Buffer Dimensioning of Delay-Tolerant Network Nodes - A Large Deviations Approach

Similar documents
Buffer Aware Network Coded Routing Protocol for Delay Tolerant Networks

A Joint Replication-Migration-based Routing in Delay Tolerant Networks

COMPARATIVE ANALYSIS OF DIFFERENT ROUTING PROTOCOLS IN DELAY TOLERANT NETWORKS

Performance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey. Namita Mehta 1 and Mehul Shah 2

Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay

Exploiting Heterogeneity in Mobile Opportunistic Networks: An Analytic Approach

CLUSTERING BASED ROUTING FOR DELAY- TOLERANT NETWORKS

Impact of Social Networks in Delay Tolerant Routing

Timely Information Dissemination with Distributed Storage in Delay Tolerant Mobile Sensor Networks

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES

Spray and Dynamic: Advanced Routing in Delay Tolerant Networks

Energy Consumption and Performance of Delay Tolerant Network Routing Protocols under Different Mobility Models

PRESENTATION MOLD OF INTERRUPTION TOLERANT NETWORK ROUTING

A DTN Packet Forwarding Scheme Inspired by Thermodynamics

Energy Efficient Social-Based Routing for Delay Tolerant Networks

Improvement of Buffer Scheme for Delay Tolerant Networks

Simulation and Analysis of Opportunistic Routing Protocols

Optimal Buffer Management Policies for Delay Tolerant Networks

Archna Rani [1], Dr. Manu Pratap Singh [2] Research Scholar [1], Dr. B.R. Ambedkar University, Agra [2] India

Estimation based Erasure-coding Routing in Delay Tolerant Networks

Routing Protocol Approaches in Delay Tolerant Networks

Routing in a Delay Tolerant Network Sushant Jain, Kevin Fall and Rabin Patra SIGCOMM Presented by Xun Gong

Performance Analysis of Delay Tolerant Network Routing Protocols in Different Mobility Environments

PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS

Cost Efficient Erasure Coding based Routing in Delay Tolerant Networks

Network Routing Without Delay Using Message Scheduling

Design and Implementation of Improved Routing Algorithm for Energy Consumption in Delay Tolerant Network

Overhead Reduction In Delay Tolerant Networks

Buffer Management in Delay Tolerant Networks

Impact of Social Networks on Delay Tolerant Routing

Routing in Delay Tolerant Networks (DTN)

CHAPTER 5 PROPAGATION DELAY

Cluster Based Approach for Overhead Reduction and Load Balancing in Delay Tolerant Mobile Applications

Capacity-Aware Routing Using Throw-Boxes

Probabilistic Routing With Multi-copies in Delay Tolerant Networks

DTN-based Delivery of Word-of-Mouth Information with Priority and Deadline

All Rights Reserved 2017 IJARCET

CFP: Integration of Fountain Codes and Optimal Probabilistic Forwarding in DTNs

SUMMERY, CONCLUSIONS AND FUTURE WORK

Geographic information based Replication and Drop Routing (GeoRaDR): A Hybrid Message Transmission Approach for DTNs

Hierarchical Trust Management for Delay Tolerant Networks Using Stochastic Petrinet for Secure Routing

Community-Based Adaptive Buffer Management Strategy in Opportunistic Network

DTN Interworking for Future Internet Presented by Chang, Dukhyun

A Multi-Copy Delegation Forwarding Based On Short-term and Long-Term Speed in DTNs

Using local speed information as routing metric for delay tolerant networks

Impact of Source Counter on Routing Performance in Resource Constrained DTNs

Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks

A Genetic-Neural Approach for Mobility Assisted Routing in a Mobile Encounter Network

Design of Simulator for Finding the Delay Distribution in Delay Tolerant Networking

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network

Minimizing Average Spraying Cost for Routing in Delay Tolerant Networks

Keywords: Store and carry networks, Forwarding strategies, routing, DTN, Minimum hop transmission

