Professional Documents
Culture Documents
=
|
is minimized
}
Here, t represents the time that has passed since the last
meeting of node m
0
with m
1
and
0 1 ( ) m R t m|
is the expected
residual time for node m
0
to meet with node m
1
given that they
have not met in the last t time units.
0 1 ( ) m R t m|
can be
computed with parameters of distribution representing the
intermeeting time between m
0
and m
1
. It can also be computed
International Journal of Engineering Trends and Technology (IJETT) Volume 4 Issue 6- June 2013
ISSN: 2231-5381 http://www.ijettjournal.org Page 2436
in a discrete manner from the contact history of m
0
and m
1
.
Assume that node x observed n intermeeting times with node y
in its past. Let
1 2
( ), ( ),... ( )
n
x x x
y y y t t t
denote these values.
Then:
x R(yt) |
=
1
( )
( )
n
x
x
z
z
z
f y
y t
=
|{t > }|
where
( )
x
z
f y =
( ) ( )
z z
x x
y t if y t
0 Otherwise
t t >
Here, if none of the n observed intermeeting times is
bigger than t (this case occurs less likely as the contact history
grows), a good approximation can be to assume
x R(yt) |
=0.
Fig 4: Path 2 may have smaller Contingent delay than path 1 even though the
CDP fromnode A to node D is through node B.
We will next provide an example to show the benefit of
CDP over DP. Consider the IBN, the weights of edges (A,C)
and (A,B) show the expected residual time of node A with
nodes C and B respectively in both graphs. But the weights of
edges (C,D) and (B,D) are different in both graphs. From the
left graph, we conclude that DP (A,D) follows (A,B,D). Hence,
it is expected that on average a message from node A will be
delivered to node D in 40 time units. However this may not be
the actual shortest delay path. As the weight of edge (C, D)
states in the right graph, node C can have a smaller Contingent
intermeeting time with node D assuming that it has met node
A. This provides node C with a faster transfer of the message
to node D after meeting node A. Hence, in the right graph,
CDP (A, D) is (A,C,D) with the path cost of 30 time units.
Each node forms the aforementioned network model and
collects the standard and Contingent intermeeting times of
other nodes between each other through epidemic link state
protocol as in [10]. However, once the weights are known, it
is not as easy to find CDPs as it is to find DPs. Consider
Figure 4 where the CDP (A, E) follows path 2 and CDP (A, D)
follows (A, B, D). This situation is likely to happen in an IBN,
if
D
(E|B)
D
(E|C) is satisfied.
Given an IBN graph G =(V, E), we obtain a new graph
G =(V, E) where:
V _ V V and E _ V V where
' {( ) ( )} ' {( , ) }
'( ,
)
)
y u y
y u
V y N x and E x z x u
where w z
z y if y k
z otherwise
x
x
= | e = | =
)=
t( | =
t(
Note that the edges in E
b
(in G) are made directional in
G and the edges in E
u
between the same pair of nodes are
separated in E. This graph transformation keeps all the
historical information that Contingent intermeeting times
require and also keeps only the paths with a valid history. For
example, for a path A,B,C,D in G, an edge like (CD,DA) in G
cannot be chosen because of the edge settings in the graph.
Hence, only the correct values will be added to the path
calculation. To solve the CDP problem however, we add one
vertex for source S (apart from its permutations) and one
vertex for destination node D. We also add outgoing edges
from S to each vertex (i
S
) e V with weight R
S
(i|t).
Furthermore, for the destination node, D, we add only
incoming edges from each vertex i
j
e V with weight
i
(D|j).
In Figure 5, we show a sample transformation of a clique
of four nodes to the new graph structure. In the initial graph,
all mobile nodes A to D meet with each other, and we set the
source node to A and destination node to D (we did not show
the directional edges in the original graph for brevity). It can
be seen that we set any path to begin with A on transformed
graph G, but we also put the permutations of A, B and C with
each other.
