Open Access   Article Go Back

A Survey on Various Forwarding Protocols Scheme for Named Data Network in MANET

P. Lakshmi Priya1 , K. Premkumar2

Section:Survey Paper, Product Type: Journal Paper
Volume-07 , Issue-04 , Page no. 355-358, Feb-2019

Online published on Feb 28, 2019

Copyright © P. Lakshmi Priya, K. Premkumar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: P. Lakshmi Priya, K. Premkumar, “A Survey on Various Forwarding Protocols Scheme for Named Data Network in MANET,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.355-358, 2019.

MLA Style Citation: P. Lakshmi Priya, K. Premkumar "A Survey on Various Forwarding Protocols Scheme for Named Data Network in MANET." International Journal of Computer Sciences and Engineering 07.04 (2019): 355-358.

APA Style Citation: P. Lakshmi Priya, K. Premkumar, (2019). A Survey on Various Forwarding Protocols Scheme for Named Data Network in MANET. International Journal of Computer Sciences and Engineering, 07(04), 355-358.

BibTex Style Citation:
@article{Priya_2019,
author = {P. Lakshmi Priya, K. Premkumar},
title = {A Survey on Various Forwarding Protocols Scheme for Named Data Network in MANET},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2019},
volume = {07},
Issue = {04},
month = {2},
year = {2019},
issn = {2347-2693},
pages = {355-358},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=789},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=789
TI - A Survey on Various Forwarding Protocols Scheme for Named Data Network in MANET
T2 - International Journal of Computer Sciences and Engineering
AU - P. Lakshmi Priya, K. Premkumar
PY - 2019
DA - 2019/02/28
PB - IJCSE, Indore, INDIA
SP - 355-358
IS - 04
VL - 07
SN - 2347-2693
ER -

           

Abstract

In this work, the Provider aware forwarding convention is planned as illustrative of the attentive distribution classification. The considered arrangement is planned not to modify the Interest/Data trade and without extra packages. The main required information structure is the alleged Distance Table, which keeps up panel of data between every centre and the correspondence endpoints. LFBL use three packet type content demand and reply, which are utilized like Interest and Data bundles, and acknowledgement, which is utilized by the consumer to affirm the provider determination. The information healing happens by steps: first, the Interest is scattered in the system with a controlled flooding procedure so as to find the accessible provider; at that point, the consumer chooses a provider and sends an acknowledgement packet for assertion; at long last, a separation based sending plan is empowered, so each middle of the path centre chooses if sending the resulting content demand or not by checking its Distance table. In particulars every core keeps up the Distance table, in addition to the standard NDN table, which incorporates, for each prepared content name, the provider identifier (ID) and the bound partition to it.

Key-Words / Index Term

Provider-aware forwarding (PAF), Distance Table (DT), Named Data Network, LFBL, E-CHANET

References

[1] A. Detti, D. Tassetto, N. B. Melazzi, and F. Fedi, “Exploiting content centric networking to develop topic-based, publish–subscribe manet systems,” Ad Hoc Networks, vol. 24, pp. 115–133, 2015.
[2] M. Amadeo, A. Molinaro, and G. Ruggeri, “E-chanet: Routing, forward-ing and transport in information-centric multihop wireless networks,” Computer Communications, vol. 36, no. 7, pp. 792–803, 2013.
[3] F. Angius, M. Gerla, and G. Pau, “Bloogo: Bloom filter based gossip algorithm for wireless ndn,” in Proceedings of the 1st ACM workshop on Emerging Name-Oriented Mobile Networking Design-Architecture, Algorithms, and Applications. ACM, 2012, pp. 25–30.
[4]S. Gao, H. Zhang, and B. Zhang, “Energy efficient interest forwarding in ndn-based wireless sensor networks,” Mobile Information Systems, vol. 2016, 2016.
[5] Michael Meisel, Ph.D. Advisor: Lixia Zhang, “A Data-First Architecture for Unstructured Wireless Networks”, In Mobile computing ,oct 2010.
[6] X. Liu, Z. Li, P. Yang, and Y. Dong, “Information-centric mobile ad hoc networks and content routing: A survey,” Ad Hoc Networks, 2016.
[7] R. A. Rehman and B. S. Kim, “Content centric networking approach in cognitive radio ad hoc networks,” in 2015 13th International Conference on Frontiers of Information Technology (FIT), Dec 2015, pp. 309–313.
[8] M. Amadeo, C. Campolo, A. Molinaro, and N.Mitton, “Named data networking: a natural design for data collection in wireless sensor networks,” in Proceedings of the IFIPWireless Days Conference (WD ’13), pp. 1–6, Valencia, Spain, November 2013.
[9] L. Zhang, A. Afanasyev, J. Burke et al., “Named data networking,” ACM SIGCOMM Computer Communication Review, vol. 44, no. 3, pp. 66–73, 2014.
[10] M. A. Hail, M. Amadeo, A. Molinaro, and S. Fischer, “On the performance of caching and forwarding in information-centric networking for the IoT,” in Proceedings of the 13th International Conference (WWIC ’15), M. C. Aguayo-Torres, G. G´omez, and J. Poncela, Eds., vol. 9071 of Lecture Notes in Computer Science, pp. 313–326, Malaga, Spain, May 2015.
[11] M. Amadeo, C. Campolo, A. Molinaro et al., “Multi-source data retrieval in IoT via named data networking,” in Proceedings of the 1st International Conference on Information-Centric Networking (ICN ’14), pp. 67–76, Paris, France, September 2014.
[12] E. Baccelli, C. Mehlis, O. Hahm, T. C. Schmidt, and M. W¨ahlisch, “Information centric networking in the IoT: experiments with NDN in the wild,” in Proceedings of the 1st ACM International Conference on Information-Centric Networking (ICN ’14), pp. 77–86, ACM, September 2014.
[13] C.Wang, J. Li, F. Ye, and Y. Yang, “NETWRAP: an NDN based real-timewireless recharging framework for wireless sensor networks,” IEEE Transactions on Mobile Computing, vol. 13, no. 6, pp. 1283–1297, 2014.
[14] Augustine A, Sebastian EJ, “Routing Mechanism for Mobile Ad Hoc Networks with Improved Security Features”, Journal of Telecommunications System & Management, Telecommun Syst Manage 2016, 5:2.
[15] J. Lee and D. Kim, “Proxy-assisted content sharing using content centric networking (ccn) for resource-limited mobile consumer devices,” Consumer Electronics, IEEE Transactions on, vol. 57, no. 2, pp. 477– 483, 2011.
[16] A. Passarella, “A survey on content-centric technologies for the current internet: Cdn and p2p solutions,” Computer Communications, vol. 35, no. 1, pp. 1–32, 2012.
[17] A. Passarella, “A survey on content-centric technologies for the current internet: Cdn and p2p solutions,” Computer Communications, vol. 35, no. 1, pp. 1–32, 2012.
[18] L. Zhang, A. Afanasyev, J. Burke, V. Jacobson, k. claffy, P. Crowley, C. Papadopoulos, L. Wang, and B. Zhang, “Named data networking,” SIGCOMM Comput. Commun. Rev., vol. 44, no. 3, pp. 66–73, Jul. 2014.
[19] “The rife project. http://rife-project.eu/.”
[20] “The umobile project. http://umobile-project.eu/.”
[21] Y.-T. Yu, R. B. Dilmaghani, S. Calo, M. Sanadidi, and M. Gerla, “Interest propagation in named data manets,” in Computing, Networking and Communications (ICNC), 2013 International Conference on. IEEE, 2013, pp. 1118–1122.