SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
Conditional Shortest Path Routing in
                           Delay Tolerant Networks
                             Eyuphan Bulut, Sahin Cem Geyik, Boleslaw K. Szymanski
                 Department of Computer Science and Center for Pervasive Computing and Networking
                        Rensselaer Polytechnic Institute, 110 8th Street, Troy, NY 12180, USA
                                        {bulute, geyiks, szymansk}@cs.rpi.edu

   Abstract—Delay tolerant networks are characterized by the                 routing algorithms with different objectives (high delivery rate
sporadic connectivity between their nodes and therefore the lack             etc.) and different routing techniques (single-copy [2] [3],
of stable end-to-end paths from source to destination. Since the             multi-copy [4] [5], erasure coding based [6] etc.) have been
future node connections are mostly unknown in these networks,
opportunistic forwarding is used to deliver messages. However,               proposed recently. However, some of these algorithms [7] used
making effective forwarding decisions using only the network                 unrealistic assumptions, such as the existence of oracles which
characteristics (i.e. average intermeeting time between nodes)               provide future contact times of nodes. Yet, there are also many
extracted from contact history is a challenging problem. Based               algorithms (such as [8]-[10]) based on realistic assumption
on the observations about human mobility traces and the findings              of using only the contact history of nodes to route messages
of previous work, we introduce a new metric called conditional
intermeeting time, which computes the average intermeeting time              opportunistically.
between two nodes relative to a meeting with a third node                       Recent studies on routing problem in DTN’s have focused
using only the local knowledge of the past contacts. We then                 on the analysis of real mobility traces (human [11], vehicu-
look at the effects of the proposed metric on the shortest path              lar [12] etc.). Different traces from various DTN environments
based routing designed for delay tolerant networks. We propose               are analyzed and the extracted characteristics of the mobile
Conditional Shortest Path Routing (CSPR) protocol that routes
the messages over conditional shortest paths in which the cost               objects are utilized on the design of routing algorithms for
of links between nodes is defined by conditional intermeeting                 DTN’s. From the analysis of these traces performed in previ-
times rather than the conventional intermeeting times. Through               ous work, we have made two key observations. First, rather
trace-driven simulations, we demonstrate that CSPR achieves                  than being memoryless, the pairwise intermeeting times be-
higher delivery rate and lower end-to-end delay compared to the              tween the nodes usually follow a log-normal distribution [13]
shortest path based routing protocols that use the conventional
intermeeting time as the link metric.                                        [14]. Therefore, future contacts of nodes become dependent
                                                                             on the previous contacts. Second, the mobility of many real
                                                                             objects are non-deterministic but cyclic [15]. Hence, in a cyclic
                         I. I NTRODUCTION                                    MobiSpace [15], if two nodes were often in contact at a
   Routing in delay tolerant networks (DTN) is a challenging                 particular time in previous cycles, then they will most likely
problem because at any given time instance, the probability                  be in contact at around the same time in the next cycle.
that there is an end-to-end path from a source to a destination                 Additionally, previous studies ignored some information
is low. Since the routing algorithms for conventional networks               readily available at transfer decisions. When two nodes (e.g., A
assume that the links between nodes are stable most of the                   and B) meet, the message forwarding decision is made accord-
time and do not fail frequently, they do not generally work                  ing to a delivery metric (encounter frequency [9], time elapsed
in DTN’s. Therefore, the routing problem is still an active                  since last encounter [16] [17], social similarity [18] [19] etc.)
research area in DTN’s [1].                                                  of these two nodes with the destination node (D) of the
   Routing algorithms in DTN’s utilize a paradigm called                     message. However, all these metrics depend on the separate
store-carry-and-forward. When a node receives a message                      meeting histories of nodes A and B with destination node D1 .
from one of its contacts, it stores the message in its buffer and            Nodes A and B do not consider their meetings with each other
carries the message until it encounters another node which is                while computing their delivery metrics with D.
at least as useful (in terms of the delivery) as itself. Then the               To address these issues, we redefine the intermeeting time
message is forwarded to it. Based on this paradigm, several                  concept between nodes and introduce a new link metric called
                                                                             conditional intermeeting time. It is the intermeeting time
   Research was sponsored by US Army Research Laboratory and the             between two nodes given that one of the nodes has previously
UK Ministry of Defence and was accomplished under Agreement Number           met a certain other node. For example, when A and B meet, A
W911NF-06-3-0001. The views and conclusions contained in this document
are those of the authors and should not be interpreted as representing the   (B) defines its conditional intermeeting time with destination
official policies, either expressed or implied, of the US Army Research       D as the time it takes to meet with D right after meeting
Laboratory, the U.S. Government, the UK Ministry of Defence, or the UK
Government. The US and UK Governments are authorized to reproduce and           1 Some algorithms ([9], [17]) use transitivity to reflect the effect of other
distribute reprints for Government purposes notwithstanding any copyright    nodes on the delivery capability of a node but this update can be applied for
notation hereon.                                                             all delivery metrics and it does not reflect the metric’s own feature.

978-1-4244-7265-9/10/$26.00 c 2010 IEEE
B (A). This updated definition of intermeeting time is also                                                                               B
more convenient for the context of message routing because
the messages are received from a node and given to another                                                                3 time units/
                                                                                                     4 time units/cycle
node on the way towards the destination. Here, conditional                                                                     cycle

intermeeting time represent the period over which the node
holds the message.                                                                                                        2 time units
                                                                                                                                         C
                                                                                                              A               cycle
   To show the benefits of the proposed metric, we adopted it
for the shortest path based routing algorithms [7] [10] designed
for DTN’s. We propose conditional shortest path routing
                                                                               Fig. 1. A physical cyclic MobiSpace with a common motion cycle of 12
(CSPR) protocol in which average conditional intermeeting                      time units.
times are used as link costs rather than standard2 intermeeting
times and the messages are routed over conditional shortest
paths (CSP). We compare CSPR protocol with the exist-                          they will probably be in contact around the same time in the
ing shortest path (SP) based routing protocol through real-                    next cycle. Consider the sample cyclic MobiSpace with three
trace-driven simulations. The results demonstrate that CSPR                    objects illustrated in Figure 1. The common motion cycle is
achieves higher delivery rate and lower end-to-end delay com-                  12 time units, so the discrete probabilistic contacts between
pared to the shortest path based routing protocols. This shows                 A and B happen in every 12 time units (1, 13, 25, ...) and
how well the conditional intermeeting time represents inter-                   between B and C in every 6 time units (2, 8, 14, ...). The
node link costs (in the context of routing) and helps making                   average intermeeting time between nodes B and C indicates
effective forwarding decisions while routing a message.                        that node B can forward its message to node C in 6 time
   The rest of the paper is organized as follows. In Section II,               units. However, the conditional intermeeting time of B with C
the proposed metric is described in detail. In Section III,                    relative to prior meeting of node A indicates that the message
we present CSPR protocol and in Section IV, we give the                        can be forwarded to node C within one time unit.
results of real-trace-driven simulations. Finally, we provide                     In a DTN, each node can compute the average of its standard
conclusions and outline the future work in Section V.                          and conditional intermeeting times with other nodes using its
                                                                               contact history. In Algorithm 1, we show how a node, s,
            II. C ONDITIONAL I NTERMEETING T IME
                                                                               can compute these metrics from its previous meetings. The
   An analysis of real mobility traces has been done in                        notations we use in this algorithm (and also throughout the
different environments (office [13], conference [20], city [23],                paper) are listed below with their meanings:
skating tour [14]) with different objects (human [11], bus [12],                 •   τA (B): Average time that elapses between two consec-
zebra [24]) and with variable number of attendants and led to                        utive meetings of nodes A and B. Obviously when the
significant results about the aggregate and pairwise mobility                         node connections are bidirectional, τA (B) = τB (A).
characteristics of real objects. Recent analysis [13] [14] [20]                  •   τA (B|C): Average time it takes for node A to meet
on real mobility traces have demonstrated that models assum-                         node B after it meets node C. Note that, τA (B|C) and
ing the exponential distribution of intermeeting times between                       τB (A|C) are not necessarily equal.
pairs of nodes do not match real data well. Instead up to                        •   S: N × N matrix where S(i, j) shows the sum of
99% of intermeeting times in many datasets is log-normal                             all samples of conditional intermeeting times with node
distribution. This makes the pairwise contacts between nodes                         j relative to the meeting with node i. Here, N is the
depend on their pasts. Such a finding invalidates a common                            neighbor count of current node (i.e. N (s) for node s).
assumption [8] [17] [25] that the pairwise intermeeting times                    •   C: N × N matrix where C(i, j) shows the total number
are exponentially distributed and memoryless. More formally,                         of conditional intermeeting time samples with node j
if X is the random variable representing the intermeeting time                       relative to its meeting with node i.
between two nodes, P (X > s + t | X > t) = P (X >                                •   βi : Total meeting count with node i.
s) for s, t > 0. Hence, the residual time until the next meeting
of two nodes can be predicted better if the node knows that it                   In Algorithm 1, each node first adds up times expired
has not met the other node for t time units [13].                              between repeating meetings of one neighbor and the meeting
   To take advantage of such knowledge, we propose a new                       of another neighbor. Then it divides this total by the number
metric called conditional intermeeting time that measures the                  of times it has met the first neighbor prior to meeting the
intermeeting time between two nodes relative to a meeting                      second one. For example, if node A has two neighbors (B
with a third node using only the local knowledge of the past                   and C), to find the conditional intermeeting time of τA (B|C),
contacts. Such measure is particularly beneficial if the nodes                  each time node A meets node C, it starts a different timer.
move in a cyclic so-called MobiSpace [15] in which if two                      When it meets node B, it sums up the values of these timers
nodes contact frequently at particular time in previous cycles,                and divides the results by the number of active timers before
                                                                               deleting them. This computation is repeated again each time
   2 We use the terms conventional and standard interchangeably while refer-   node B is encountered. Then, the total of times collected from
ring to the commonly used intermeeting time metric.                            each timer is divided by the total count of timers used, to find
Algorithm 1 update (node m, time t)                                                                       5 units