Routing Issues & Performance Of Different Opportunistic Routing Protocols In Delay Tolerant Network

Social-Similarity-based Multicast Algorithm in Impromptu Mobile Social Networks

On Multicopy Opportunistic Forwarding Protocols in Nondeterministic Delay Tolerant Networks

Efficiency Analysis of Enhanced Epidemic Routing Protocol of Delay Tolerant Networks using Improved Buffer Management

Analytic Performance Models for Bounded Queueing Systems

Comparative Study of Routing Protocols for Opportunistic Networks

Modeling Redundancy-based Routing in Delay Tolerant Networks

On the Scalability of Hierarchical Ad Hoc Wireless Networks

HCS: hierarchical cluster-based forwarding scheme for mobile social networks

Buffer Aware Routing in Interplanetary Ad Hoc Network

Power Laws in ALOHA Systems

BOND: Unifying Mobile Networks with Named Data. Michael Meisel

Benefits of Network Coding for Unicast Application in Disruption Tolerant Networks

Spray and forward: Efficient routing based on the Markov location prediction model for DTNs

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

Performance Modeling for Two-hop Relay with Node Selfishness in Delay Tolerant Networks

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Routing with Multi-Level Social Groups in Mobile Opportunistic Networks

Studies with ns-2 and ns-3 based DTN Simulators

Delay-Differentiated Gossiping in Delay Tolerant Networks

Contention-Aware Analysis of Routing Schemes for Mobile Opportunistic Networks

InterestSpread: An Efficient Method for Content Transmission in Mobile Social Networks

NEW STRATEGY TO OPTIMIZE THE PERFORMANCE OF SPRAY AND WAIT ROUTING PROTOCOL

Performance Evaluations of Data-Centric Information Retrieval Schemes for DTNs

Simulation of Epidemic, Spray and Wait and First Contact Routing Protocols in Delay Tolerant Network

Integrated Buffer and Route Management in a DTN with Message Ferry

Towards Distributed Network Classification for Mobile Ad hoc Networks

PROFICIENT CLUSTER-BASED ROUTING PROTOCOL USING EBSA AND LEACH APPROACHES

MaxHopCount: DTN congestion control algorithm under MaxProp routing

Message Forwarding in Cyclic MobiSpace: the Multi-copy Case

Opportunistic Routing Algorithms in Delay Tolerant Networks

Virtual Segment: Store-Carry-Forward Relay-Based Support for Wide-Area Non-Real-time Data Exchange

Empirical Evaluation of Hybrid Opportunistic Networks

International Journal of Computer Engineering and Applications, Volume XII, Special Issue, August 18, ISSN

COMFA: Exploiting Regularity of People Movement for Message Forwarding in Community-based Delay Tolerant Networks

Onroad Vehicular Broadcast

Optimising Replication versus Redundancy in Window-aware Opportunistic Routing

DTIPN: Delay Tolerant IP Networking for Opportunistic Network Applications

Protocol Design and Optimization for

Can Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes?

CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

Application of Graph Theory in DTN Routing

Performance Comparison of MANETs Routing Protocols for Dense and Sparse Topology

IJSER. 1. Introduction. 1.1 Routing in DTN: Sukhpreet Kaur

Combined Mobile Ad-hoc and Delay/Disruption-tolerant Routing

Multicasting in Delay Tolerant Networks: Semantic Models and Routing Algorithms

TRUST FRAMEWORK FOR DATA FORWARDING IN OPPORTUNISTIC NETWORKS USING MOBILE TRACES

Transcription:

