Improvement of Buffer Scheme for Delay Tolerant Networks

Similar documents
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES

Performance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey. Namita Mehta 1 and Mehul Shah 2

Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay

A Joint Replication-Migration-based Routing in Delay Tolerant Networks

Energy Consumption and Performance of Delay Tolerant Network Routing Protocols under Different Mobility Models

Routing Protocol Approaches in Delay Tolerant Networks

Buffer Management in Delay Tolerant Networks

Archna Rani [1], Dr. Manu Pratap Singh [2] Research Scholar [1], Dr. B.R. Ambedkar University, Agra [2] India

Routing in a Delay Tolerant Network Sushant Jain, Kevin Fall and Rabin Patra SIGCOMM Presented by Xun Gong

Design and Implementation of Improved Routing Algorithm for Energy Consumption in Delay Tolerant Network

Performance Analysis of Delay Tolerant Network Routing Protocols in Different Mobility Environments

Community-Based Adaptive Buffer Management Strategy in Opportunistic Network

Energy Efficient Social-Based Routing for Delay Tolerant Networks

A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS

Using local speed information as routing metric for delay tolerant networks

Buffer Aware Routing in Interplanetary Ad Hoc Network

Simulation of Epidemic, Spray and Wait and First Contact Routing Protocols in Delay Tolerant Network

MDR Based Cooperative Strategy Adaptation in Wireless Communication

A Genetic-Neural Approach for Mobility Assisted Routing in a Mobile Encounter Network

Replica Distribution Scheme for Location-Dependent Data in Vehicular Ad Hoc Networks using a Small Number of Fixed Nodes

Keywords: Store and carry networks, Forwarding strategies, routing, DTN, Minimum hop transmission

Routing with Multi-Level Social Groups in Mobile Opportunistic Networks

1. INTRODUCTION. Saravanan.A 1 and Dr.Sunitha Abburu 2

COMPARATIVE ANALYSIS OF DIFFERENT ROUTING PROTOCOLS IN DELAY TOLERANT NETWORKS

A DTN Packet Forwarding Scheme Inspired by Thermodynamics

Routing Issues & Performance Of Different Opportunistic Routing Protocols In Delay Tolerant Network

Friendship Based Routing in Delay Tolerant Mobile Social Networks

Combined Mobile Ad-hoc and Delay/Disruption-tolerant Routing

Heterogeneous Community-based Routing in Opportunistic Mobile Social Networks

Probabilistic Routing With Multi-copies in Delay Tolerant Networks

Routing in Large-Scale Buses Ad Hoc Networks

Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks

Epidemic Routing for Partially-Connected Ad Hoc Networks

WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks

Keywords: Detection, Disruption Tolerant Networks, Mitigation, Routing Misbehavior, Security.

Delay-Differentiated Gossiping in Delay Tolerant Networks

Application of Graph Theory in DTN Routing

Capacity-Aware Routing Using Throw-Boxes

CLUSTERING BASED ROUTING FOR DELAY- TOLERANT NETWORKS

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network

Impact of Social Networks in Delay Tolerant Routing

An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs

DTN-based Delivery of Word-of-Mouth Information with Priority and Deadline

Estimation based Erasure-coding Routing in Delay Tolerant Networks

ABSTRACT I. INTRODUCTION II. CHARACTERISTICS OF DELAY TOLERANT NETWORKS

TRUST FRAMEWORK FOR DATA FORWARDING IN OPPORTUNISTIC NETWORKS USING MOBILE TRACES

A New Distance Independent Localization Algorithm in Wireless Sensor Network

Impact of Social Networks on Delay Tolerant Routing

Minimizing Average Spraying Cost for Routing in Delay Tolerant Networks

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS

PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS

Simulation and Analysis of Opportunistic Routing Protocols

MaxHopCount: DTN congestion control algorithm under MaxProp routing

sensors ISSN

A comprehensive-integrated buffer management strategy for opportunistic networks

Spray and forward: Efficient routing based on the Markov location prediction model for DTNs

International Journal of Advancements in Research & Technology, Volume 2, Issue1, January ISSN