 1: if m is seen first time then                                                                               2 units         2 units

 2:    firstTimeAt[m] ← t
                                                                                        B             C       CB              CB         B        C
 3: else                                                                        A
                                                                                        5             11 14 16                23 25      30       34   time
 4:    increment βm by 1                                                         0

       lastTimeAt[m] ← t                                                                    6 units                     7 units              4 units
 5:
                                                                                                                                        9 units
 6: end if
 7: for each neighbor j ∈ N and j = m do
 8:    start a timer tmj                                          Fig. 2. Sample meeting times of node A with nodes B and C. While the
 9: end for                                                       values in the upper part are used in the computation of τA (B|C), the values
10: for each neighbor j ∈ N and j = m do                          in the lower part are used in the computation of τA (C|B).
11:    for each timer tjm running do
12:       S[j][m] += time on tjm
                                                                  define the link costs are minimum expected delay (MED [7])
13:       increment C[j][m] by 1
                                                                  and minimum estimated expected delay (MEED [10]). They
14:    end for
                                                                  compute the expected waiting time plus the transmission delay
15:    delete all timers tjm
                                                                  between each pair of nodes. However, while the former uses
16: end for
                                                                  the future contact schedule, the latter uses only observed
17: for each neighbor i ∈ N do
                                                                  contact history.
18:    for each neighbor j ∈ N and j = i do
                                                                     Routing decisions can be made at three different points in an
19:       if S[j][i] = 0 then
                                                                  SP based routing: i) at source, ii) at each hop, and iii) at each
20:          τs (i|j) ← S[j][i] / C[j][i]
                                                                  contact. In the first one (source routing), SP of the message is
21:       end if
                                                                  decided at the source node and the message follows that path.
22:    end for
                                                                  In the second one (per-hop routing), when a message arrives at
23:    τs (i) ← (lastTimeAt[i] − firstTimeAt[i] ) / βi
                                                                  an intermediate node, the node determines the next hop for the
24: end for
                                                                  message towards the destination and the message waits for that
                                                                  node. Finally, in the third one (per-contact routing), the routing
                                                                  table is recomputed at each contact with other nodes and the
the value of τA (B|C).
                                                                  forwarding decision is made accordingly. In these algorithms,
   While computing standard and conditional intermeeting
                                                                  utilization of recent information increases from the first to the
times, we ignore the edge effects [12] by including intermeet-
                                                                  last one so that better forwarding decisions are made; however,
ing times of atypical meetings. That means that we include
                                                                  more processing resources are used as the routing decision is
the values of τA (B) for the first and last meetings of node
                                                                  computed more frequently.
B with node A. Likewise, we include the values of τA (B|C)
for the first meeting of node A with node C and the last           B. Network Model
meeting of that node with node B. Although this may change           We model a DTN as a graph G = (V , E) where the
the results, this change will be negligible if long enough time   vertices (V ) are mobile nodes and the edges (E) represent
passed to collect many other meeting data. The drawback of        the connections between these nodes. However, different from
this computation can also be minimized either by updating         previous DTN network models [7] [10], we assume that there
the computation by including the edge effects as in [12]          may be multiple unidirectional (Eu ) and bidirectional (Eb )
or by keeping an appropriate size of window of the past           edges between the nodes. The neighbors of a node i are
contacts [10].                                                    denoted with N (i) and the edge sets are given as follows:
   Consider the sample meeting times of a node A with
its neighbors B and C in Figure 2. Node A meets with              E     = Eu ∪ Eb
node B at times {5, 16, 25, 30} and with node C at times          Eb    = {(i, j) | ∀j ∈ N (i)} where, w(i, j) = τi (j) = τj (i)
{11, 14, 23, 34}. Following the procedure described above, we     Eu    = {(i, j) | ∀j, k ∈ N (i) and j = k} where,
find that τA (B|C) = (5 + 2 + 2)/3 = 3 time units and
                                                                          w(i, j) = τi (j|k)
τA (C|B) = (6 + 7 + 4 + 9)/4 = 6.5 time units.
                                                                     The above definition of Eu allows for multiple unidirec-
       III. C ONDITIONAL S HORTEST PATH ROUTING
                                                                  tional edges between any two nodes. However, these edges
A. Overview                                                       differ from each other in terms of their weights and the cor-
   Shortest path routing protocols for DTN’s are based on the     responding third node. This third node indicates the previous
designs of routing protocols for traditional networks. Messages   meeting and is used as a reference point while defining the
are forwarded through the shortest paths between source and       conditional intermeeting time (weight of the edge). In Figure 3,
destination pairs according to the costs assigned to links        we illustrate a sample DTN graph with four nodes and nine
between nodes. Furthermore, the dynamic nature of DTN’s is        edges. Of these nine edges, three are bidirectional with weights
also considered in these designs. Two common metrics used to      of standard intermeeting times between nodes, and six are
Path 1
                                                    C       T (C)
                                                             A                                                                  B

                                         T (C|B)
                                          A         T (C|D)
                                                     A                                                                                D
                                                                                                                       A                         E
                                                                 T (D)
                                                                  A
                                T (B)
                                 A              A
                                                                                                                                C
                                                               T (D|C)
                                                                A                                                      Path 2
                               T (B|C)
                                A
                                         T (B|D)     T (D|B)
                                          A           A             D
                                 B
                                                                                                Fig. 5. Path 2 may have smaller conditional delay than path 1 even though
                                                                                                the CSP from node A to node D is through node B.
Fig. 3. The graph of a sample DTN with four nodes and nine edges in total.

                                                                                                   We will next provide an example to show the benefit of CSP
                           C                                             C                      over SP. Consider the DTN illustrated in Figure 4. The weights
         R (C|t) =20              30= T C (D)           R (C|t) =20          10= TC (D|A)
          A                                              A
                                                                                                of edges (A, C) and (A, B) show the expected residual time
           A                             D                A                      D              of node A with nodes C and B respectively in both graphs.
                                                                                                But the weights of edges (C, D) and (B, D) are different in
         R (B|t) =25
          A                       15= T B (D)           R (B|t) =25
                                                         A                   12= TB (D|A)       both graphs. While in the left graph, they show the average
                           B                                             B
                                                                                                intermeeting times of nodes C and B with D respectively, in
                                                                                                the right graph, they show the average conditional intermeeting
Fig. 4. The shortest path from a source to destination node can be different                    times of the same nodes with D relative to their meeting
when conditional intermeeting times are used as the weights of links in the                     with node A. From the left graph, we conclude that SP(A,
network graph.
                                                                                                D) follows (A, B, D). Hence, it is expected that on average a
                                                                                                message from node A will be delivered to node D in 40 time
                                                                                                units. However this may not be the actual shortest delay path.
unidirectional edges with weights of conditional intermeeting
                                                                                                As the weight of edge (C, D) states in the right graph, node
times.
                                                                                                C can have a smaller conditional intermeeting time (than the
C. Conditional Shortest Path Routing                                                            standard intermeeting time) with node D assuming that it has
                                                                                                met node A. This provides node C with a faster transfer of
  Our algorithm basically finds conditional shortest paths                                       the message to node D after meeting node A. Hence, in the
(CSP) for each source-destination pair and routes the messages                                  right graph, CSP(A, D) is (A, C, D) with the path cost of 30
over these paths. We define the CSP from a node n0 to a node                                     time units.
nd as follows:                                                                                     Each node forms the aforementioned network model and
                                                                                                collects the standard and conditional intermeeting times of
  CSP (n0 , nd ) = {n0 , n1 , . . . , nd−1 , nd |                              n0 (n1 |t)   +
                                                                                                other nodes between each other through epidemic link state
                                     d−1
                                                                                                protocol as in [10]. However, once the weights are known, it
                                             τni (ni+1 |ni−1 ) is minimized.}
                                                                                                is not as easy to find CSP’s as it is to find SP’s. Consider
                                     i=1
                                                                                                Figure 5 where the CSP(A, E) follows path 2 and CSP(A, D)
Here, t represents the time that has passed since the last meet-                                follows (A, B, D). This situation is likely to happen in a DTN,
ing of node n0 with n1 and n0 (n1 |t) is the expected residual                                  if τD (E|B) ≥ τD (E|C) is satisfied. Running Dijkstra’s or
time for node n0 to meet with node n1 given that they have                                      Bellman-ford algorithm on the current graph structure cannot
not met in the last t time units. n0 (n1 |t) can be computed                                    detect such cases and concludes that CSP(A, E) is (A, B,
as in [13] with parameters of distribution representing the                                     D, E). Therefore, to obtain the correct CSP’s for each source
intermeeting time between n0 and n1 . It can also be computed                                   destination pair, we propose the following transformation on
in a discrete manner from the contact history of n0 and n1 .                                    the current graph structure.
Assume that node i observed d intermeeting times with node                                         Given a DTN graph G = (V, E), we obtain a new graph
j in its past. Let τi1 (j), τi2 (j),. . .τid (j) denote these values.                           G = (V , E ) where:
Then:
                                                                                                   V     ⊆ V × V and E ⊆ V × V where,
                                    d
                                    k=1 fi (j)
                                           k
       i (j|t)         =                          where,                                           V     = {(ij ) | ∀j ∈ N (i)} and E = {(ij , kl ) | i = l}
                               |{τi k (j) ≥ t }|
                                                                                                                                    τi (k|j) if j = k
                                              τik (j) − t                if τik (j) ≥ t                     where, w (ij , kl ) =
                                fik (j) =                                                                                           τi (k)   otherwise
                                              0                          otherwise
                                                                                                Note that the edges in Eb (in G) are made directional in G and
   Here, if none of the d observed intermeeting times is bigger                                 the edges in Eu between the same pair of nodes are separated
than t (this case occurs less likely as the contact history                                     in E . This graph transformation keeps all the historical
grows), a good approximation can be to assume i (j|t) = 0.                                      information that conditional intermeeting times require and
T (C | B)
                                                        A
                                                                             AB
                                                                                           T (D | B)
                                                                                            A
                                                                                                                                      IV. S IMULATIONS
                   Source                                                         TA(D | C)
                                                                             AC
               A                                                                                                   To evaluate the performance of our algorithm, we have built
                                                                             BA
                                                                                    TB (D | A)
                                                                                                                a discrete event simulator in Java. In this section, we describe
      B                     C            A                                                                  D
                                             RA(B|t)                 TB(A | C)