Buffer Dimensioning of Delay-Tolerant Network Nodes - A Large Deviations Approach Veeramani Mahendran, Thammana Praveen, and C. Siva Ram Murthy Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036, India mahendra@cse.iitm.ac.in, praveen.thammana@gmail.com, murthy@iitm.ac.in Abstract. Buffer dimensioning of nodes is essential to design a practical and efficient Delay-Tolerant Network (DTN). The existing literature on DTN assumes either infinite or finite (arbitrary) buffer size of the nodes in the system model; however, it does not quantify the buffer size. In this paper, we propose a large deviations framework to quantify the buffer size of DTN nodes moving according to Random WayPoint (RWP) mobility model and investigate the effect of buffer size in terms of its impact on the performance of underlying message forwarding protocol. Our extensive simulation results show that the performance of the proposed dimensioned buffer model is statistically equivalent to that of the infinite buffer model. Keywords: Delay-tolerant network, buffer dimensioning, routing performance. 1 Introduction Delay-Tolerant Networks (DTNs) are the networks that are attributed by the limitations (such as intermittent connectivity, asymmetric bandwidth, long variable delay, and high error rate) of contemporary networks [2]. DTNs are also referred by different names such as challenged networks, opportunistic networks, Intermittently Connected Mobile Networks (ICMNs), and Vehicular Ad-hoc NETworks (VANETs). The applications of DTN include vehicular networks, disaster response systems, and content distribution in Pocket Switched Networks (PSNs) [5]. In the context of buffer space, the existing literature on DTN assumes either infinite buffer size [10] or finite (arbitrary) buffer size [6], [14] of the nodes in its system model; however, to the best of our knowledge, buffer dimensioning of nodes in DTN is not studied much in detail. Further the store, carry, and forward paradigm [2] of the DTN architecture enables a node to carry the messages until it encounters the destination node or a potential relay node that has high probability of meeting the destination node. Because of this inherent nature of the program model, the nodes (that are bound by an arbitrary buffer size) can L. Bononi et al. (Eds.): ICDCN 2012, LNCS 7129, pp. 502 512, 2012. c Springer-Verlag Berlin Heidelberg 2012

Buffer Dimensioning of Delay-Tolerant Network Nodes 503 not afford to lose messages due to buffer overflow. Thus, a systematic way of quantifying the buffer size is paramount in designing a practical and efficient DTN. In this paper, we propose an analytical framework based on Large Deviations Theory (LDT) [3] to quantify the buffer size of DTN nodes, and investigate the effect of buffer size in terms of its impact on the performance of underlying message forwarding protocol. The extensive simulation results validate the analytical results and show that the performance of the dimensioned buffer model is statistically equivalent to that of the infinite buffer model. In a nutshell, we bring the infinite buffer regime down to the reality platform (i.e., dimensioned buffer model will show the same performance as delivered by the infinite buffer model) and also avoid the bottleneck (due to buffer overflow) as in the case of arbitrarily bound finite buffer models. The organization of this paper is outlined as follows: We motivate our work in Sect. 2 by presenting real-world applications that are related to the system model under consideration. In Sect. 3, we focus on the DTN literature in the context of buffer sizing. Section 4 describes the system model in detail and lists out the notation used in the remainder of this paper. Sections 5 and 6 explain the analytical framework for buffer dimensioning of the DTN nodes and validate the results by extensive simulation in Sect. 7. Finally, we conclude the work and describe some future directions in Sect. 8. 2 Motivation In this section, we present a couple of applications for which the node buffer capacity is to be dimensioned. We consider an animal monitoring application in a terrain over which the animals roam around for grazing. Every animal is attached with a sensor node (henceforth, called as source node in general). These nodes form a mobile DTN. Without loss of generality, the monitoring data could be any sensing data depending on the need. The sensed data is collected by mingling a subset of animals (henceforth, called as destination nodes)thatbelong to a specific herd equipped with the Internet infrastructure. The destination nodes will collect the data from the source node that comes within its coverage area. Later the destination nodes that go back to their herd would offload their collected data via Internet for further processing. The memory in these source nodes is considered to be one of the key resource in determining the cost and size of the sensor device. Hence, the goal of our work is to quantify (at the design phase) the buffer size in these source nodes. In a similar way, this application is general enough to approximate vehicle monitoring applications in a campus, with the campus-shuttles acting as destination nodes and the corresponding shed providing the Internet backbone facility. 3 Related Work Though buffer is considered as the vital resource in DTN modeling, there has been little research in the DTN literature, that focusses on the importance of