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks

Probability Delegation Forwarding in Delay Tolerant Networks

Spray and Dynamic: Advanced Routing in Delay Tolerant Networks

CFP: Integration of Fountain Codes and Optimal Probabilistic Forwarding in DTNs

Hierarchical Trust Management for Delay Tolerant Networks Using Stochastic Petrinet for Secure Routing

Multicasting in Delay Tolerant Networks: Semantic Models and Routing Algorithms

DTN Routing in Vehicular Sensor Networks

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

A SURVEY ON OPPORTUNISTIC ROUTING PROTOCOLS IN CELLULAR NETWORK FOR MOBILE DATA OFFLOADING

A routing algorithm on delay-tolerant of wireless sensor network based on the node selfishness

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

Social-Similarity-based Multicast Algorithm in Impromptu Mobile Social Networks

PROFICIENT CLUSTER-BASED ROUTING PROTOCOL USING EBSA AND LEACH APPROACHES

Modeling Redundancy-based Routing in Delay Tolerant Networks

IJSER. 1. Introduction. 1.1 Routing in DTN: Sukhpreet Kaur

On Information Sharing Scheme for Automatic Evacuation Guiding System Using Evacuees Mobile Nodes

Network Coding Efficiency In The Presence Of An Intermittent Backhaul Network

BUFFER MANAGEMENT FOR PREFERENTIAL DELIVERY IN OPPORTUNISTIC DELAY TOLERANT NETWORKS

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

ChitChat: An Effective Message Delivery Method in Sparse Pocket-Switched Networks

A Multimedia Delivery System for Delay-/Disruption-Tolerant Networks

An Efficient Peer-to-Peer Distributed Scheduling for Content Based File Sharing in Manet

Improved MAC protocol for urgent data transmission in wireless healthcare monitoring sensor networks

Partial Caching Scheme for Streaming Multimedia Data in Ad-hoc Network

Available online at ScienceDirect. Procedia Computer Science 57 (2015 )

International Journal of Innovative Research in Technology & Science A DTN ROUTING BASED ON AN ADAPTIVE DYNAMIC AGING FACTOR IN URBAN ENVIRONMENTS

Vertex-Based Multihop Vehicle-to-Infrastructure Routing for Vehicular Ad Hoc Networks

Research Article Probabilistic Routing Based on Two-Hop Information in Delay/Disruption Tolerant Networks

UAV ASSISTED DISRUPTION TOLERANT ROUTING

Timely Information Dissemination with Distributed Storage in Delay Tolerant Mobile Sensor Networks

ANewRoutingProtocolinAdHocNetworks with Unidirectional Links

A Review on Routing In Partially Connected Ad-Hoc Network

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

ENSC 427: COMMUNICATION NETWORK PROJECT PRESENTATION Spring 2010 Instructor: Ljiljana Trajkovic. Message Ferrying

NECTAR: A DTN Routing Protocol Based on Neighborhood Contact History

Integrated Routing Protocol for Opportunistic Networks

An Energy Efficient Data Dissemination Algorithm for Wireless Sensor Networks

Performance Analysis of Routing Protocol in Delay Tolerant Network

International Journal of Computer Engineering and Applications, Volume XII, Special Issue, August 18, ISSN

Optimal Buffer Management Policies for Delay Tolerant Networks

TTN: A Time-to-Network Approach to Data Reporting in Mobile Ad Hoc Networks

Threshold Based Best Custodian Routing Protocol for Delay Tolerant Network

Transcription:

Improvement of Buffer Scheme for Delay Tolerant Networks Jian Shen 1,2, Jin Wang 1,2, Li Ma 1,2, Ilyong Chung 3 1 Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science &Technology, Nanjing,210044,China 2 School of Computer & Software, Nanjing University of Information Science &Technology, Nanjing, 210044, China 3 Department of Computer Engineering, Chosun University, Gwangju, 501759, South Korea E-mail: s_shenjian@126.com Abstract. Delay Tolerant Networks (DTNs) are a class of emerging networks where disconnections may occur frequently. Delay is inevitable in DTNs, thus, making better use of buffer space to maximize the packet delivery rate is more important than concentrating on how to decrease the delay. In this paper, we improve the buffer scheme of Epidemic Routing for DTNs, which is a wellknown routing protocol in DTNs. We improve the buffer scheme by rearranging the drop sequence on the basis of the location and direction information of nodes. We hope that the improved buffer scheme is able to guarantee the high packet delivery ratio under small buffer size. Keywords: Delay Tolerant Networks (DTNs), buffer scheme, packet delivery. 1 Introduction DTNs are a practical class of emerging networks, which are an occasionally connected network comprised of one or more protocol families and experience frequent and long-duration partitions as well as long delay [1]. The traditional view of a network as a connected graph over which end-to-end paths need to be established might not be appropriate for modeling existing and emerging wireless networks[2]. Because there is no guarantee of end-to-end connectivity in DTNs, the routing protocols which have good performance in the conventional networks are not suitable for DTNs[3]. Lots of routing protocols in DTNs have been studied in [4, 5, 6, 7, 8, 9, 10, 12, 13]. Among them, the first and most popular routing protocol in DTNs is Epidemic Routing [4], which disseminates a message replica to every node in the network. Epidemic Routing uses the simplest policy called first-in-first-out (FIFO) as its buffer scheme. This policy is simple to implement and bounds the amount of time that a The corresponding author ITCS 2013, ASTL Vol. 25, pp. 384-390, 2013 SERSC 2013 384

Proceedings, The 2nd International Conference on Information Technology and Computer Science particular message is likely to remain live. As long as the buffer size on all hosts is larger than the expected number of messages in transit at any given time, FIFO is a very reasonable policy. In this paper, we improve the buffer scheme of Epidemic Routing by re-arranging the drop sequence. Compared with other proposed buffer management schemes in DTNs, the most distinguished difference in our paper is the improvement utilizes the location and moving direction information of nodes to determine the drop sequence. A node can get the location and moving direction information of other nodes by receiving beacon packets periodically from anchor nodes and referring to received signal strength indicator (RSSI) [11] for the beacon. In particular, the improved buffer scheme is able to guarantee the high packet delivery ratio under small buffer size. The rest of this paper is organized as follows. In the following section, the related work on the buffer management scheme in DTNs is briefly discussed. The improved buffer scheme is described in detail in Section 3. Finally, the conclusions and future works are covered in Section 4. 2 Related Works In DTNs, all of the node can become the carrier, which can take the message from one node to another. In this way, messages are quickly distributed through the networks due to the random mobility. Epidemic Routing relies upon carriers coming into contact with another node in the network by node mobility [4]. Using Epidemic Routing messages can be ensured that they have a high probability of the transmitting. Meanwhile the resource of network is consumed heavily. Thus, the objective of Epidemic Routing is to maximize the delivery rate, while minimize the transmit latency and the consumption of the resources. The critical resource in Epidemic Routing is the buffer. Epidemic Routing uses FIFO as its buffer scheme. This policy is simple to implement and bounds the amount of time that a particular message is likely to remain live. Once enough new messages have been introduced into the system, older messages are likely to be flushed from most buffers. As long as the buffer size on all hosts is larger than the expected number of messages in transit at any given time, FIFO is a very reasonable policy. Hence, epidemic routing is very sensitive to the buffer size and can only achieve good performance with respect to infinite buffer size. In this paper, we assume that a node should not discard its own valid messages to create places in its buffer for accommodating new messages forwarded by other nodes. If all buffered messages are source ones, and the arriving message is also a source message, then we choose to delete the oldest one. This intuitive idea of giving priority to source messages has been proposed in [13] and was shown to improve the average delivery rate. The improved buffer scheme utilizes the location and moving direction information of nodes to determine the drop sequence. By the way, a node can get the location and moving direction information of other nodes by receiving beacon packets periodically from anchor nodes and referring to received signal strength indicator (RSSI) for the beacon. 385