                                                                             BC
                                                                                   T (D | C)
                                                                                       B                        the details of our simulations through which we compare the
                                                                      TC(B | A)
                                                                                  T (D | A)
                                                                                   C
                                                                                                                proposed Conditional Shortest Path Routing (CSPR) algorithm
               D
                   Destination
                                                                             CA
                                                                                                T (D | B)
                                                                                                 C
                                                                                                                with standard Shortest Path Routing (SPR). Moreover, in our
A, B, C and D all meet with each other
                                                  RA(C|t)
                                                                             CB
                                                                                                                results we also show the performance of upper and lower
                                                                                                                performance boundaries with Epidemic Routing [4] and Direct
                                                                   RA(D|t)                                      Delivery.
                                                                                                                   We used two different data sets: 1) RollerNet traces [14]
Fig. 6. Graph Transformation to solve CSP with 4 Nodes where A is the                                           which includes the opportunistic contacts of 62 iMotes which
source and D the destination node.                                                                              are distributed to the rollerbladers during a 3 hour skating tour
                                                                                                                of Paris on August 20, 2006, 2) Cambridge Dataset [23] which
                                                                                                                includes the Bluetooth contacts of 36 students from Cambridge
                                                                                                                University carrying iMotes around the city of Cambridge, UK
also keeps only the paths with a valid history. For example, for                                                from October 28, 2005 to December 21, 2005.
a path A, B, C, D in G, an edge like (CD , DA ) in G cannot                                                        To collect several routing statistics, we have generated traffic
be chosen because of the edge settings in the graph. Hence,                                                     on the traces of these two data sets. For a simulation run,
only the correct τ values will be added to the path calculation.                                                we generated 5000 messages from a random source node to
To solve the CSP problem however, we add one vertex for                                                         a random destination node at each t seconds. In RollerNet,
source S (apart from its permutations) and one vertex for                                                       since the duration of experiment is short, we set t = 1s, but
destination node D. We also add outgoing edges from S to                                                        for Cambridge data set, we set t = 1 min. We assume that
each vertex (iS ) ∈ V with weight S (i|t). Furthermore, for                                                     the nodes have enough buffer space to store every message
the destination node, D, we add only incoming edges from                                                        they receive, the bandwidth is high and the contact durations
each vertex ij ∈ V with weight τi (D|j).                                                                        of nodes are long enough to allow the exchange of all
   In Figure 6, we show a sample transformation of a clique                                                     messages between nodes. These assumptions are reasonable in
of four nodes to the new graph structure. In the initial graph,                                                 today’s technology and are also used commonly in previous
all mobile nodes A to D meet with each other, and we set the                                                    studies [22]. Moreover, we compare all algorithms in the same
source node to A and destination node to D (we did not show                                                     conditions, and a change in the current assumptions is expected
the directional edges in the original graph for brevity). It can                                                to affect the performance of them in the same manner. We ran
be seen that we set any path to begin with A on transformed                                                     each simulation 10 times with different seeds but the same set
graph G , but we also put the permutations of A, B and C                                                        of messages and collected statistics after each run. The results
with each other.                                                                                                plotted in Figures 7 and 8 show the average of results obtained
                                                                                                                in all runs.
   Running Dijkstra’s shortest path algorithm on G given                                                           Figure 7 shows the delivery rates achieved in CSPR and
the source node S and destination D will give CSP. In G ,                                                       SPR algorithms with respect to time (i.e. TTL of messages)
|V | = O(|V |2 ) and |E | = O(|V 3 |) = |E|3/2 . Therefore                                                      in RollerNet traces. Clearly, CSPR algorithm delivers more
Dijkstra’s algorithm will run in O(|V |3 ) (with Fibonacci                                                      messages than SPR algorithm. Moreover, it achieves lower
heaps) while computing regular shortest paths (where edge                                                       average delivery delay than SPR algorithm. For example,
costs are standard intermeeting times) takes O(|V |2 ).                                                         CSPR delivers 80% of all messages after 17 min with an
   The focus of this paper is an improvement of the current                                                     average delay of almost 6 min, while SPR can achieve the
design of the Shortest Path (SP) based DTN routing algo-                                                        same delivery ratio only after 41 min and with an average
rithms. Therefore we leave the elaborate discussion of some                                                     delay of 12 min. Although we did not show it here for brevity,
other issues in SP based routing (complexity, scalability and                                                   the average numbers of times the delivered messages are
routing type selection) to the original studies [7] [10]. Using                                                 forwarded (number of hops) in SPR and CSPR are very close
conditional instead of standard intermeeting times requires                                                     (1.48 and 1.52 respectively) to each other (and much smaller
extra space to store the conditional intermeeting times and                                                     than the average number of times a message is forwarded in
additional processing as complexity of running Dijkstra’s                                                       epidemic routing which is around 25).
algorithm increases from O(|V |2 ) to O(|V |3 ). We believe                                                        In Figure 8, we show the delivery rates achieved in Cam-
that in current DTN’s, wireless devices have enough storage                                                     bridge traces. As before, CSPR algorithm achieves higher
and processing power not to be unduly taxed with such an                                                        delivery ratio than SPR algorithm. After 6 days, CSPR delivers
increase. Moreover, to lessen the burden of collecting and                                                      78% of all messages with an average delay of 2.6 days,
storing link weights, an asynchronous and distributed version                                                   while SPR can only deliver 62% of all messages with an
of the Bellman-Ford algorithm can be used, as described                                                         average delay of 3.2 days. The numbers of times a message is
in [21].                                                                                                        forwarded in SPR and CSPR are 1.73 and 1.78, respectively,
1                                                                                                 1


                                          0.8                                                                                               0.8



                 Message delivery ratio




                                                                                                                   Message delivery ratio
                                          0.6                                                                                               0.6


                                          0.4                                                                                               0.4

                                                                                  SPR                                                                                           SPR
                                          0.2                                     CSPR                                                      0.2                                 CSPR
                                                                                  Epidemic                                                                                      Epidemic
                                                                                  Direct                                                                                        Direct
                                           0                                                                                                 0
                                                0   10      20          30   40              50                                                   0   1    2       3        4   5          6
                                                              Time (min)                                                                                       Time (day)




       Fig. 7.                            Message delivery ratio vs. time in RollerNet traces.           Fig. 8.                            Message delivery ratio vs. time in Cambridge traces.