504 V. Mahendran, T. Praveen, and C. Siva Ram Murthy the buffer sizing. The overhead in terms of buffer space required at each node is studied in [8]. The trade-off between delivery delay and buffer requirement is investigated across different static probabilistic forwarding protocols and the most buffer efficient scheme among them is found. In a similar way, the authors as a part of their work in [11] study the effect of buffer space on message delivery for the Spray-n-Wait routing protocol; however, these studies focus on the incidental impact of the arbitrarily bound buffer size on the routing performance and hence cannot be used in the design phase of a network, to quantify the size of the buffer. The authors as a part of their work in [12] have computed the average value of per-node buffer occupancy by approximating the system model as M/M/ queue; however, they did not quantify the buffer size in a complete way. 4 System Model In this section, we present the system model that is used in analysis and simulation. The network has a total of N + n d nodes moving according to the Random WayPoint (RWP) mobility model [1]. The essence of the mobility pattern in the animal monitoring application as described in Sect. 2 is said to follow RWP mobility model. The authors in [9] map the group of zebras moving in a rectangular landscape composed of grazing areas and watering holes to the RWP mobility. The animal monitoring application under consideration also uses similar movement patterns with a traffic model on top of it. All destination nodes n d are considered to be the same, i.e., delivering a message to any destination node is deemed as successfully delivered. This is valid because all the destination nodes will go back to the same herd to offload their data, hence no differences among them. Each of the N source nodes generates messages with the arrival rate following the Poisson distribution with parameter λ. The message forwarding scheme is the direct transmission scheme by which the source nodes deliver the messages directly to any one of the destination nodes they encounter. The notation used for this model is specified in Table 1. The Inter-Meeting Time (IMT) between a pair of nodes is defined as the time gap between their two consecutive meetings, as illustrated in Fig. 1. According CT IMT CT CT + IMT CT + IMT IMT CT Contact Time Time IMT Inter Meeting Time Nodes A and B in contact Nodes A and B out of contact Fig. 1. CT and IMT patterns for a typical pair of nodes

Buffer Dimensioning of Delay-Tolerant Network Nodes 505 Table 1. Notation used Notation Meaning N n d N + n d L W λ A R v B No. of source nodes No. of destination nodes Total no. of nodes Packet size (KB) Bandwidth (Mbps) Poisson message generation rate Area of the square terrain Transmission radius of the nodes Constant velocity of the nodes Buffer size (#packets) to the work in [4], under RWP mobility model, the IMT between any pair of nodes is said to follow exponential distribution with parameter Γ given by Γ = 8ωvR (1) πa where ω is the RWP constant with value 1.3683, A is area of the terrain, v is constant velocity of the node, and R is transmission radius of the node. The Contact Time (CT) between two nodes is the period of time during which they are in continuous contact. The CT depends on the velocity v and transmission radius R of the nodes and the IMT in addition (to v and R) depends on the area of the terrain A as well. So the IMT dominates over CT and therefore IMT combined with CT can still be approximated to the exponential distribution with the same parameter Γ. This has been validated by simulating 20 nodes under RWP mobility model and the results in Table 2 show the average rate values (which are also the exponential distribution parameters) of IMT and IMT+CT for various number of destination nodes. The number of times a node meeting the destination node within time t is represented by a random variable N(t). This random variable follows Poisson distribution. With slotted time, the probability that any node being in the range of the destination node in a time slot of length δt is given by P [(N(t + δt) N(t)) = 1] = e ( Γδt) (Γδt) p. (2) 5 Queueing Theory Approximation Adopting a similar framework as in [13], we model each node as an M/M/1/B queue for the RWP mobility model. From Eq. 2, the probability that a source

