaches to those adopted in the more common intermittently connected networks, e.g. deep space networks. In this article we capture the state of the art of proposals for transfer reliability and storage congestion control strategies in opportunistic networks. We discuss
  • 3. potential mechanisms for transfer reliability service, i.e. hop-by-hop custody transfer and end- to-end return receipt. We have reviewed and discussed proposals for transfer reliability and storage congestion control in opportunistic networks. We provide a summary of the congestion control strategies in Table I. This table includes the service target of each strategy, giving the principal delivery objective as either maximum delivery ratio or minimum delivery delay or both. The authors of some papers clearly state the service target of their proposal, whereas other authors use the delivery ratio and/or delivery delay as metric(s) to measure the proposal’s performance in computer simulations or mathematical models. ICNs do not satisfy traditional networking assumptions, where end-to-end paths always exist, and the networks have low propagation delays or round-trip times, low bit error rates, and high bandwidth. As a result, communication protocols built for these conventional networks, e.g. the Internet and MANETs, Advantages: 1. Low query delay. 2. Data Availability is high.
  • 4. Modules: a. Data Replication b. The One-To-One Optimization (OTOO) Scheme c. The Reliable Neighbor (RN) Scheme d. Reliable Grouping (RG) Scheme 1. Data Replication: Data replication has been extensively studied in the Web environment and distributed database systems. However, most of them either do not consider the storage constraint or ignore the link failure issue. Before addressing these issues by proposing new data replication schemes, we first
  • 5. introduce our system model. In a MANET, mobile nodes collaboratively share data. Multiple nodes exist in the network and they send query requests to other nodes for some specified data items. Each node creates replicas of the data items and maintains the replicas in its memory (or disk) space. During data replication, there is no central server that determines the allocation of replicas, and mobile nodes determine the data allocation in a distributed manner. 2. The One-To-One Optimization (OTOO) Scheme: 1) It considers the access frequency from a neighboring node to improve data availability. 2) It considers the data size. If other criteria are the same, the data item with smaller size is given higher priority for replicating because this can improve the performance while reducing memory space. 3) It gives high priority to local data access, and hence the interested data should be replicated locally to improve data availability and reduce query delay. 4) It considers the impact of data availability from the neighboring node and link quality. Thus, if the links between two neighboring nodes are stable, they can have more cooperation’s in data replication.
  • 6. 3. The Reliable Neighbor (RN) Scheme: OTOO considers neighboring nodes when making data replication choices. However, it still considers its own access frequency as the most important factor because the access frequency from a neighboring node is reduced by a factor of the link failure probability. To further increase the degree of cooperation, we propose the Reliable Neighbor (RN) scheme which contributes more memory to replicate data for neighboring nodes. In this scheme, part of the node’s memory is used to hold data for its Reliable Neighbors. If links are not stable, data on neighboring nodes have low availability and may incur high query delay. Thus, cooperation in this case cannot improve data availability and nodes should be more “selfish” in order to achieve better performance. 4. Reliable Grouping (RG) Scheme: OTOO only considers one neighboring node when making data replication decisions. RN further considers all one-hop neighbors. However, the cooperation’s in both OTOO and RN are not fully exploited. To further increase the degree of cooperation, we propose the reliable grouping (RG) scheme which shares Replicas in large and reliable groups of nodes, whereas OTOO and RN only share replicas among neighboring nodes. The basic idea of the RG scheme is that it always picks the most suitable data items to replicate on the most suitable nodes in the group to maximize the data availability and minimize the data access delay within the group. The RG scheme can reduce the number of hops that the data need to be transferred to serve the query. Congestion-aware forwarding module in opportunistic network nodes
  • 7. Traffic distribution in social opportunistic networks
  • 8. SYSTEM SPECIFICATION Hardware Requirements: • System : Pentium IV 2.4 GHz. • Hard Disk : 80 GB. • Floppy Drive: 1.44 Mb. • Monitor : 15’ VGA Colour. • Mouse : Optical Mouse • RAM : 512 MB. Software Requirements: • Operating system : Windows 7 32 Bit. • Coding Language : ASP.Net 4.0 with C# • Data Base : SQL Server 2008