while it is around 16 in epidemic routing.                                                         [5] T. Spyropoulos, K. Psounis,C. S. Raghavendra, Efficient routing in inter-
   These results show that the conditional intermeeting time                                           mittently connected mobile networks: The multi-copy case, IEEE/ACM
                                                                                                       Transactions on Networking, 2008.
represents link cost better than the standard intermeeting                                         [6] Y. Wang, S. Jain, M. Martonosi, and K. Fall, Erasure coding based
time. Therefore, in CSPR, more effective paths with similar                                            routing for opportunistic networks, in Proceedings of ACM SIGCOMM
average hop counts are selected to route messages. Conse-                                              workshop on Delay Tolerant Networking (WDTN), 2005.
                                                                                                   [7] S. Jain, K. Fall, and R. Patra, Routing in a delay tolerant network, in
quently, higher delivery rates with lower end-to-end delays                                            Proceedings of ACM SIGCOMM, Aug. 2004.
are achieved. In SPR and CSPR algorithms here, we used                                             [8] T. Spyropoulos, K. Psounis,C. S. Raghavendra, Spray and Wait: An
source-routing and let the messages follow the paths which                                             Efficient Routing Scheme for Intermittently Connected Mobile Networks,
                                                                                                       ACM SIGCOMM Workshop, 2005.
are decided at the source nodes. We also observed similar                                          [9] A. Lindgren, A. Doria, and O. Schelen, Probabilistic routing in in-
results in our simulations when other routing types (per-hop                                           termittently connected networks, SIGMOBILE Mobile Computing and
and per-contact) are used.                                                                             Communication Review, vol. 7, no. 3, 2003.
                                                                                                  [10] E. P. C. Jones, L. Li, and P. A. S. Ward, Practical routing in delay
                                                                                                       tolerant networks, in Proceedings of ACM SIGCOMM workshop on
             V. C ONCLUSION AND F UTURE W ORK                                                          Delay Tolerant Networking (WDTN), 2005.
   In this paper, we introduced a new metric called conditional                                   [11] A. Chaintreau, P. Hui, J. Crowcroft, C. Diot, R. Gass, and J. Scott,
                                                                                                       Impact of Human Mobility on the Design of Opportunistic Forwarding
intermeeting time inspired by the results of the recent studies                                        Algorithms, in Proceedings of INFOCOM, 2006.
showing that nodes’ intermeeting times are not memoryless                                         [12] X. Zhang, J. F. Kurose, B. Levine, D. Towsley, and H. Zhang, Study
and that motion patterns of mobile nodes are frequently                                                of a Bus-Based Disruption Tolerant Network: Mobility Modeling and
                                                                                                       Impact on Routing, In Proceedings of ACM MobiCom, 2007.
repetitive. Then, we looked at the effects of this metric on                                      [13] S. Srinivasa and S. Krishnamurthy, CREST: An Opportunistic Forward-
shortest path based routing in DTN’s. For this purpose, we                                             ing Protocol Based on Conditional Residual Time, in Proceedings of
updated the shortest path based routing algorithms using con-                                          IEEE SECON, 2009.
                                                                                                  [14] P. U. Tournoux, J. Leguay, F. Benbadis, V. Conan, M. Amorim,
ditional intermeeting times and proposed to route the messages                                         J. Whitbeck, The Accordion Phenomenon: Analysis, Characterization,
over conditional shortest paths. Finally, we ran simulations                                           and Impact on DTN Routing, in Proceedings of Infocom, 2009.
to evaluate the proposed algorithm and demonstrated the                                           [15] C. Liu and J. Wu, Routing in a Cyclic Mobispace, In Proceedings of
                                                                                                       ACM Mobihoc, 2008.
superiority of CSPR protocol over the existing shortest path                                      [16] H. Dubois-Ferriere, M. Grossglauser, and M. Vetterli, Age Matters:
routing algorithms.                                                                                    Efficient Route Discovery in Mobile Ad Hoc Networks Using Encounter
   In future work, we will look at the performance of the                                              Ages, In Proceedings of ACM MobiHoc, 2003.
                                                                                                  [17] T. Spyropoulos, K. Psounis, and C. Raghavendra, Spray and Focus:
proposed algorithm in different data sets to see the effect                                            Efficient Mobility-Assisted Routing for Heterogeneous and Correlated
of conditional intermeeting time in different environments.                                            Mobility, In Proceedings of IEEE PerCom, 2007.
Moreover, we will consider extending our CSPR algorithm by                                        [18] E. Daly and M. Haahr, Social network analysis for routing in discon-
                                                                                                       nected delay-tolerant manets, In Proceedings of ACM MobiHoc, 2007.
using more information (more than one known meetings) from                                        [19] P. Hui, J. Crowcroft, and E. Yoneki, BUBBLE Rap: Social Based
the contact history while deciding conditional intermeeting                                            Forwarding in Delay Tolerant Networks, In Proc. of ACM MobiHoc,
times. For this, we plan to use probabilistic context free gram-                                       2008.
                                                                                                  [20] A European Union funded project in Situated and Autonomic Commu-
mars (PCFG) and utilize the construction algorithm presented                                           nications, www.haggleproject.org.
in [26]. Such a model will be able to hold history information                                    [21] D. Bertsekas, and R. Gallager, Data networks (2nd ed.), 1992.
concisely, and provide further generalizations for unseen data.                                   [22] C. Liu and J. Wu, An Optimal Probabilistically Forwarding Protocol in
                                                                                                       Delay Tolerant Networks, in Proceedings of MobiHoc, 2009.
                                                         R EFERENCES                              [23] J. Leguay, A. Lindgren, J. Scott, T. Friedman, J. Crowcroft and P. Hui,
                                                                                                       CRAWDAD data set upmc/content (v. 2006-11-17), downloaded from
 [1] Delay tolerant networking research group, http://www.dtnrg.org.                                   http://crawdad.cs.dartmouth.edu/upmc/content, 2006.
 [2] T. Spyropoulos, K. Psounis,C. S. Raghavendra, Efficient routing in inter-                     [24] Y. Wang, P. Zhang, T. Liu, C. Sadler and M. Martonosi,
     mittently connected mobile networks: The single-copy case, IEEE/ACM                               http://crawdad.cs.dartmouth.edu/princeton/zebranet, CRAWDAD data
     Transactions on Networking, vol. 16, no. 1, Feb. 2008.                                            set princeton/zebranet (v. 2007-02-14), 2007.
 [3] J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine, MaxProp:                              [25] E. Bulut, Z. Wang, and B. Szymanski, Cost-Effective Multi-Period
     Routing for Vehicle-Based Disruption- Tolerant Networks, In Proc. IEEE                            Spraying for Routing in Delay Tolerant Networks, to appear in
     Infocom, April 2006.                                                                              IEEE/ACM Transactions on Networking, 2010.
 [4] A. Vahdat and D. Becker, Epidemic routing for partially connected ad                         [26] S. Geyik, and B. Szymanski, Event Recognition in Sensor Networks by
     hoc networks, Duke University, Tech. Rep. CS-200006, 2000.                                        Means of Grammatical Inference, in Proceedings of INFOCOM, 2009.

Weitere ähnliche Inhalte

Was ist angesagt?

Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...
Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...
Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...CSCJournals
 
Z02417321735
Z02417321735Z02417321735
Z02417321735IJMER
 
IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANET
IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANETIMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANET
IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANETijcsa
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2Rijujournal
 
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ijac journal
 
Caching strategies for on demand routing protocols for wireless ad hoc network
Caching strategies for on demand routing protocols for wireless ad hoc networkCaching strategies for on demand routing protocols for wireless ad hoc network
Caching strategies for on demand routing protocols for wireless ad hoc networkAcel-Omeran
 
Routing in Delay Tolerant Networks
Routing in Delay Tolerant NetworksRouting in Delay Tolerant Networks
Routing in Delay Tolerant NetworksAnubhav Mahajan
 
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...IJASCSE
 
The Effect of Network Topology on Geographic Routing Performance in Localized...
The Effect of Network Topology on Geographic Routing Performance in Localized...The Effect of Network Topology on Geographic Routing Performance in Localized...
The Effect of Network Topology on Geographic Routing Performance in Localized...IDES Editor
 
Flexible channel allocation using best Secondary user detection algorithm
Flexible channel allocation using best Secondary user detection algorithmFlexible channel allocation using best Secondary user detection algorithm
Flexible channel allocation using best Secondary user detection algorithmijsrd.com
 
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)cscpconf
 
Project
Project Project
Project J M
 
An Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANETAn Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANETKhushbooGupta145
 
A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...ijdpsjournal
 

Was ist angesagt? (19)

Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...
Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...
Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...
 
Z02417321735
Z02417321735Z02417321735
Z02417321735
 
F0313539
F0313539F0313539
F0313539
 
IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANET
IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANETIMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANET
IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANET
 
Eb34777780
Eb34777780Eb34777780
Eb34777780
 
Aj25210213
Aj25210213Aj25210213
Aj25210213
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
 
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
 
Caching strategies for on demand routing protocols for wireless ad hoc network
Caching strategies for on demand routing protocols for wireless ad hoc networkCaching strategies for on demand routing protocols for wireless ad hoc network
Caching strategies for on demand routing protocols for wireless ad hoc network
 
Routing in Delay Tolerant Networks
Routing in Delay Tolerant NetworksRouting in Delay Tolerant Networks
Routing in Delay Tolerant Networks
 
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...
 
D0431013019
D0431013019D0431013019
D0431013019
 
The Effect of Network Topology on Geographic Routing Performance in Localized...
The Effect of Network Topology on Geographic Routing Performance in Localized...The Effect of Network Topology on Geographic Routing Performance in Localized...
The Effect of Network Topology on Geographic Routing Performance in Localized...
 
Ly2520762079
Ly2520762079Ly2520762079
Ly2520762079
 
Flexible channel allocation using best Secondary user detection algorithm
Flexible channel allocation using best Secondary user detection algorithmFlexible channel allocation using best Secondary user detection algorithm
Flexible channel allocation using best Secondary user detection algorithm
 
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
 
Project
Project Project
Project
 
An Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANETAn Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANET
 
A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...
 

Andere mochten auch

Integrating Interaction Design Evaluation into Product Design
Integrating Interaction Design Evaluation into Product DesignIntegrating Interaction Design Evaluation into Product Design
Integrating Interaction Design Evaluation into Product DesignYingjie Chen
 
Inspiratiesessie netwerken lesley arens 20140610
Inspiratiesessie netwerken lesley arens 20140610Inspiratiesessie netwerken lesley arens 20140610
Inspiratiesessie netwerken lesley arens 20140610Lesley Arens
 
Ids. revoltion
Ids. revoltionIds. revoltion
Ids. revoltionvesqui
 
Java & dotnet titles
Java & dotnet titlesJava & dotnet titles
Java & dotnet titlesingenioustech
 
Presentation1
Presentation1Presentation1
Presentation1SimpMedia
 
It auditing to assure a secure cloud computing
It auditing to assure a secure cloud computingIt auditing to assure a secure cloud computing
It auditing to assure a secure cloud computingingenioustech
 

Andere mochten auch (7)

Vishak pillai
Vishak pillaiVishak pillai
Vishak pillai
 
Integrating Interaction Design Evaluation into Product Design
Integrating Interaction Design Evaluation into Product DesignIntegrating Interaction Design Evaluation into Product Design
Integrating Interaction Design Evaluation into Product Design
 
Inspiratiesessie netwerken lesley arens 20140610
Inspiratiesessie netwerken lesley arens 20140610Inspiratiesessie netwerken lesley arens 20140610
Inspiratiesessie netwerken lesley arens 20140610
 