506 V. Mahendran, T. Praveen, and C. Siva Ram Murthy Table 2. Average rate of IMT and IMT+CT for various n d No.ofdestn.nodesn d 1 2 3 Analytical Γ n d 0.00348 0.00696 0.01044 Empirical IMT 0.0034 0.00672 0.0099 Empirical IMT+CT 0.00327 0.0062 0.00882 node being in the range of any destination node (out of n d of them) is given by n d p. As a source node comes into contact with the destination node, its probability to transfer the message depends upon the other nodes that are within the range of the same destination node (due to the shared medium). Hence, the probability that a source node transfers a message to the destination node d in a time slot is given by N 1 1 P d = n d p k +1 αk (d) (3) k=0 where α k (d) is the probability that exactly k other nodes are in the destination node s vicinity, which is given by ( ) N 1 α k (d) = p k (1 p) N k 1. (4) k The number of time slots required to transfer a message successfully to the destination is represented by the random variable X. This random variable follows geometric distribution given by P [X = n] = (1 P d ) n 1 P d. (5) If P d is very small, this can be approximated to exponential distribution with the parameter μ given by μ = ln(1 P d ). (6) Since the data processing time is negligible as compared to the data transmission time (as physical mobility is involved), the rate μ is considered as service rate of the node. Figure 2 shows the exponential fit of the service rate for a typical node using Quantile-Quantile (Q-Q) plot. The linear behavior of the quantiles clearly shows that the service rate is following the exponential distribution. 6 Buffer Dimensioning Framework In this section, we discuss the analytical framework for buffer dimensioning in DTN. In brief, the buffer size of each queue is studied in terms of buffer overflow probability by using the LDT framework.

Buffer Dimensioning of Delay-Tolerant Network Nodes 507 2000 1800 Dataset quantiles from simulation 1600 1400 1200 1000 800 600 400 200 0 0 500 1000 1500 2000 2500 3000 Theoretical quantiles Fig. 2. Q-Q distribution fitting for the service rate of a typical source node The total number of messages present in the queue Q at time t is equivalent to a recursive collection of number of messages in Q at time t 1 aggregated with the effective number of messages present at time t. Thisisrepresentedby Lindley s recursion as follows: [ ] B Q t = Q t 1 + A t C t (7) 0 where [x] B 0 is max(0, min(x, B)), B is the maximum buffer capacity (in terms of number of messages), A t is the number of messages that arrived in the interval (t 1,t), and C t is the number of messages served at time t. In our context, both A t and C t are Poisson processes. Let Q 0 be the queue size at time 0, subject to the boundary condition that the queue was empty at. The workload process W t is defined as W t =(A 1 C 1 )+ +(A t C t ). Applying the recursion to Eq. 7, Q 0 can be represented as Q (8) 0 =supw s. (9) Assuming that the system had started at a finite time T with queue size being empty, Eq. 9 can be written as s 0 Q = Q T 0 = max 0 s T W s. (10)

508 V. Mahendran, T. Praveen, and C. Siva Ram Murthy Now that the queue size has been described in the form of workload process, we focus on the steady (equilibrium) state of the queue size. This is the state of the queue size when the system is running for a sufficiently long time such that the initial state has no impact on the queue size. If the arrival and service processes are stationary (as in our case) and satisfy the stability conditions (λ <μ), then the queue size Q is said to be in the steady state. We need to study the tail of this steady-state queue length distribution. LDT [3], [7] is a theory of rare events applied to study the asymptotic behavior of the tails of probability distributions. The LDT on queue size [3] states that under stable condition (λ <μ), the probability that the queue size is greater than some large value (P [Q >q ]) decays exponentially as follows: ( ) 1 Q lim l l ln P >q = I(q ) (11) l such that the rate function I(q )isgivenby I(q) =q θ (12) where the slope θ is max{θ : Λ(θ) 0} and Λ(θ) is the cumulant (log moment) generating function of the queue process expressed in terms of arrival and service processes as follows: Λ(θ) =Λ A (θ)+λ C ( θ) (13) such that Λ A (θ) =λ(e θ 1) and Λ C ( θ) =μ(e θ 1). It is clear from Eq. 11 and Eq. 12 that under logarithmic scale the decay rate is linear as a straight line γ = mx, whereγ =lnp (Q >q ), slope m = θ,and x = q. The buffer loss probability exponent γ is considered as the decision parameter and the required buffer size q is computed from Eq. 11 as e γ = e I(q ). Therefore the buffer size q is computed by q = γ θ. (14) 7 Analytical and Simulation Results In this section, we validate the analytical framework presented in the previous section and verify the statistical equivalence of the dimensioned buffer (q from Eq. 14) model with that of the infinite buffer model by studying the performance of routing protocol, using ns-2 simulator. 7.1 Performance Metrics Used Delivery ratio: The ratio of the number of messages delivered at the destination node to the total number of messages generated. Delivery delay: The delay incurred by sending the messages from the source node to the destination node.