Running Dijkstras shortest path algorithm on G given
the source node S and destination D will give CDP. In G,
|V | = O (|V|
2
) and |E| = O (|V
3
|) = |E|
3/2
. Therefore
Dijkstras algorithm will run in O (|V
3
|) (with Fibonacci
heaps) while computing regular shortest paths (where edge
costs are standard intermeeting times) takes O (|V|
2
). Using
Contingent instead of standard intermeeting times requires
extra space to store the Contingent intermeeting times and
additional processing as complexity of running Dijkstras
algorithm increases from O (|V|
2
) to O (|V
3
|). We believe that
in current DTNs, wireless devices have enough storage and
processing power not to be unduly taxed with such an increase
[21].
Fig 5: Graph Transformation to solve CDP with 4 Nodes where A is the
source and D the destination node.
IV. REPLICATIONS
Figure 6 shows the delivery rates achieved in CDPW
and DPR algorithms with respect to time (i.e. TTL of
messages) in RollerNet traces [22]. Clearly, CDPW algorithm
delivers more messages than DPR algorithm. Moreover, it
achieves lower average delivery delay than SPR algorithm.
For example, CDPW delivers 80% of all messages after 17
min with an average delay of almost 6 min, while SPR can
achieve the same delivery ratio only after 41 min and with an
average delay of 12 min.
International Journal of Engineering Trends and Technology (IJETT) Volume 4 Issue 6- June 2013
ISSN: 2231-5381 http://www.ijettjournal.org Page 2437
Fig 6: Message delivery ratio vs. time in RollerNet traces.
In Figure 7, we show the delivery rates achieved in
Cambridge traces. As before, CDPW algorithm achieves
higher delivery ratio as SPR algorithm. After 6 days, CDPW
delivers 78% of all messages with an average delay of 2.6
days, while SPR can only deliver 62% of all messages with an
average delay of 3.2 days [23]. The numbers of times a
message is forwarded in SPR and CDPW are 1.73 and 1.78,
respectively, while it is around 16 in epidemic Whipping.
Fig 7: Message delivery ratio vs. time in Cambridge traces.
These results show that the Contingent intermeeting time
represents link cost better than the standard intermeeting time.
Therefore, in CDPW, more effective paths with similar
average hop counts are selected to route messages.
Consequently, higher delivery rates with lower end-to-end
delays are achieved. In SPR and CDPW algorithms here, we
used source-routing and let the messages follow the paths
which are decided at the source nodes [24].
V. CONCLUSION
In this paper, we introduced a new metric called
Contingent intermeeting time inspired by the results of the
recent studies showing that nodes intermeeting times are not
memory less and that motion patterns of mobile nodes are
frequently repetitive. Then, we looked at the effects of this
metric on the Diminished Path based Whipping in DTNs. For
this purpose, we updated the Diminished Path based Whipping
algorithms using Contingent intermeeting times and proposed
to route the messages over Contingent Diminished Paths.
REFERENCES
[1] Delay tolerant networking research group, http://www.dtnrg.org.
[2] T. Spyropoulos, K. Psounis,C. S. Raghavendra, Efficient routing
in intermittently connected mobile networks: The single-copy
case, IEEE/ACM Transactions on Networking, vol. 16, no. 1,
Feb. 2008.
[3] J . Burgess, B. Gallagher, D. Jensen, and B. N. Levine, MaxProp:
Routing for Vehicle-Based Disruption- Tolerant Networks, In
Proc. IEEE Infocom, April 2006.
[4] A. Vahdat and D. Becker, Epidemic routing for partially
connected adhoc networks, Duke University, Tech. Rep. CS-
200006, 2000.
[5] T. Spyropoulos, K. Psounis,C. S. Raghavendra, Efficient routing
in intermittently connected mobile networks: The multi-copy
case, IEEE/ACM Transactions on Networking, 2008.