Ids. revoltion
Ids. revoltionIds. revoltion
Ids. revoltion
 
Java & dotnet titles
Java & dotnet titlesJava & dotnet titles
Java & dotnet titles
 
Presentation1
Presentation1Presentation1
Presentation1
 
It auditing to assure a secure cloud computing
It auditing to assure a secure cloud computingIt auditing to assure a secure cloud computing
It auditing to assure a secure cloud computing
 

Ähnlich wie Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]

An Experimental Result of Conditional Shortest Path Routing In Delay Toleran...
An Experimental Result of Conditional Shortest Path Routing In  Delay Toleran...An Experimental Result of Conditional Shortest Path Routing In  Delay Toleran...
An Experimental Result of Conditional Shortest Path Routing In Delay Toleran...IOSR Journals
 
Clock synchronization estimation of non deterministic delays in wireless mess...
Clock synchronization estimation of non deterministic delays in wireless mess...Clock synchronization estimation of non deterministic delays in wireless mess...
Clock synchronization estimation of non deterministic delays in wireless mess...IJCNCJournal
 
Manets: Increasing N-Messages Delivery Probability Using Two-Hop Relay with E...
Manets: Increasing N-Messages Delivery Probability Using Two-Hop Relay with E...Manets: Increasing N-Messages Delivery Probability Using Two-Hop Relay with E...
Manets: Increasing N-Messages Delivery Probability Using Two-Hop Relay with E...ijceronline
 
Reference broadcast synchronization and time division multiple access impleme...
Reference broadcast synchronization and time division multiple access impleme...Reference broadcast synchronization and time division multiple access impleme...
Reference broadcast synchronization and time division multiple access impleme...TELKOMNIKA JOURNAL
 
Delay Tolerant Network (DTN)
Delay Tolerant Network (DTN)Delay Tolerant Network (DTN)
Delay Tolerant Network (DTN)Haya Saani
 
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
 TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEYijujournal
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACESDATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACEScscpconf
 
Csit54201
Csit54201Csit54201
Csit54201csandit
 
Paper id 35201569
Paper id 35201569Paper id 35201569
Paper id 35201569IJRAT
 
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...journal ijrtem
 
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...IJRTEMJOURNAL
 
Route Reservation In Adhoc Wireless Networks
Route Reservation In Adhoc Wireless NetworksRoute Reservation In Adhoc Wireless Networks
Route Reservation In Adhoc Wireless NetworksIJRES Journal
 

Ähnlich wie Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1] (20)

An Experimental Result of Conditional Shortest Path Routing In Delay Toleran...
An Experimental Result of Conditional Shortest Path Routing In  Delay Toleran...An Experimental Result of Conditional Shortest Path Routing In  Delay Toleran...
An Experimental Result of Conditional Shortest Path Routing In Delay Toleran...
 
D0441722
D0441722D0441722
D0441722
 
Clock synchronization estimation of non deterministic delays in wireless mess...
Clock synchronization estimation of non deterministic delays in wireless mess...Clock synchronization estimation of non deterministic delays in wireless mess...
Clock synchronization estimation of non deterministic delays in wireless mess...
 
Manets: Increasing N-Messages Delivery Probability Using Two-Hop Relay with E...
Manets: Increasing N-Messages Delivery Probability Using Two-Hop Relay with E...Manets: Increasing N-Messages Delivery Probability Using Two-Hop Relay with E...
Manets: Increasing N-Messages Delivery Probability Using Two-Hop Relay with E...
 
Reference broadcast synchronization and time division multiple access impleme...
Reference broadcast synchronization and time division multiple access impleme...Reference broadcast synchronization and time division multiple access impleme...
Reference broadcast synchronization and time division multiple access impleme...
 
dtn-180110112549.pdf
dtn-180110112549.pdfdtn-180110112549.pdf
dtn-180110112549.pdf
 
Delay Tolerant Network (DTN)
Delay Tolerant Network (DTN)Delay Tolerant Network (DTN)
Delay Tolerant Network (DTN)
 
Multi-Channel Scheduling (MCDRR)
Multi-Channel Scheduling (MCDRR)Multi-Channel Scheduling (MCDRR)
Multi-Channel Scheduling (MCDRR)
 
Multi-Channel Scheduling for HPON's
Multi-Channel Scheduling for HPON'sMulti-Channel Scheduling for HPON's
Multi-Channel Scheduling for HPON's
 
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
 TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACESDATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
 
Csit54201
Csit54201Csit54201
Csit54201
 
Paper id 35201569
Paper id 35201569Paper id 35201569
Paper id 35201569
 
Using Concurrent Multipath Transmission for Transport Virtualization
Using Concurrent Multipath Transmission for Transport VirtualizationUsing Concurrent Multipath Transmission for Transport Virtualization
Using Concurrent Multipath Transmission for Transport Virtualization
 
ROUTING STRATEGIES IN DTN
ROUTING STRATEGIES IN DTNROUTING STRATEGIES IN DTN
ROUTING STRATEGIES IN DTN
 
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
 
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
 
Route Reservation In Adhoc Wireless Networks
Route Reservation In Adhoc Wireless NetworksRoute Reservation In Adhoc Wireless Networks
Route Reservation In Adhoc Wireless Networks
 

Mehr von ingenioustech

Monitoring service systems from
Monitoring service systems fromMonitoring service systems from
Monitoring service systems fromingenioustech
 
Locally consistent concept factorization for
Locally consistent concept factorization forLocally consistent concept factorization for
Locally consistent concept factorization foringenioustech
 
Measurement and diagnosis of address
Measurement and diagnosis of addressMeasurement and diagnosis of address
Measurement and diagnosis of addressingenioustech
 
Impact of le arrivals and departures on buffer
Impact of  le arrivals and departures on bufferImpact of  le arrivals and departures on buffer
Impact of le arrivals and departures on bufferingenioustech
 
Exploiting dynamic resource allocation for
Exploiting dynamic resource allocation forExploiting dynamic resource allocation for
Exploiting dynamic resource allocation foringenioustech
 
Efficient computation of range aggregates
Efficient computation of range aggregatesEfficient computation of range aggregates
Efficient computation of range aggregatesingenioustech
 
Dynamic measurement aware
Dynamic measurement awareDynamic measurement aware
Dynamic measurement awareingenioustech
 
Design and evaluation of a proxy cache for
Design and evaluation of a proxy cache forDesign and evaluation of a proxy cache for
Design and evaluation of a proxy cache foringenioustech
 
Throughput optimization in
Throughput optimization inThroughput optimization in
Throughput optimization iningenioustech
 
Phish market protocol
Phish market protocolPhish market protocol
Phish market protocolingenioustech
 
Peering equilibrium multi path routing
Peering equilibrium multi path routingPeering equilibrium multi path routing
Peering equilibrium multi path routingingenioustech
 
Online social network
Online social networkOnline social network
Online social networkingenioustech
 
On the quality of service of crash recovery
On the quality of service of crash recoveryOn the quality of service of crash recovery
On the quality of service of crash recoveryingenioustech
 
Bayesian classifiers programmed in sql
Bayesian classifiers programmed in sqlBayesian classifiers programmed in sql
Bayesian classifiers programmed in sqlingenioustech
 
Applied research of e learning
Applied research of e learningApplied research of e learning
Applied research of e learningingenioustech
 

Mehr von ingenioustech (20)

Monitoring service systems from
Monitoring service systems fromMonitoring service systems from
Monitoring service systems from
 
Locally consistent concept factorization for
Locally consistent concept factorization forLocally consistent concept factorization for
Locally consistent concept factorization for
 
Measurement and diagnosis of address
Measurement and diagnosis of addressMeasurement and diagnosis of address
Measurement and diagnosis of address
 
Impact of le arrivals and departures on buffer
Impact of  le arrivals and departures on bufferImpact of  le arrivals and departures on buffer
Impact of le arrivals and departures on buffer
 
Exploiting dynamic resource allocation for
Exploiting dynamic resource allocation forExploiting dynamic resource allocation for
Exploiting dynamic resource allocation for
 
Efficient computation of range aggregates
Efficient computation of range aggregatesEfficient computation of range aggregates
Efficient computation of range aggregates
 
Dynamic measurement aware
Dynamic measurement awareDynamic measurement aware
Dynamic measurement aware
 
Design and evaluation of a proxy cache for
Design and evaluation of a proxy cache forDesign and evaluation of a proxy cache for
Design and evaluation of a proxy cache for
 
Throughput optimization in
Throughput optimization inThroughput optimization in
Throughput optimization in
 
Tcp
TcpTcp
Tcp
 
Privacy preserving
Privacy preservingPrivacy preserving
Privacy preserving
 
Phish market protocol
Phish market protocolPhish market protocol
Phish market protocol
 
Peering equilibrium multi path routing
Peering equilibrium multi path routingPeering equilibrium multi path routing
Peering equilibrium multi path routing
 
Peace
PeacePeace
Peace
 
Online social network
Online social networkOnline social network
Online social network
 
On the quality of service of crash recovery
On the quality of service of crash recoveryOn the quality of service of crash recovery
On the quality of service of crash recovery
 
Layered approach
Layered approachLayered approach
Layered approach
 
Intrution detection
Intrution detectionIntrution detection
Intrution detection
 
Bayesian classifiers programmed in sql
Bayesian classifiers programmed in sqlBayesian classifiers programmed in sql
Bayesian classifiers programmed in sql
 
Applied research of e learning
Applied research of e learningApplied research of e learning
Applied research of e learning
 

Kürzlich hochgeladen

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.MateoGardella
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...KokoStevan
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 

Kürzlich hochgeladen (20)

Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 

Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]