Buffer Dimensioning of Delay-Tolerant Network Nodes 509 Table 3. Simulation parameters Parameter Value No. of source nodes (N) 20 No. of destination nodes (n d ) 1 Arrival rate (λ) 0.003 Mobility model RWP Terrain size 500m 500m Transmission radius of the nodes (R) 50m Velocity of the nodes (v) 5m/sec Packet length (L) 1KB Bandwidth (W ) 1Mbps Message loss ratio: The ratio of the number of messages dropped by a source node (due to buffer overflow) to the total number of messages generated in that node (averaged across all source nodes). 7.2 Simulation Setup In this section, we describe the simulation settings in detail. The mobility model is parameterized in such a way that Γ = 0.00348. The complete simulation settings are enlisted in Table 3. TwoRayGround is the propagation model under consideration with all nodes using 802.11 as the MAC protocol. All graphs are plotted with 95% confidence level. 7.3 Simulation Results Figure 3 shows the Complementary Cumulative Distribution Function (CCDF) of the individual queues P [Q >q] plotted in the logarithmic scale for various buffer sizes q. The CCDF is observed to follow a straight line decay with negative slope and is in line with the analytical slope θ. All queues eventually end by tailing off, since beyond some point in time there are no messages in the nodes. This is due to the fact that the rare probabilities can only be captured in a relatively large amount of time. Figure 4 shows the simulation results for n d = 1. The delivery ratio increases with an increase in buffer size. This is because an increase in buffer size reduces the percentage of message drops. The delivery delay also increases with an

510 V. Mahendran, T. Praveen, and C. Siva Ram Murthy 0-2 Analytical slope ln P(Q>q * ) -4-6 -8-10 -12 0 20 40 60 80 100 120 Buffer size q * (in packets) Fig. 3. Log CCDF vs buffer size for different source nodes Table 4. Buffer size q at mean arrival rate 0.003 for various exponential loss probability exponent γ n d θ Buffer size q γ = 1 γ = 2 γ = 3 γ = 4 1 0.03 33.34 66.67 100 133.34 increase in buffer size, since the number of messages that contribute to the delay increases with an increase in the buffer size. The saturation line in Fig. 4 is drawn at the specific buffer size where the message loss ratio reaches zero. This is the buffer size at which the bottleneck (due to the buffer overflow) becomes negligible and the underlying primitive routing protocol does not inhibit the performance. It is clear from Table 4 and Fig. 4 that the dimensioned buffer size q at a reasonable value of the decision parameter γ (such that P (Q >q ) is close to 0 and this occurs at γ < 4) lies far ahead of the saturation point showing clearly that the system at this buffer size in the nodes would provide a performance statistically equivalent to the infinite buffer model.

