A Survey on Various Forwarding Protocols Scheme for Named Data Network in MANET

Authors

  • Priya PL Dept. of Computer Science & Engineering, Sri Manakula Vinayagar Engineering College, Puducherry, India
  • Premkumar K Manonmaniam Sundaranar University, Tirunelveli, India

Keywords:

Provider-aware forwarding (PAF), Distance Table (DT), Named Data Network, LFBL, E-CHANET

Abstract

In this work, the Provider aware forwarding convention is planned as illustrative of the attentive distribution classification. The considered arrangement is planned not to modify the Interest/Data trade and without extra packages. The main required information structure is the alleged Distance Table, which keeps up panel of data between every centre and the correspondence endpoints. LFBL use three packet type content demand and reply, which are utilized like Interest and Data bundles, and acknowledgement, which is utilized by the consumer to affirm the provider determination. The information healing happens by steps: first, the Interest is scattered in the system with a controlled flooding procedure so as to find the accessible provider; at that point, the consumer chooses a provider and sends an acknowledgement packet for assertion; at long last, a separation based sending plan is empowered, so each middle of the path centre chooses if sending the resulting content demand or not by checking its Distance table. In particulars every core keeps up the Distance table, in addition to the standard NDN table, which incorporates, for each prepared content name, the provider identifier (ID) and the bound partition to it

References

[1] A. Detti, D. Tassetto, N. B. Melazzi, and F. Fedi, “Exploiting content centric networking to develop topic-based, publish–subscribe manet systems,” Ad Hoc Networks, vol. 24, pp. 115–133, 2015.

[2] M. Amadeo, A. Molinaro, and G. Ruggeri, “E-chanet: Routing, forward-ing and transport in information-centric multihop wireless networks,” Computer Communications, vol. 36, no. 7, pp. 792–803, 2013.

[3] F. Angius, M. Gerla, and G. Pau, “Bloogo: Bloom filter based gossip algorithm for wireless ndn,” in Proceedings of the 1st ACM workshop on Emerging Name-Oriented Mobile Networking Design-Architecture, Algorithms, and Applications. ACM, 2012, pp. 25–30.

[4]S. Gao, H. Zhang, and B. Zhang, “Energy efficient interest forwarding in ndn-based wireless sensor networks,” Mobile Information Systems, vol. 2016, 2016.

[5] Michael Meisel, Ph.D. Advisor: Lixia Zhang, “A Data-First Architecture for Unstructured Wireless Networks”, In Mobile computing ,oct 2010.

[6] X. Liu, Z. Li, P. Yang, and Y. Dong, “Information-centric mobile ad hoc networks and content routing: A survey,” Ad Hoc Networks, 2016.

[7] R. A. Rehman and B. S. Kim, “Content centric networking approach in cognitive radio ad hoc networks,” in 2015 13th International Conference on Frontiers of Information Technology (FIT), Dec 2015, pp. 309–313.

[8] M. Amadeo, C. Campolo, A. Molinaro, and N.Mitton, “Named data networking: a natural design for data collection in wireless sensor networks,” in Proceedings of the IFIPWireless Days Conference (WD ’13), pp. 1–6, Valencia, Spain, November 2013.

[9] L. Zhang, A. Afanasyev, J. Burke et al., “Named data networking,” ACM SIGCOMM Computer Communication Review, vol. 44, no. 3, pp. 66–73, 2014.

[10] M. A. Hail, M. Amadeo, A. Molinaro, and S. Fischer, “On the performance of caching and forwarding in information-centric networking for the IoT,” in Proceedings of the 13th International Conference (WWIC ’15), M. C. Aguayo-Torres, G. G´omez, and J. Poncela, Eds., vol. 9071 of Lecture Notes in Computer Science, pp. 313–326, Malaga, Spain, May 2015.

[11] M. Amadeo, C. Campolo, A. Molinaro et al., “Multi-source data retrieval in IoT via named data networking,” in Proceedings of the 1st International Conference on Information-Centric Networking (ICN ’14), pp. 67–76, Paris, France, September 2014.

[12] E. Baccelli, C. Mehlis, O. Hahm, T. C. Schmidt, and M. W¨ahlisch, “Information centric networking in the IoT: experiments with NDN in the wild,” in Proceedings of the 1st ACM International Conference on Information-Centric Networking (ICN ’14), pp. 77–86, ACM, September 2014.

[13] C.Wang, J. Li, F. Ye, and Y. Yang, “NETWRAP: an NDN based real-timewireless recharging framework for wireless sensor networks,” IEEE Transactions on Mobile Computing, vol. 13, no. 6, pp. 1283–1297, 2014.

[14] Augustine A, Sebastian EJ, “Routing Mechanism for Mobile Ad Hoc Networks with Improved Security Features”, Journal of Telecommunications System & Management, Telecommun Syst Manage 2016, 5:2.

[15] J. Lee and D. Kim, “Proxy-assisted content sharing using content centric networking (ccn) for resource-limited mobile consumer devices,” Consumer Electronics, IEEE Transactions on, vol. 57, no. 2, pp. 477– 483, 2011.

[16] A. Passarella, “A survey on content-centric technologies for the current internet: Cdn and p2p solutions,” Computer Communications, vol. 35, no. 1, pp. 1–32, 2012.

[17] A. Passarella, “A survey on content-centric technologies for the current internet: Cdn and p2p solutions,” Computer Communications, vol. 35, no. 1, pp. 1–32, 2012.

[18] L. Zhang, A. Afanasyev, J. Burke, V. Jacobson, k. claffy, P. Crowley, C. Papadopoulos, L. Wang, and B. Zhang, “Named data networking,” SIGCOMM Comput. Commun. Rev., vol. 44, no. 3, pp. 66–73, Jul. 2014.

[19] “The rife project. http://rife-project.eu/.”

[20] “The umobile project. http://umobile-project.eu/.”

[21] Y.-T. Yu, R. B. Dilmaghani, S. Calo, M. Sanadidi, and M. Gerla, “Interest propagation in named data manets,” in Computing, Networking and Communications (ICNC), 2013 International Conference on. IEEE, 2013, pp. 1118–1122.

Downloads

Published

2025-11-24

How to Cite

[1]
P. L. Priya and K. Premkumar, “A Survey on Various Forwarding Protocols Scheme for Named Data Network in MANET”, Int. J. Comp. Sci. Eng., vol. 7, no. 4, pp. 355–358, Nov. 2025.