Contention Aware Mobility Prediction - WINET - Journal
Contention Aware Mobility Prediction - WINET - Journal
Wireless Networks
The Journal of Mobile Communication,
Computation and Information
ISSN 1022-0038
Volume 19
Number 8
1 23
Your article is protected by copyright and all
rights are held exclusively by Springer Science
+Business Media New York. This e-offprint is
for personal use only and shall not be self-
archived in electronic repositories. If you wish
to self-archive your article, please use the
accepted manuscript version for posting on
your own website. You may further deposit
the accepted manuscript version in any
repository, provided it is only made publicly
available 12 months after official publication
or later and provided acknowledgement is
given to the original source of publication
and a link is inserted to the published article
on Springer's website. The link must be
accompanied by the following text: "The final
publication is available at link.springer.com”.
1 23
Author's personal copy
Wireless Netw (2013) 19:2093–2108
DOI 10.1007/s11276-013-0588-7
123
Author's personal copy
2094 Wireless Netw (2013) 19:2093–2108
resources as well as the possible performance degradation results and comparisons with the other counterparts. Sec-
when the nodal mobility is not random. tion 8 concludes the paper.
In predicted routing, the prediction of a contact of each
node pair is predicted based on some statistical information
such as the last time of meeting, the frequency of meetings 2 Related work
among nodes, the number of previous contacts, or the
probability of meeting between nodes in some locations. The previously reported encounter-based routing protocols
The techniques that employ this kind of mobility exploi- have focused on the node mobility which is exploited and
tation are also referred to as utility-based routing [9–14, taken as the dominant factor in the message forwarding
31]. The decision of message forwarding to the encoun- decision [28]. Those schemes contributed to the research
tered node is simply based on a developed utility function. community by introducing novel interpretations of the
Although utility based routing schemes have improved observed node mobility in the per-node utility function.
in terms of performance, the previously reported schemes Spyropoulos et al. in [15, 25] developed routing strategies
are subject to respective problems and implementation using different utility routing metrics based on nodal
difficulties. Most importantly, these schemes inevitably mobility statistics, namely Most Mobile First (MMF), Most
take a large amount of transmission bandwidth and nodal Social First (MSF) and Last Seen First (LSF). S. Nelson
memory space, which could easily dominate the network et al. [16] proposed an enhanced version of MSF, where
resource consumption [15]. Further, they suffer from con- the number of message replicas that are transferred during
tention in case of high traffic loads, in which packet drops a contact is proportional to per-node utility function based
could result in a significant degradation of performance and on the evolution of the number of encounters a node has
scalability. Note that the future DTNs may operate on a during a time-window. A. Lindgren et al. in [9] introduced
vast number of miniature and hand-held devices such as a routing technique in DTNs which takes advantage of the
smart phones, tablet computers, personal digital assistants predicted encounter probability between nodes. Jones et al.
(PDAs), and fixed /mobile sensors, which are subject to a in [17] introduced a utility function for DTN routing which
stringent limitation on power consumption and computa- manipulates the minimum expected inter-encounter dura-
tion resources. tion between nodes. Ling et al. in [18] designed a feedback
The paper introduces a novel DTN routing protocol, adaptive routing scheme based on the factors solely
called Predict and Forward (PF), aiming to overcomes the determined by the node mobility, where a node with higher
shortcomings of the previously reported utility schemes. mobility is given a higher factor, and messages are trans-
The main features of the proposed protocol are: (1) mitted through nodes with higher influence factors.
employing an efficient prediction of contact based on the A. Balasubramanian et al. in [10] considered statistics of
probability distribution of meeting between nodes at dif- available bandwidth and the number of message replicas
ferent network partitions, (2) capability to adapt to fluctu- currently in the network in the derivation of the routing
ating network status, traffic patterns /characteristics, and metric to decide which message to replicate first among all
user behaviors, so as to reduce the number of transmis- buffered messages in a node.
sions, message delivery time, and increase delivery ratio. Another scheme is called delegation forwarding [13,
This is achieved by jointly considering node mobility sta- 19], where a custodian node forwards a message copy to an
tistics, congestion, and buffer occupancy, which are sub- encountered node that has a better chance to ‘‘see’’ the
sequently fused in a novel quality-metric function. In destination. The key idea is that a custodian node (source
specific, the link availability and buffer occupancy statis- or relay) forwards a message copy only if the utility
tics are obtained by sampling the channels and buffer space function (represented by the rate of encounters between
during each contact with another node. The developed node pairs) of the encountered node is higher than all the
quality-metric function facilitates decision making for each nodes so far ‘‘seen’’ by a message, and then the current
active data message, resulting in optimized network per- custodian updates its utility value of that message equal to
formance. We will show via extensive simulations that the that of the encountered node.