Improvement of Buffer Scheme for Delay Tolerant Networks 3 The Improved Buffer Scheme 3.1 Key idea We make use of anchor nodes to estimate the location and moving direction information of the nodes. Depending on this information, we choose the drop sequence. During this process, some priority information (e.g. the validity of the message, the security of the message, transmission speed request, the value of information, the cost of the message, the distance to the destination and the direction to the destination) is employed to decide which message should be dropped or be transferred to other nodes having available buffer space. Fig. 1. An example of calculating node s moving direction by using location information. General nodes obtain the location information by making use of RSSI technique. As we known, in RSSI, one general node wanted to estimate its location should at least connect with three anchor nodes so as to calculate the location by trilateration. Moreover, by utilizing the location information, the general node can easily calculate its moving direction information. For example, seen from Fig.1, the location of node X in time T 1 and T 2 are (x 1, y 1 ) and (x 2, y 2 ), respectively, then we define the moving direction of node X is: θ = arctan(( y y )/( x x )). We also can calculate the 2 1 2 1 moving speed of node X: S x = ( x x ) + ( y y ) 2 2 2 1 2 1 T T 2 1. Observed from Fig. 1, we note that the message transmission direction is α. If θ α 45, then we think the node s moving direction is same with the message s transmission direction. Every node stores its own location and moving direction information. In order to minimize the communication overhead, however, all the information will not be exchanged with each other unless they are required between the nodes. Moreover, when an anchor node is situated in the transmission range of a certain general node, the information of this general node can be stored in this anchor node. For simply description, we can also say that this anchor node lists this general node. After some time interval, yet, the anchor node should update its list so as to re-obtain the latest 386

Proceedings, The 2nd International Conference on Information Technology and Computer Science location and moving direction information of the general nodes, whose radio transmission range covers this anchor node. 3.1 Improved buffer scheme in detail For explaining the improved buffer scheme in detail, an explicit example is given in Fig. 2. We assume that node S is the source and node D is the destination. Node A is supposed to be the best next hop determined by the transmission scheme described above. Nodes B, C, E, and F are in the transmission range of node A but not in the range of node S. There is a message which intends to be transmitted from node S to node A. Fig. 2. An example in drop scheme. Fig. 3. Priority comparing algorithm in drop scheme. 387

Improvement of Buffer Scheme for Delay Tolerant Networks First, node S sends a transmission request to node A. After receiving the request, node A checks its buffer space to determine whether or not the buffer space is available. Node A replies to node S and permits the transmission only if node A s buffer space is not full. Then node S sends the new message to node A. However, if node A s buffer space is full, node A still replies to node S and only permits to accept the priority information of this message sent from node S. Then node A compares this priority information with others which have already stored in node A s buffer space. Fig. 4 explains the detailed steps of the priority comparing algorithm in drop scheme. Here, pnew represents the priority of the new message needed to be delivered to the destination, on the contrary, pold delegates the priority of the old message stored in node A. If pnew is lower than all the polds, then node A will refuse this new message to be transmitted from node S to node A or permit it until node A s buffer is available again. In this condition, hence, node A sends the "refuse" reply to node S (line 1-2 in Fig. 4). However, if p new is higher than some of p old s, then one message with the lowest priority in node A will be dropped or be allocated to other available buffer space in other nodes in order to make space for storing this new message (line 3). First, node A broadcasts the "buffer available" request to all its neighbors to do the judgment which node s buffer space is available. If there is one neighbor node whose buffer space is available and the available size is more than 1/2 of its total size. Then this node replies to node A and allows accepting the lowest priority message sent from node A. In this case, the new message can be transferred from node S to node A successfully (line 5-12). In our example according to Fig. 2, we suppose that node B s buffer is available and the available size is more than 1/2 of its total size, while node C s buffer is also available, however C s available size is less than 1/2 of its total size. In addition, node E has an empty buffer space that can be available completely. To the contrary, node F s buffer is not available completely. Hence, nodes B and E reply to node A, while nodes F and C keep silent. This is easy to be explained because only node B or E having enough available buffer space can accept this lowest priority message. Secondly, node A broadcasts the "moving direction" request to nodes B and E. We assume that node B s moving direction is opposite with the message s direction while node E s is same. Therefore, indubitability, node E replies to node A and permits to accept the lowest priority message sent from node A. In this case, node A can make room for the new message from node S. Finally, node A replies to S and permits the new message to be delivered (line 13-24). Of course, there exists another case. When node B and node E have the same moving direction with the message s direction, the message with the lowest priority in node A will be sent to one of them randomly (line 25-31). In the worst case, additionally, if all the neighbors buffer spaces are not available or their available buffer spaces are all less than 1/2 of their buffer spaces respectively, then the message with the lowest priority in node A will be dropped so that node A can accept the new message (Line 32-37). After the message successfully being transmitted from node S to node A, according to all the messages priority, node A continues deciding the next hop of the highest priority message until this message arriving at the destination by using the same drop scheme. 388

