Internet of Things and Cloud Computing

| Peer-Reviewed |

Research on Innovating, Evaluating and Applying Multicast Routing Technique and Genetic Algorithm for Routing Messages in Service - Oriented Routing

Received: 21 September 2015    Accepted: 21 September 2015    Published: 12 October 2015
Views:       Downloads:

Share This Article

Abstract

MANET (short for Mobile Ad-Hoc Network) consists of a set of mobile network nodes, network configuration changes very fast. Each node will act as a router to maintain network operation. As some standard content based routing protocols, when a node publishes its content, it will broadcast data to network. The published content will be cached at all routers on the network. So when a node publish a request to get some content, it will prepare a subscription message then broadcast it. When any node on network received that subscription, it matches subscription’s content with published content that have been cached on it. If found then matched content will be transferred to requested node. Service Oriented Routing is inherited from the model of content based routing (CBR), combined with several advanced techniques such as Multicast, Genetic algorithm (GA) increase the data rate, and data encryption to ensure information security.

DOI 10.11648/j.iotcc.s.2015030601.15
Published in Internet of Things and Cloud Computing (Volume 3, Issue 3, October 2015)
Page(s) 42-47
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Keywords

MANET, QOS, Bandwidth, Time Slot, Service, GEN, GA

References
[1] Fengyun Cao, Jaswinder Pal Singh. "Efficient Event Routing in Content-based Publish-Subscribe Service Networks" Infocom 2004.
[2] R. Kalaiarasi, University Chennai, India. “PERFORMANCE ANALYSIS OF CONTENTION WINDOW CHEATING MISBEHAVIORS IN MOBILE AD HOC NETWORKS”.
[3] Antonio Carzaniga and Alexander Wolf. "Forwarding in a Content-Based Network," In Proc. SIGCOMM 2003.
[4] Antonio Carzaniga, University of Colorado Boulder, Colorado 80309-0430 USA "A Routing Scheme for Content-Based Networking.
[5] Jianping Li, the University of Tokyo, Japan, "Time Slot Assignment for Maximum Bandwidth in a Mobile Ad Hoc Network".
[6] Huayi Wu, City University of Hong Kong, Hong Kong, "QoS multicast routing by using multiple paths / trees in wireless ad hoc networks".
[7] Aisha-Hassan, Computer Engineering, IIUM, Malaysia, “Review of Multicast QoS Routing Protocols for Mobile Ad Hoc Networks”.
[8] J. Abdullah, Universiti Tun Hussein Onn Malaysia, Johor, Malaysia, “Effect of Maximum Node Velocity on GA-Based QOS Routing Protocol (QOSRGA) for Mobile Ad Hoc Network”.
[9] Nguyen Thanh Long, Nguyen Duc Thuy, Pham Huy Hoang, “Research on Innovating, Evaluating and Applying Multicast Routing Technique for Routing messages in Service-oriented Routing”, Springer, ISBN: 978-1-936968-65-7, Volume Number 109, 2012.
[10] K. Sasikala, V. Rajamani “A Modified Fuzzy Logic Routing for Wireless Mesh Network”, International Journal of Computer Applications (0975 – 8887) Volume 60– No.2, December 2012.
[11] Anjum A. Mohammed, Information Technology Department, College of Computer and Information Sciences,King Saud University, KSA, “Optimal Routing In Ad-Hoc Network Using Genetic Algorithm”.
Author Information
  • Software Development Division III, Informatics Center of Hanoi Telecommunications, Hoan Kiem, Hanoi, VietNam

  • Center for Applied Research and Technology Development, Research Institute of Posts and Telecommunications, NghiaTan, Cau Giay, Hanoi, VietNam

  • Information Technology Institute, Ha Noi University of Science Technology, HaNoi, VietNam

Cite This Article
  • APA Style

    Nguyen Thanh Long, Nguyen Duc Thuy, Pham Huy Hoang. (2015). Research on Innovating, Evaluating and Applying Multicast Routing Technique and Genetic Algorithm for Routing Messages in Service - Oriented Routing. Internet of Things and Cloud Computing, 3(3), 42-47. https://doi.org/10.11648/j.iotcc.s.2015030601.15