proposed PF can achieve a significant performance gain The idea of routing using a node mobility profile is
over the previously reported counterparts. introduced by S. Merugu et al. in [3]. It is assumed that
The rest of the paper is organized as follows. Section 2 each node has a set of usually visited locations, referred to
gives a review over the related work. Section 3 describes as the hub list of the node. The introduced protocol routes a
the system model. Section 4 introduces the method of message to one or more locations that have been visited by
estimating the contact probabilities. Section 5 introduces the destination when either the current message custodian
the proposed PF in detail. Section 6 provides the mathe- or the encountered node visits these hubs. The contact
matical analysis. Then, Section 7 provides the simulation probability between two nodes is computed based on all
123
Author's personal copy
Wireless Netw (2013) 19:2093–2108 2095
nodes’s hub-visited probabilities. By assuming that each any two nodes located in a community within the trans-
node knows its next hub, a node forwards a message to a mission range of each other can establish a contact to
number of its neighbors with a higher probability to visit a exchange messages. Communities are also assigned unique
hub visited by the destination. Each node is assumed to IDs. Each community is attached to a super node, which
know every other node mobility, and can compute the keeps all contact probabilities of the nodes that belong to
contact probabilities with every other node. Such contact the community. It also keeps track of the contact proba-
relation is further abstracted into a weighted graph, wherein bility of any roaming node visiting its community. We
k-shortest path algorithm is applied to find a list of paths to assume a node can be associated with no more than one
every other destination. The method in [3] is an effective community at a time and is aware of which community it is
approach to deal with the considered scenario. However, located.
this mechanism of forwarding is subject to high overhead, In this mobility model, the geographical service area is
and the assumption of knowing the complete topology partitioned into m communities.We consider only in-com-
regarding the nodal mobility is not realistic in most cases. munity meetings among nodes, while on-way meetings are
In the same line of [3], Q. Yuan et al. in [12] introduced negligible to ensure sufficient meeting time for completing
the idea of the contact probability as the main factor of the message forwarding. By assuming the node future
message forwarding. They introduced a single-copy rout- location is independent of its past location given its current
ing scheme called predict and relay (PER) in the scenario location, and each node has an exponential residence time
where the node movement, including the information on for staying in a community or roaming between commu-
when the contact will occur and how long it will last, is nities, the nodal mobility can be modeled as a continuous
semi-deterministic and can be predicted provided with time Markov chain.
sufficiently long mobility history. By using a time-homo- Specifically, the residence time of node A in a com-
geneous semi-Markov process model, PER enables each munity Ci in each visit is an exponential random variable
node to keep the complete network topology, by which an with parameter kliA . When Node A leaves Community Ci, it
optimal performance can be achieved. Obviously, such a may move to any other community Cj, with a probability of
scheme introduces extremely high computation complexity PACij . The roaming time of node A from a community Ci to
and operational overhead.
any other community Cj is exponentially distributed with
To countermeasure the deficiency of the previously
parameter kri;jA . Denote the location state of a mobile node
reported designs, a number of studies have been reported
[13, 15, 20–22]. Nonetheless, they are subject to various A by its current community, then the user mobility model
limitations due to the simplified assumptions related to the can be characterized by a one-dimensional continuous-time
nodal mobility scenarios [12, 23], or the utility function Markov chain, with a location state space given by
presentation [11, 14, 16]. More importantly, the channel C1 ; C2 ; . . .; Cm . The user movement model over the net-
capacity and buffer occupancy states have not completely work coverage area is described by the transition matrix
been considered as factors in the derivation of utility M of the Markov chain, given by PACij , which is the con-
functions. The impact of these two factors is minimal at ditional probability that a mobile node enters community
low encounter frequencies and low traffic loads, but it is Cj given that it is leaving its current community Ci. For any
P
expected to become more significant as the network community Ci, we have j PACij ¼ 1. The transition prob-
resource availability serves as a bottleneck in the message ability matrix depends on the geographical characteristics
forwarding. of the service area and the network environment under
consideration.
3 System model
As addressed in literature [10, 14, 24], many collected real 4 Estimation of contact probabilities
world traces demonstrated that the nodes follow a semi-
deterministic trajectory, or have some patterns in their Define inter-meeting time between a pair of nodes as the
movements. duration of time instant at which two nodes move out of
To characterize the mobility pattern, in this work we each other’s transmission range until the instant that they
consider a partitioned community-based DTN with super move within each other’s transmission range the next time.