  • 1. Conditional Shortest Path Routing in Delay Tolerant Networks Eyuphan Bulut, Sahin Cem Geyik, Boleslaw K. Szymanski Department of Computer Science and Center for Pervasive Computing and Networking Rensselaer Polytechnic Institute, 110 8th Street, Troy, NY 12180, USA {bulute, geyiks, szymansk}@cs.rpi.edu Abstract—Delay tolerant networks are characterized by the routing algorithms with different objectives (high delivery rate sporadic connectivity between their nodes and therefore the lack etc.) and different routing techniques (single-copy [2] [3], of stable end-to-end paths from source to destination. Since the multi-copy [4] [5], erasure coding based [6] etc.) have been future node connections are mostly unknown in these networks, opportunistic forwarding is used to deliver messages. However, proposed recently. However, some of these algorithms [7] used making effective forwarding decisions using only the network unrealistic assumptions, such as the existence of oracles which characteristics (i.e. average intermeeting time between nodes) provide future contact times of nodes. Yet, there are also many extracted from contact history is a challenging problem. Based algorithms (such as [8]-[10]) based on realistic assumption on the observations about human mobility traces and the findings of using only the contact history of nodes to route messages of previous work, we introduce a new metric called conditional intermeeting time, which computes the average intermeeting time opportunistically. between two nodes relative to a meeting with a third node Recent studies on routing problem in DTN’s have focused using only the local knowledge of the past contacts. We then on the analysis of real mobility traces (human [11], vehicu- look at the effects of the proposed metric on the shortest path lar [12] etc.). Different traces from various DTN environments based routing designed for delay tolerant networks. We propose are analyzed and the extracted characteristics of the mobile Conditional Shortest Path Routing (CSPR) protocol that routes the messages over conditional shortest paths in which the cost objects are utilized on the design of routing algorithms for of links between nodes is defined by conditional intermeeting DTN’s. From the analysis of these traces performed in previ- times rather than the conventional intermeeting times. Through ous work, we have made two key observations. First, rather trace-driven simulations, we demonstrate that CSPR achieves than being memoryless, the pairwise intermeeting times be- higher delivery rate and lower end-to-end delay compared to the tween the nodes usually follow a log-normal distribution [13] shortest path based routing protocols that use the conventional intermeeting time as the link metric. [14]. Therefore, future contacts of nodes become dependent on the previous contacts. Second, the mobility of many real objects are non-deterministic but cyclic [15]. Hence, in a cyclic I. I NTRODUCTION MobiSpace [15], if two nodes were often in contact at a Routing in delay tolerant networks (DTN) is a challenging particular time in previous cycles, then they will most likely problem because at any given time instance, the probability be in contact at around the same time in the next cycle. that there is an end-to-end path from a source to a destination Additionally, previous studies ignored some information is low. Since the routing algorithms for conventional networks readily available at transfer decisions. When two nodes (e.g., A assume that the links between nodes are stable most of the and B) meet, the message forwarding decision is made accord- time and do not fail frequently, they do not generally work ing to a delivery metric (encounter frequency [9], time elapsed in DTN’s. Therefore, the routing problem is still an active since last encounter [16] [17], social similarity [18] [19] etc.) research area in DTN’s [1]. of these two nodes with the destination node (D) of the Routing algorithms in DTN’s utilize a paradigm called message. However, all these metrics depend on the separate store-carry-and-forward. When a node receives a message meeting histories of nodes A and B with destination node D1 . from one of its contacts, it stores the message in its buffer and Nodes A and B do not consider their meetings with each other carries the message until it encounters another node which is while computing their delivery metrics with D. at least as useful (in terms of the delivery) as itself. Then the To address these issues, we redefine the intermeeting time message is forwarded to it. Based on this paradigm, several concept between nodes and introduce a new link metric called conditional intermeeting time. It is the intermeeting time Research was sponsored by US Army Research Laboratory and the between two nodes given that one of the nodes has previously UK Ministry of Defence and was accomplished under Agreement Number met a certain other node. For example, when A and B meet, A W911NF-06-3-0001. The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the (B) defines its conditional intermeeting time with destination official policies, either expressed or implied, of the US Army Research D as the time it takes to meet with D right after meeting Laboratory, the U.S. Government, the UK Ministry of Defence, or the UK Government. The US and UK Governments are authorized to reproduce and 1 Some algorithms ([9], [17]) use transitivity to reflect the effect of other distribute reprints for Government purposes notwithstanding any copyright nodes on the delivery capability of a node but this update can be applied for notation hereon. all delivery metrics and it does not reflect the metric’s own feature. 978-1-4244-7265-9/10/$26.00 c 2010 IEEE
  • 2. B (A). This updated definition of intermeeting time is also B more convenient for the context of message routing because the messages are received from a node and given to another 3 time units/ 4 time units/cycle node on the way towards the destination. Here, conditional cycle intermeeting time represent the period over which the node holds the message. 2 time units C A cycle To show the benefits of the proposed metric, we adopted it for the shortest path based routing algorithms [7] [10] designed for DTN’s. We propose conditional shortest path routing Fig. 1. A physical cyclic MobiSpace with a common motion cycle of 12 (CSPR) protocol in which average conditional intermeeting time units. times are used as link costs rather than standard2 intermeeting times and the messages are routed over conditional shortest paths (CSP). We compare CSPR protocol with the exist- they will probably be in contact around the same time in the ing shortest path (SP) based routing protocol through real- next cycle. Consider the sample cyclic MobiSpace with three trace-driven simulations. The results demonstrate that CSPR objects illustrated in Figure 1. The common motion cycle is achieves higher delivery rate and lower end-to-end delay com- 12 time units, so the discrete probabilistic contacts between pared to the shortest path based routing protocols. This shows A and B happen in every 12 time units (1, 13, 25, ...) and how well the conditional intermeeting time represents inter- between B and C in every 6 time units (2, 8, 14, ...). The node link costs (in the context of routing) and helps making average intermeeting time between nodes B and C indicates effective forwarding decisions while routing a message. that node B can forward its message to node C in 6 time The rest of the paper is organized as follows. In Section II, units. However, the conditional intermeeting time of B with C the proposed metric is described in detail. In Section III, relative to prior meeting of node A indicates that the message we present CSPR protocol and in Section IV, we give the can be forwarded to node C within one time unit. results of real-trace-driven simulations. Finally, we provide In a DTN, each node can compute the average of its standard conclusions and outline the future work in Section V. and conditional intermeeting times with other nodes using its contact history. In Algorithm 1, we show how a node, s, II. C ONDITIONAL I NTERMEETING T IME can compute these metrics from its previous meetings. The An analysis of real mobility traces has been done in notations we use in this algorithm (and also throughout the different environments (office [13], conference [20], city [23], paper) are listed below with their meanings: skating tour [14]) with different objects (human [11], bus [12], • τA (B): Average time that elapses between two consec- zebra [24]) and with variable number of attendants and led to utive meetings of nodes A and B. Obviously when the significant results about the aggregate and pairwise mobility node connections are bidirectional, τA (B) = τB (A). characteristics of real objects. Recent analysis [13] [14] [20] • τA (B|C): Average time it takes for node A to meet on real mobility traces have demonstrated that models assum- node B after it meets node C. Note that, τA (B|C) and ing the exponential distribution of intermeeting times between τB (A|C) are not necessarily equal. pairs of nodes do not match real data well. Instead up to • S: N × N matrix where S(i, j) shows the sum of 99% of intermeeting times in many datasets is log-normal all samples of conditional intermeeting times with node distribution. This makes the pairwise contacts between nodes j relative to the meeting with node i. Here, N is the depend on their pasts. Such a finding invalidates a common neighbor count of current node (i.e. N (s) for node s). assumption [8] [17] [25] that the pairwise intermeeting times • C: N × N matrix where C(i, j) shows the total number are exponentially distributed and memoryless. More formally, of conditional intermeeting time samples with node j if X is the random variable representing the intermeeting time relative to its meeting with node i. between two nodes, P (X > s + t | X > t) = P (X > • βi : Total meeting count with node i. s) for s, t > 0. Hence, the residual time until the next meeting of two nodes can be predicted better if the node knows that it In Algorithm 1, each node first adds up times expired has not met the other node for t time units [13]. between repeating meetings of one neighbor and the meeting To take advantage of such knowledge, we propose a new of another neighbor. Then it divides this total by the number metric called conditional intermeeting time that measures the of times it has met the first neighbor prior to meeting the intermeeting time between two nodes relative to a meeting second one. For example, if node A has two neighbors (B with a third node using only the local knowledge of the past and C), to find the conditional intermeeting time of τA (B|C), contacts. Such measure is particularly beneficial if the nodes each time node A meets node C, it starts a different timer. move in a cyclic so-called MobiSpace [15] in which if two When it meets node B, it sums up the values of these timers nodes contact frequently at particular time in previous cycles, and divides the results by the number of active timers before deleting them. This computation is repeated again each time 2 We use the terms conventional and standard interchangeably while refer- node B is encountered. Then, the total of times collected from ring to the commonly used intermeeting time metric. each timer is divided by the total count of timers used, to find