    Copy | Download

    ACS Style

    Nguyen Thanh Long; Nguyen Duc Thuy; Pham Huy Hoang. Research on Innovating, Evaluating and Applying Multicast Routing Technique and Genetic Algorithm for Routing Messages in Service - Oriented Routing. Internet Things Cloud Comput. 2015, 3(3), 42-47. doi: 10.11648/j.iotcc.s.2015030601.15

    Copy | Download

    AMA Style

    Nguyen Thanh Long, Nguyen Duc Thuy, Pham Huy Hoang. Research on Innovating, Evaluating and Applying Multicast Routing Technique and Genetic Algorithm for Routing Messages in Service - Oriented Routing. Internet Things Cloud Comput. 2015;3(3):42-47. doi: 10.11648/j.iotcc.s.2015030601.15

    Copy | Download

  • @article{10.11648/j.iotcc.s.2015030601.15,
      author = {Nguyen Thanh Long and Nguyen Duc Thuy and Pham Huy Hoang},
      title = {Research on Innovating, Evaluating and Applying Multicast Routing Technique and Genetic Algorithm for Routing Messages in Service - Oriented Routing},
      journal = {Internet of Things and Cloud Computing},
      volume = {3},
      number = {3},
      pages = {42-47},
      doi = {10.11648/j.iotcc.s.2015030601.15},
      url = {https://doi.org/10.11648/j.iotcc.s.2015030601.15},
      eprint = {https://download.sciencepg.com/pdf/10.11648.j.iotcc.s.2015030601.15},
      abstract = {MANET (short for Mobile Ad-Hoc Network) consists of a set of mobile network nodes, network configuration changes very fast. Each node will act as a router to maintain network operation. As some standard content based routing protocols, when a node publishes its content, it will broadcast data to network. The published content will be cached at all routers on the network. So when a node publish a request to get some content, it will prepare a subscription message then broadcast it. When any node on network received that subscription, it matches subscription’s content with published content that have been cached on it. If found then matched content will be transferred to requested node. Service Oriented Routing is inherited from the model of content based routing (CBR), combined with several advanced techniques such as Multicast, Genetic algorithm (GA) increase the data rate, and data encryption to ensure information security.},
     year = {2015}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Research on Innovating, Evaluating and Applying Multicast Routing Technique and Genetic Algorithm for Routing Messages in Service - Oriented Routing
    AU  - Nguyen Thanh Long
    AU  - Nguyen Duc Thuy
    AU  - Pham Huy Hoang
    Y1  - 2015/10/12
    PY  - 2015
    N1  - https://doi.org/10.11648/j.iotcc.s.2015030601.15
    DO  - 10.11648/j.iotcc.s.2015030601.15
    T2  - Internet of Things and Cloud Computing
    JF  - Internet of Things and Cloud Computing
    JO  - Internet of Things and Cloud Computing
    SP  - 42
    EP  - 47
    PB  - Science Publishing Group
    SN  - 2376-7731
    UR  - https://doi.org/10.11648/j.iotcc.s.2015030601.15
    AB  - MANET (short for Mobile Ad-Hoc Network) consists of a set of mobile network nodes, network configuration changes very fast. Each node will act as a router to maintain network operation. As some standard content based routing protocols, when a node publishes its content, it will broadcast data to network. The published content will be cached at all routers on the network. So when a node publish a request to get some content, it will prepare a subscription message then broadcast it. When any node on network received that subscription, it matches subscription’s content with published content that have been cached on it. If found then matched content will be transferred to requested node. Service Oriented Routing is inherited from the model of content based routing (CBR), combined with several advanced techniques such as Multicast, Genetic algorithm (GA) increase the data rate, and data encryption to ensure information security.
    VL  - 3
    IS  - 3
    ER  - 

    Copy | Download

  • Sections