node [23]. In this model, a finite number of mobile nodes Define meeting time as the duration of time in which two
roam freely between a set of communities, each repre- nodes remain in contact until they move out of transmis-
senting a MANET. A community is defined as a group of sion range of each other. Define node inter-arrival time for
nodes who can communicate directly with each other, i.e., a community as the duration from the instant that a node
123
Author's personal copy
2096 Wireless Netw (2013) 19:2093–2108
departs from a community to the instant that the node arrival time of node A to community Ci is exponential with
arrives back at the same community. parameter kiA pAi , and its mean is
Our objective is to analyze the aforementioned node EiA ¼ 1=ðkiA pAi Þ ð4Þ
mobility model so as to obtain an accurate estimate of the
contact probability between each node pair, where the Inter-meeting time (theory): Nodes A and B meeting at
nodal inter-meeting and meeting times are characterized Ci can occur in two scenarios: (1) node A moves to Ci while
and focused. In the following, we derive the distribution of node B already resides in Ci; (2) node B moves to Ci while
the node inter-arrival time for a community and the dis- node A already resides in Ci. Considering scenario (1), the
tribution of the inter-meeting time. number of meetings between the two nodes at Ci is the
Inter-arrival time (theory): Define N(t) as the number of fraction of node A arrivals to community Ci while node B is
all visited communities by time t for node A. Then, N(t) is a residing there. According to the theory of the inter-arrival
Rt time and the fact that node B resides in community Ci with
non-homogeneous Poisson process with mean ¼ ki ðsÞds. probability pBi , the number of effective meetings between
This mean is the sum of the expected residence and A and B at Ci when node A makes the movement follows
roaming times for node A while it roams from one com- Poisson process with mean kiA pAi pBi t. Hence, the inter-
munity to another. Define Ni(t) as the number of visits by meeting time between A and B at community Ci when node
node A to community Ci by time t. Then, the mean arrival A makes the movement is an exponential random variable
Pn with parameter kiA pAi pBi . Similarly, in scenario (2), the
time to the nth community is EAn ¼ i¼1 ðEi ½Tc þ Eij ½TrÞ,
where Ei[Tc] and Eij[Tr] represent the average residence inter-meeting time between A and B at Ci when node
time at community Ci, and the average roaming time when B makes the movement is an exponential random variable
node A move from community Ci to community Cj, with parameter kiB pBi pAi . As a result, the inter-meeting
respectively. In specific, node A stays at Ci for an expo- time between A and B at Ci is a random variable that is the
nential time with parameter kliA ¼ Ei ½Tc
1
and roam with minimum of the two independent exponential random
variables, which follows an exponential distribution with
probability PAci,j to another Cj for an exponential time with parameter (kiA pAi pBi þ kiB pBi pAi ). Considering all network
parameter kri;jA ¼ Ei ½Tr
1
, then the rate that node A makes a partitions, the inter-meeting time between A and B is a
transfer from state i to state j is calculated as random variable with a distribution of the minimum of the
two nodes inter-meeting times at all the network partitions,
1
ki;jA ¼ ð1Þ which is an exponential random variable with parameter
1=ðkliA Pci;jA Þ þ ð1=kri;jA Þ given by
The expected inter-arrival rate of node A at Ci is Xm
calculated as ðk þ kiB ÞpAi pBi
i¼1 iA
ð5Þ
!
X n
1 Noticeably, the above relation is largely based on the
kiA ¼ 1= k
ð2Þ amount of meeting time intervals between nodes, which is
k¼1 ki;jA
in turn affected by the status and the duration of the status
where n is the total number of visited communities by node of the wireless channel and buffer. These contact
A until it come back to Ci. components are time varying and could change
Since the continuous-time Markov chain of node A is dramatically from time to time. The short period of
irreducible, the limiting probabilities exist and can be contact time or the unavailability of the channel or the
P
obtained by solving pAQA = 0, and pAi ¼ 1, where buffer space may cause unsuccessful message exchange.
i Thus, two factors should be considered in (5): (1) the
Q represents the generator matrix, which is given by impact the contact time duration. This factor is introduced
8
>
< P ki;jA if i 6¼ j as the probability that node A will leave the neighborhood
Qi;jA ¼ ki;jA if i ¼ j ð3Þ of community Ci on or before time unit k, denoted as SAi (k).
>
: j Note that SAi (k) also indicates the distribution of the sojourn
0 otherwise
time at Ci for node A regardless of the next community.
pAi is the limiting probability representing the fraction The time parameter(k) is used as a relative time offset. (2)
of time in which node A resides in community Ci. The probability in which the channel is free and the buffer
Thus, the parameter of inhomogeneous Poisson process, at the encountered node B is not full at Ci, denoted as, Pfi .
N(t), can be presented as kiA pAi t. As a result, the inter- This probability represents the probability of performing a
123
Author's personal copy
Wireless Netw (2013) 19:2093–2108 2097
transition probability matrix at each community that This probability is used to estimate the expected contact
reflects its movement history. The transition probability of time to transfer a message from node A to node D.