[6] Y. Wang, S. Jain, M. Martonosi, and K. Fall, Erasure coding
based routing for opportunistic networks, in Proceedings of ACM
SIGCOMM workshop on Delay Tolerant Networking (WDTN),
2005.
[7] S. J ain, K. Fall, and R. Patra, Routing in a delay tolerant network,
in Proceedings of ACM SIGCOMM, Aug. 2004.
[8] T. Spyropoulos, K. Psounis,C. S. Raghavendra, Spray and Wait:
An Efficient Routing Scheme for Intermittently Connected Mobile
Networks, ACM SIGCOMM Workshop, 2005.
[9] A. Lindgren, A. Doria, and O. Schelen, Probabilistic routing in
intermittently connected networks, SIGMOBILE Mobile
Computing and Communication Review, vol. 7, no. 3, 2003.
[10] E. P. C. J ones, L. Li, and P. A. S. Ward, Practical routing in
delay tolerant networks, in Proceedings of ACM SIGCOMM
workshop on Delay Tolerant Networking (WDTN), 2005.
[11] A. Chaintreau, P. Hui, J. Crowcroft, C. Diot, R. Gass, and J .
Scott, Impact of Human Mobility on the Design of Opportunistic
Forwarding Algorithms, in Proceedings of INFOCOM, 2006.
[12] X. Zhang, J. F. Kurose, B. Levine, D. Towsley, and H. Zhang,
Study of a Bus-Based Disruption Tolerant Network: Mobility
Modeling and Impact on Routing, In Proceedings of ACM
MobiCom, 2007.
[13] S. Srinivasa and S. Krishnamurthy, CREST: An Opportunistic
Forwarding Protocol Based on Conditional Residual Time, in
Proceedings of IEEE SECON, 2009.
[14] P. U. Tournoux, J . Leguay, F. Benbadis, V. Conan, M. Amorim,
J . Whitbeck, The Accordion Phenomenon: Analysis,
Characterization, and Impact on DTN Routing, in Proceedings of
Infocom, 2009.
[15] C. Liu and J. Wu, Routing in a Cyclic Mobispace, In
Proceedings of ACM Mobihoc, 2008.
[16] H. Dubois-Ferriere, M. Grossglauser, and M. Vetterli, Age
Matters: Efficient Route Discovery in Mobile Ad Hoc Networks
Using Encounter Ages, In Proceedings of ACM MobiHoc, 2003.
[17] T. Spyropoulos, K. Psounis, and C. Raghavendra, Spray and
Focus: Efficient Mobility-Assisted Routing for Heterogeneous
and Correlated Mobility, In Proceedings of IEEE PerCom, 2007.
[18] E. Daly and M. Haahr, Social network analysis for routing in
disconnected delay-tolerant manets, In Proceedings of ACM
MobiHoc, 2007.
[19] P. Hui, J. Crowcroft, and E. Yoneki, BUBBLE Rap: Social
Based Forwarding in Delay Tolerant Networks, In Proc. of ACM
MobiHoc, 2008.
[20] A European Union funded project in Situated and Autonomic
Communications, www.haggleproject.org.
[21] D. Bertsekas, and R. Gallager, Data networks (2nd ed.), 1992.
[22] C. Liu and J . Wu, An Optimal Probabilistically Forwarding
Protocol in Delay Tolerant Networks, in Proceedings of
MobiHoc, 2009.
[23] J . Leguay, A. Lindgren, J . Scott, T. Friedman, J . Crowcroft and
P. Hui, CRAWDAD data set upmc/content (v. 2006-11-17),
downloaded from http://crawdad.cs.dartmouth.edu/upmc/content,
2006.
[24] Y. Wang, P. Zhang, T. Liu, C. Sadler and M. Martonosi,
http://crawdad.cs.dartmouth.edu/princeton/zebranet,
CRAWDAD data set princeton/zebranet (v. 2007-02-14), 2007.