  • 3. Algorithm 1 update (node m, time t) 5 units 1: if m is seen first time then 2 units 2 units 2: firstTimeAt[m] ← t B C CB CB B C 3: else A 5 11 14 16 23 25 30 34 time 4: increment βm by 1 0 lastTimeAt[m] ← t 6 units 7 units 4 units 5: 9 units 6: end if 7: for each neighbor j ∈ N and j = m do 8: start a timer tmj Fig. 2. Sample meeting times of node A with nodes B and C. While the 9: end for values in the upper part are used in the computation of τA (B|C), the values 10: for each neighbor j ∈ N and j = m do in the lower part are used in the computation of τA (C|B). 11: for each timer tjm running do 12: S[j][m] += time on tjm define the link costs are minimum expected delay (MED [7]) 13: increment C[j][m] by 1 and minimum estimated expected delay (MEED [10]). They 14: end for compute the expected waiting time plus the transmission delay 15: delete all timers tjm between each pair of nodes. However, while the former uses 16: end for the future contact schedule, the latter uses only observed 17: for each neighbor i ∈ N do contact history. 18: for each neighbor j ∈ N and j = i do Routing decisions can be made at three different points in an 19: if S[j][i] = 0 then SP based routing: i) at source, ii) at each hop, and iii) at each 20: τs (i|j) ← S[j][i] / C[j][i] contact. In the first one (source routing), SP of the message is 21: end if decided at the source node and the message follows that path. 22: end for In the second one (per-hop routing), when a message arrives at 23: τs (i) ← (lastTimeAt[i] − firstTimeAt[i] ) / βi an intermediate node, the node determines the next hop for the 24: end for message towards the destination and the message waits for that node. Finally, in the third one (per-contact routing), the routing table is recomputed at each contact with other nodes and the the value of τA (B|C). forwarding decision is made accordingly. In these algorithms, While computing standard and conditional intermeeting utilization of recent information increases from the first to the times, we ignore the edge effects [12] by including intermeet- last one so that better forwarding decisions are made; however, ing times of atypical meetings. That means that we include more processing resources are used as the routing decision is the values of τA (B) for the first and last meetings of node computed more frequently. B with node A. Likewise, we include the values of τA (B|C) for the first meeting of node A with node C and the last B. Network Model meeting of that node with node B. Although this may change We model a DTN as a graph G = (V , E) where the the results, this change will be negligible if long enough time vertices (V ) are mobile nodes and the edges (E) represent passed to collect many other meeting data. The drawback of the connections between these nodes. However, different from this computation can also be minimized either by updating previous DTN network models [7] [10], we assume that there the computation by including the edge effects as in [12] may be multiple unidirectional (Eu ) and bidirectional (Eb ) or by keeping an appropriate size of window of the past edges between the nodes. The neighbors of a node i are contacts [10]. denoted with N (i) and the edge sets are given as follows: Consider the sample meeting times of a node A with its neighbors B and C in Figure 2. Node A meets with E = Eu ∪ Eb node B at times {5, 16, 25, 30} and with node C at times Eb = {(i, j) | ∀j ∈ N (i)} where, w(i, j) = τi (j) = τj (i) {11, 14, 23, 34}. Following the procedure described above, we Eu = {(i, j) | ∀j, k ∈ N (i) and j = k} where, find that τA (B|C) = (5 + 2 + 2)/3 = 3 time units and w(i, j) = τi (j|k) τA (C|B) = (6 + 7 + 4 + 9)/4 = 6.5 time units. The above definition of Eu allows for multiple unidirec- III. C ONDITIONAL S HORTEST PATH ROUTING tional edges between any two nodes. However, these edges A. Overview differ from each other in terms of their weights and the cor- Shortest path routing protocols for DTN’s are based on the responding third node. This third node indicates the previous designs of routing protocols for traditional networks. Messages meeting and is used as a reference point while defining the are forwarded through the shortest paths between source and conditional intermeeting time (weight of the edge). In Figure 3, destination pairs according to the costs assigned to links we illustrate a sample DTN graph with four nodes and nine between nodes. Furthermore, the dynamic nature of DTN’s is edges. Of these nine edges, three are bidirectional with weights also considered in these designs. Two common metrics used to of standard intermeeting times between nodes, and six are
  • 4. Path 1 C T (C) A B T (C|B) A T (C|D) A D A E T (D) A T (B) A A C T (D|C) A Path 2 T (B|C) A T (B|D) T (D|B) A A D B Fig. 5. Path 2 may have smaller conditional delay than path 1 even though the CSP from node A to node D is through node B. Fig. 3. The graph of a sample DTN with four nodes and nine edges in total. We will next provide an example to show the benefit of CSP C C over SP. Consider the DTN illustrated in Figure 4. The weights R (C|t) =20 30= T C (D) R (C|t) =20 10= TC (D|A) A A of edges (A, C) and (A, B) show the expected residual time A D A D of node A with nodes C and B respectively in both graphs. But the weights of edges (C, D) and (B, D) are different in R (B|t) =25 A 15= T B (D) R (B|t) =25 A 12= TB (D|A) both graphs. While in the left graph, they show the average B B intermeeting times of nodes C and B with D respectively, in the right graph, they show the average conditional intermeeting Fig. 4. The shortest path from a source to destination node can be different times of the same nodes with D relative to their meeting when conditional intermeeting times are used as the weights of links in the with node A. From the left graph, we conclude that SP(A, network graph. D) follows (A, B, D). Hence, it is expected that on average a message from node A will be delivered to node D in 40 time units. However this may not be the actual shortest delay path. unidirectional edges with weights of conditional intermeeting As the weight of edge (C, D) states in the right graph, node times. C can have a smaller conditional intermeeting time (than the C. Conditional Shortest Path Routing standard intermeeting time) with node D assuming that it has met node A. This provides node C with a faster transfer of Our algorithm basically finds conditional shortest paths the message to node D after meeting node A. Hence, in the (CSP) for each source-destination pair and routes the messages right graph, CSP(A, D) is (A, C, D) with the path cost of 30 over these paths. We define the CSP from a node n0 to a node time units. nd as follows: Each node forms the aforementioned network model and collects the standard and conditional intermeeting times of CSP (n0 , nd ) = {n0 , n1 , . . . , nd−1 , nd | n0 (n1 |t) + other nodes between each other through epidemic link state d−1 protocol as in [10]. However, once the weights are known, it τni (ni+1 |ni−1 ) is minimized.} is not as easy to find CSP’s as it is to find SP’s. Consider i=1 Figure 5 where the CSP(A, E) follows path 2 and CSP(A, D) Here, t represents the time that has passed since the last meet- follows (A, B, D). This situation is likely to happen in a DTN, ing of node n0 with n1 and n0 (n1 |t) is the expected residual if τD (E|B) ≥ τD (E|C) is satisfied. Running Dijkstra’s or time for node n0 to meet with node n1 given that they have Bellman-ford algorithm on the current graph structure cannot not met in the last t time units. n0 (n1 |t) can be computed detect such cases and concludes that CSP(A, E) is (A, B, as in [13] with parameters of distribution representing the D, E). Therefore, to obtain the correct CSP’s for each source intermeeting time between n0 and n1 . It can also be computed destination pair, we propose the following transformation on in a discrete manner from the contact history of n0 and n1 . the current graph structure. Assume that node i observed d intermeeting times with node Given a DTN graph G = (V, E), we obtain a new graph j in its past. Let τi1 (j), τi2 (j),. . .τid (j) denote these values. G = (V , E ) where: Then: V ⊆ V × V and E ⊆ V × V where, d k=1 fi (j) k i (j|t) = where, V = {(ij ) | ∀j ∈ N (i)} and E = {(ij , kl ) | i = l} |{τi k (j) ≥ t }| τi (k|j) if j = k τik (j) − t if τik (j) ≥ t where, w (ij , kl ) = fik (j) = τi (k) otherwise 0 otherwise Note that the edges in Eb (in G) are made directional in G and Here, if none of the d observed intermeeting times is bigger the edges in Eu between the same pair of nodes are separated than t (this case occurs less likely as the contact history in E . This graph transformation keeps all the historical grows), a good approximation can be to assume i (j|t) = 0. information that conditional intermeeting times require and