Proceedings, The 2nd International Conference on Information Technology and Computer Science 4 Conclusions and Future works In this paper, we have investigated buffer management scheme in Epidemic Routing, where a simple policy FIFO is employed to increase the packet delivery rate. However, this buffer scheme exhausts the buffer size hastily. Therefore, we improve the buffer management scheme in order to enhance the performance of Epidemic Routing, which utilizes the location and moving direction of nodes to determine the drop sequence. We have shown that a node can get the location and moving direction of other nodes by receiving beacon packets periodically from anchor nodes and referring to received signal strength indicator (RSSI) for the beacon. On the other hand, the improved buffer scheme takes advantages of the nodes information of the location and moving direction to store the message into buffer space. We hope that the improved buffer scheme is able to ensure good performance with a higher packet delivery rate and lower routing overhead. In the future, we will use the simulation tool such as NS-2 to test the performance of the improved buffer scheme. Acknowledgement. This work was supported by the research fund from Nanjing University of Information Science and Technology under Grant No. S8113003001, National Science Foundation of China under Grant No. 61272421, and Natural science fund for colleges and universities in Jiangsu Province under Grant No. 12KJB520006, and by Natural Science Foundation of Jiangsu Province (No. BK2012461). References 1. Fall, K.: A Delay-Tolerant Network Architecture for Challenged Internets. In: Annual Conf. of the Special Interest Group on Data Communication (ACM SIGCOMM 03), pp. 27-34 (2003) 2. Krifa, A., Barakat, C., Spyropoulos, T.: Optimal Buffer Management Policies for Delay Tolerant Networks. In: 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks Workshops (2008). 3. Lindgren, A., Doria, A., Schelen, O.: Probabilistic Routing in Intermittently Connected Networks. In: ACM SIGMOBILE Mobile Computing and Communications Review, Vol. 7, Issue 3, pp. 19-20 (2003) 4. Vahdat, A., and Becker, D.: Epidemic Routing for Partially-Connected Ad Hoc Networks. Technical Report, CS-200006, Duke University (2000) 5. Ramanathan, R., Hansen, R., Basu, P., Hain, R. R., Krishnan, R.: Prioritized Epidemic Routing for Opportunistic Networks. In: ACM MobiSys workshop on Mobile Opportunistic Networks (MobiOpp 2007) (2007) 6. Jain, S., Fall, K., Patra, R.: Routing in a delay tolerant network. In: ACM SIGCOMM (2004) 7. Jones, E. P. C., Ward, P. A. S.: Routing Strategies for Delay-Tolerant Networks. Computer Communication Review (2008) 389

Improvement of Buffer Scheme for Delay Tolerant Networks 8. Jones, E. P. C., Li, L., Ward, P. A. S.: Practical Routing in Delay-tolerant Networks. In: ACM SIGCOMM workshop on Delay-tolerant networking, pp. 237-243 (2005) 9. Liu, C., Wu, J.: Scalable Routing in Delay Tolerant Networks. In: MobiHoc 07, pp. 51-60 (2007) 10. Shen, J., Moh, S., Chung, I.: Routing Protocols in Delay Tolerant Networks: A Comparative Survey. In: 23rd International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC), pp.1577-1580 (2008) 11. Received signal strength indication http://en.wikipedia.org/wiki/received_signal_strength_indication. 12. Massri, K., Vernata, A., Vitaletti, A.: Routing Protocols for Delay Tolerant Networks: a Quantitative Evaluation. In: ACM MSWiM 12, pp. 1-8 (2012) 13. Zhu, Y., Xu, B., Shi, X., Wang, Y.: A Survey of Social-Based Routing in Delay Tolerant Networks: Positive and Negative Social Effects. IEEE Communications Surveys & Tutorials, vol.15, no. 1, pp. 387 401 (2013) 390