Buffer Dimensioning of Delay-Tolerant Network Nodes 511 Delivery delay (in seconds) Delivery ratio 11600 10600 9600 8600 7600 6600 5600 4600 3600 2600 1600 600 1 0.9 0.8 q * at γ = -2, P(Q>q*) = 0.13 Saturation line, q * at γ = -3, P(Q>q * ) = 0.049 Delivery delay Message drop ratio q * at γ = -4, P(Q>q*) = 0.018 0 20 40 60 80 100 120 140 160 Buffer size q * (in packets) 1 0.8 0.6 0.4 0.2 Message drop ratio Fig. 4. Performance metrics vs buffer size 8 Conclusion and Future Work In this paper, we proposed a large deviations framework to dimension the buffer size of the DTN nodes moving according to RWP mobility model and demonstrated the effectiveness of this dimensioned buffer model in terms of the performance of the message forwarding protocol (average delivery delay and average delivery ratio) by showing the statistical equivalence to that of the infinite buffer model. We plan to extend this work by investigating the buffer size for a family of generic DTN that involves instability regime as well. Acknowledgement. This work was supported by the Department of Science and Technology, New Delhi, India. References 1. Bettstetter, C., Hartenstein, H., Pérez-Costa, X.: Stochastic Properties of the Random Waypoint Mobility Model. Wireless Networks 10, 555 567 (2004) 2. Cerf, V., Burleigh, S., Hooke, A., Torgerson, L., Durst, R., Scott, K., Fall, K., Weiss, H.: RFC 4838, Delay-Tolerant Networking Architecture. IRTF DTN Research Group (2007) 3. Ganesh, A., O Connell, N., Wischik, D.: Big Queues. Springer, Berlin (2004)

512 V. Mahendran, T. Praveen, and C. Siva Ram Murthy 4. Groenevelt, R.: Stochastic Models for Mobile Ad Hoc Networks. Ph.D. thesis, University of Nice Sophia Antipolis (2005) 5. Hui, P., Chaintreau, A., Scott, J., Gass, R., Crowcroft, J., Diot, C.: Pocket Switched Networks and Human Mobility in Conference Environments. In: WDTN 2005: Proceedings of the ACM SIGCOMM Workshop on Delay-Tolerant Networking, pp. 244 251 (2005) 6. Krifa, A., Barakat, C., Spyropoulos, T.: An Optimal Joint Scheduling and Drop Policy for Delay Tolerant Networks. In: WoWMoM 2008: Proceedings of the International Symposium on World of Wireless, Mobile, and Multimedia Networks, pp. 1 6 (2008) 7. Lewis, J., O Connell, N., Russell, R.: An Introduction to Large Deviations for Teletraffic Engineers (1995), http://www.statslab.cam.ac.uk/~rrw1/ld/ld-tutorial.ps 8. Matsuda, T., Takine, T.: (p, q)-epidemic Routing for Sparsely Populated Mobile Ad hoc Networks. IEEE Journal on Selected Areas in Communications 26(5), 783 793 (2008) 9. Petz, A., Enderle, J., Julien, C.: A Framework for Evaluating DTN Mobility Models. In: Simutools 2009: Proceedings of the 2nd International Conference on Simulation Tools and Techniques, pp. 1 8 (2009) 10. Spyropoulos, T., Psounis, K., Raghavendra, C.S.: Spray and Wait: An Efficient Routing Scheme for Intermittently Connected Mobile Networks. In: WDTN 2005: Proceedings of the ACM SIGCOMM Workshop on Delay-Tolerant Networking, pp. 252 259 (2005) 11. Thompson, N., Nelson, S., Bakht, M., Abdelzaher, T., Kravets, R.: Retiring Replicants: Congestion Control for Intermittently-Connected Networks. In: INFOCOM 2010: Proceedings of the IEEE Conference on Computer Communications, pp. 1 9 (2010) 12. Vahdat, A., Becker, D.: Epidemic Routing for Partially Connected Ad hoc Networks. Tech. Rep. CS-2000-06, Duke University (2000) 13. Wang, Y., Wu, H.: Delay/Fault-Tolerant Mobile Sensor Network (DFT-MSN): A New Paradigm for Pervasive Information Gathering. IEEE Transactions on Mobile Computing 6(9), 1021 1034 (2007) 14. Xu, B., Wolfson, O., Naiman, C.: Machine Learning in Disruption-Tolerant MANETs. ACM Transactions on Autonomous and Adaptive Systems 4(4), 1 36 (2009)