  • 5. T (C | B) A AB T (D | B) A IV. S IMULATIONS Source TA(D | C) AC A To evaluate the performance of our algorithm, we have built BA TB (D | A) a discrete event simulator in Java. In this section, we describe B C A D RA(B|t) TB(A | C) BC T (D | C) B the details of our simulations through which we compare the TC(B | A) T (D | A) C proposed Conditional Shortest Path Routing (CSPR) algorithm D Destination CA T (D | B) C with standard Shortest Path Routing (SPR). Moreover, in our A, B, C and D all meet with each other RA(C|t) CB results we also show the performance of upper and lower performance boundaries with Epidemic Routing [4] and Direct RA(D|t) Delivery. We used two different data sets: 1) RollerNet traces [14] Fig. 6. Graph Transformation to solve CSP with 4 Nodes where A is the which includes the opportunistic contacts of 62 iMotes which source and D the destination node. are distributed to the rollerbladers during a 3 hour skating tour of Paris on August 20, 2006, 2) Cambridge Dataset [23] which includes the Bluetooth contacts of 36 students from Cambridge University carrying iMotes around the city of Cambridge, UK also keeps only the paths with a valid history. For example, for from October 28, 2005 to December 21, 2005. a path A, B, C, D in G, an edge like (CD , DA ) in G cannot To collect several routing statistics, we have generated traffic be chosen because of the edge settings in the graph. Hence, on the traces of these two data sets. For a simulation run, only the correct τ values will be added to the path calculation. we generated 5000 messages from a random source node to To solve the CSP problem however, we add one vertex for a random destination node at each t seconds. In RollerNet, source S (apart from its permutations) and one vertex for since the duration of experiment is short, we set t = 1s, but destination node D. We also add outgoing edges from S to for Cambridge data set, we set t = 1 min. We assume that each vertex (iS ) ∈ V with weight S (i|t). Furthermore, for the nodes have enough buffer space to store every message the destination node, D, we add only incoming edges from they receive, the bandwidth is high and the contact durations each vertex ij ∈ V with weight τi (D|j). of nodes are long enough to allow the exchange of all In Figure 6, we show a sample transformation of a clique messages between nodes. These assumptions are reasonable in of four nodes to the new graph structure. In the initial graph, today’s technology and are also used commonly in previous all mobile nodes A to D meet with each other, and we set the studies [22]. Moreover, we compare all algorithms in the same source node to A and destination node to D (we did not show conditions, and a change in the current assumptions is expected the directional edges in the original graph for brevity). It can to affect the performance of them in the same manner. We ran be seen that we set any path to begin with A on transformed each simulation 10 times with different seeds but the same set graph G , but we also put the permutations of A, B and C of messages and collected statistics after each run. The results with each other. plotted in Figures 7 and 8 show the average of results obtained in all runs. Running Dijkstra’s shortest path algorithm on G given Figure 7 shows the delivery rates achieved in CSPR and the source node S and destination D will give CSP. In G , SPR algorithms with respect to time (i.e. TTL of messages) |V | = O(|V |2 ) and |E | = O(|V 3 |) = |E|3/2 . Therefore in RollerNet traces. Clearly, CSPR algorithm delivers more Dijkstra’s algorithm will run in O(|V |3 ) (with Fibonacci messages than SPR algorithm. Moreover, it achieves lower heaps) while computing regular shortest paths (where edge average delivery delay than SPR algorithm. For example, costs are standard intermeeting times) takes O(|V |2 ). CSPR delivers 80% of all messages after 17 min with an The focus of this paper is an improvement of the current average delay of almost 6 min, while SPR can achieve the design of the Shortest Path (SP) based DTN routing algo- same delivery ratio only after 41 min and with an average rithms. Therefore we leave the elaborate discussion of some delay of 12 min. Although we did not show it here for brevity, other issues in SP based routing (complexity, scalability and the average numbers of times the delivered messages are routing type selection) to the original studies [7] [10]. Using forwarded (number of hops) in SPR and CSPR are very close conditional instead of standard intermeeting times requires (1.48 and 1.52 respectively) to each other (and much smaller extra space to store the conditional intermeeting times and than the average number of times a message is forwarded in additional processing as complexity of running Dijkstra’s epidemic routing which is around 25). algorithm increases from O(|V |2 ) to O(|V |3 ). We believe In Figure 8, we show the delivery rates achieved in Cam- that in current DTN’s, wireless devices have enough storage bridge traces. As before, CSPR algorithm achieves higher and processing power not to be unduly taxed with such an delivery ratio than SPR algorithm. After 6 days, CSPR delivers increase. Moreover, to lessen the burden of collecting and 78% of all messages with an average delay of 2.6 days, storing link weights, an asynchronous and distributed version while SPR can only deliver 62% of all messages with an of the Bellman-Ford algorithm can be used, as described average delay of 3.2 days. The numbers of times a message is in [21]. forwarded in SPR and CSPR are 1.73 and 1.78, respectively,
  • 6. 1 1 0.8 0.8 Message delivery ratio Message delivery ratio 0.6 0.6 0.4 0.4 SPR SPR 0.2 CSPR 0.2 CSPR Epidemic Epidemic Direct Direct 0 0 0 10 20 30 40 50 0 1 2 3 4 5 6 Time (min) Time (day) Fig. 7. Message delivery ratio vs. time in RollerNet traces. Fig. 8. Message delivery ratio vs. time in Cambridge traces. while it is around 16 in epidemic routing. [5] T. Spyropoulos, K. Psounis,C. S. Raghavendra, Efficient routing in inter- These results show that the conditional intermeeting time mittently connected mobile networks: The multi-copy case, IEEE/ACM Transactions on Networking, 2008. represents link cost better than the standard intermeeting [6] Y. Wang, S. Jain, M. Martonosi, and K. Fall, Erasure coding based time. Therefore, in CSPR, more effective paths with similar routing for opportunistic networks, in Proceedings of ACM SIGCOMM average hop counts are selected to route messages. Conse- workshop on Delay Tolerant Networking (WDTN), 2005. [7] S. Jain, K. Fall, and R. Patra, Routing in a delay tolerant network, in quently, higher delivery rates with lower end-to-end delays Proceedings of ACM SIGCOMM, Aug. 2004. are achieved. In SPR and CSPR algorithms here, we used [8] T. Spyropoulos, K. Psounis,C. S. Raghavendra, Spray and Wait: An source-routing and let the messages follow the paths which Efficient Routing Scheme for Intermittently Connected Mobile Networks, ACM SIGCOMM Workshop, 2005. are decided at the source nodes. We also observed similar [9] A. Lindgren, A. Doria, and O. Schelen, Probabilistic routing in in- results in our simulations when other routing types (per-hop termittently connected networks, SIGMOBILE Mobile Computing and and per-contact) are used. Communication Review, vol. 7, no. 3, 2003. [10] E. P. C. Jones, L. Li, and P. A. S. Ward, Practical routing in delay tolerant networks, in Proceedings of ACM SIGCOMM workshop on V. C ONCLUSION AND F UTURE W ORK Delay Tolerant Networking (WDTN), 2005. In this paper, we introduced a new metric called conditional [11] A. Chaintreau, P. Hui, J. Crowcroft, C. Diot, R. Gass, and J. Scott, Impact of Human Mobility on the Design of Opportunistic Forwarding intermeeting time inspired by the results of the recent studies Algorithms, in Proceedings of INFOCOM, 2006. showing that nodes’ intermeeting times are not memoryless [12] X. Zhang, J. F. Kurose, B. Levine, D. Towsley, and H. Zhang, Study and that motion patterns of mobile nodes are frequently of a Bus-Based Disruption Tolerant Network: Mobility Modeling and Impact on Routing, In Proceedings of ACM MobiCom, 2007. repetitive. Then, we looked at the effects of this metric on [13] S. Srinivasa and S. Krishnamurthy, CREST: An Opportunistic Forward- shortest path based routing in DTN’s. For this purpose, we ing Protocol Based on Conditional Residual Time, in Proceedings of updated the shortest path based routing algorithms using con- IEEE SECON, 2009. [14] P. U. Tournoux, J. Leguay, F. Benbadis, V. Conan, M. Amorim, ditional intermeeting times and proposed to route the messages J. Whitbeck, The Accordion Phenomenon: Analysis, Characterization, over conditional shortest paths. Finally, we ran simulations and Impact on DTN Routing, in Proceedings of Infocom, 2009. to evaluate the proposed algorithm and demonstrated the [15] C. Liu and J. Wu, Routing in a Cyclic Mobispace, In Proceedings of ACM Mobihoc, 2008. superiority of CSPR protocol over the existing shortest path [16] H. Dubois-Ferriere, M. Grossglauser, and M. Vetterli, Age Matters: routing algorithms. Efficient Route Discovery in Mobile Ad Hoc Networks Using Encounter In future work, we will look at the performance of the Ages, In Proceedings of ACM MobiHoc, 2003. [17] T. Spyropoulos, K. Psounis, and C. Raghavendra, Spray and Focus: proposed algorithm in different data sets to see the effect Efficient Mobility-Assisted Routing for Heterogeneous and Correlated of conditional intermeeting time in different environments. Mobility, In Proceedings of IEEE PerCom, 2007. Moreover, we will consider extending our CSPR algorithm by [18] E. Daly and M. Haahr, Social network analysis for routing in discon- nected delay-tolerant manets, In Proceedings of ACM MobiHoc, 2007. using more information (more than one known meetings) from [19] P. Hui, J. Crowcroft, and E. Yoneki, BUBBLE Rap: Social Based the contact history while deciding conditional intermeeting Forwarding in Delay Tolerant Networks, In Proc. of ACM MobiHoc, times. For this, we plan to use probabilistic context free gram- 2008. [20] A European Union funded project in Situated and Autonomic Commu- mars (PCFG) and utilize the construction algorithm presented nications, www.haggleproject.org. in [26]. Such a model will be able to hold history information [21] D. Bertsekas, and R. Gallager, Data networks (2nd ed.), 1992. concisely, and provide further generalizations for unseen data. [22] C. Liu and J. Wu, An Optimal Probabilistically Forwarding Protocol in Delay Tolerant Networks, in Proceedings of MobiHoc, 2009. R EFERENCES [23] J. Leguay, A. Lindgren, J. Scott, T. Friedman, J. Crowcroft and P. Hui, CRAWDAD data set upmc/content (v. 2006-11-17), downloaded from [1] Delay tolerant networking research group, http://www.dtnrg.org. http://crawdad.cs.dartmouth.edu/upmc/content, 2006. [2] T. Spyropoulos, K. Psounis,C. S. Raghavendra, Efficient routing in inter- [24] Y. Wang, P. Zhang, T. Liu, C. Sadler and M. Martonosi, mittently connected mobile networks: The single-copy case, IEEE/ACM http://crawdad.cs.dartmouth.edu/princeton/zebranet, CRAWDAD data Transactions on Networking, vol. 16, no. 1, Feb. 2008. set princeton/zebranet (v. 2007-02-14), 2007. [3] J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine, MaxProp: [25] E. Bulut, Z. Wang, and B. Szymanski, Cost-Effective Multi-Period Routing for Vehicle-Based Disruption- Tolerant Networks, In Proc. IEEE Spraying for Routing in Delay Tolerant Networks, to appear in Infocom, April 2006. IEEE/ACM Transactions on Networking, 2010. [4] A. Vahdat and D. Becker, Epidemic routing for partially connected ad [26] S. Geyik, and B. Szymanski, Event Recognition in Sensor Networks by hoc networks, Duke University, Tech. Rep. CS-200006, 2000. Means of Grammatical Inference, in Proceedings of INFOCOM, 2009.