123
Author's personal copy
2098 Wireless Netw (2013) 19:2093–2108
123
Author's personal copy
Wireless Netw (2013) 19:2093–2108 2099
directly to node D rather than forwarding them through 5.1 Forwarding strategy
B. The inverse of probability of contact between nodes
1 The decision of message forwarding in PF is mainly based
A and D, Pr(A,D), is calculated by PðA;DÞ , where P(A,D) is the
average probability of contact between node A and on the utility function value of the encountered node
D. Pr(A,B) and Pr(B,D), are obtained using the similar way. regarding the destination, and the number of message copy
The calculation of the P(A,B) is given by Eq. (7). The new tokens. If more than one message copies are currently
updated parameter, Pr(A,D), is calculated as follows: carried, the weighted copy rule is applied; otherwise the
forwarding rule is applied.
Pnew
rðA;DÞ ¼ wPrðA;DÞ þ ð1 wÞðPrðA;BÞ þ PrðB;DÞ Þ ð15Þ
PrðA;BÞ þ PrðB;DÞ The idea of weighted copy rule was first examined in [27]
w¼ ð16Þ
PrðA;DÞ and [11], and has been proved to achieve improved
delivery delay. The proposed PF scheme will also incor-
Note that w must be less than 1; that is Pr(A,D) [ Pr(A,B)
porate with such a mechanism.
? Pr(B,D).
The source of a message initially starts with L copies. In
The new probability of contact is obtained by applying
the event that any node A that has n [ 1 message copy
the following relation
tokens and encounters another node B with no copies with
1 P(B,D) [ P(A,D), node A hands over some of the message
Pnew
ðA;DÞ ¼ ð17Þ
Pnew
rðA;DÞ copy tokens to node B and keeps the rest for itself
according to the following formula:
Pnew
(A,D) represents the new value of Pr(A,D) that is obtained
from the transitivity update. The introduced transitivity- PðB;DÞ
NB ¼ NA ð18Þ
update rule has great impact on protocol performance. PðB;DÞ þ PðA;DÞ Þ
Note that predicting the future mobility of nodes relies
where NA is the number of message tokens that node A has,
on their trajectory history, which is recorded and dissem-
P(B,D) is the predicted probability of node B encountering
inated throughout the network in an epidemic fashion or
node D, and P(A,D) is the predicted probability of contact
through the supper nodes attached to each community.
between nodes A and D. This formula guarantees that the
largest number of message copies is spread to relay nodes
that have better information about the destination node.
5 Forwarding strategy in PF
After L message copies have been disseminated and carried
by the encountered custodian nodes, each custodian node
PF is a multi-copy DTN routing protocol. At each for-
carrying the message performs message forwarding
warding step, PF selects the next hop with the highest
according to the forwarding rule as described below.
probability of delivery to the destination. If more than one
node is in the transmission range of node A, node A selects
5.1.2 The forwarding rule
the next hope by comparing a probability metric (utility
function) U(x) for all nodes currently in contact with
• If the destination node is one hop away from an
A, denoted as NA, and for itself, x 2 f Ag [ NA . This metric
encountered node, the custodian node hands over the
indicates the delivery performance to the destination if
message to the encountered node and completes the
node A selects node x as the next hop and forwards the
message delivery.
message to x. The current node then selects the next-hop
• If the utility value of the encountered node relative to
h as the node for which the delivery probability metric is
that of the destination node is greater than that of the
maximized
custodian node by a threshold value, Pth, a custodian
h ¼ arg max UðxÞ node hands over the message to the encountered node.
x2fAg[NA
• If A and B are in transmission of super node H, and
If the selected next hop is the current node (h = A), the H has utility value regarding a node C, which is higher
message will not be forwarded. than that of node A or B regarding to D, and C has
123
Author's personal copy
2100 Wireless Netw (2013) 19:2093–2108
these traces demonstrate exponential tails after a specific If there are L - 1 copies (excluding the message at the
cutoff point [35]. Based on the mobility model of the source) of message m traversing through L - 1 independent
nodes, the distribution of the inter-contact time can be paths in the network, the maximum probability of message
predicted and calculated using (6). Thus, parameter bAB is delivery can be written as
Pm
calculated as bAB ¼ i¼1 ðkiA þ kiB ÞpAi pBi SAi Pfi . PRmax ðTd \TÞ ¼ maxfPRSD ; PR1 ; PR2 ; ::; PRL1 g ð23Þ
123
Author's personal copy
Wireless Netw (2013) 19:2093–2108 2101
where PRSD and PRl are random variables representing the The above relation gives an upper bound on the delivery
delivery probability in case of direct message delivery delay since it is conditioned to TSD, TSD \1 and can be
between S and D, and through one of L - 1 paths, taken as benchmark.
respectively. The expected delivery probability of message The average delivery delay of message m can be cal-
g with L - 1 copies traversing on L - 1 paths is calculated as: culated intuitively as:
" !#
1 X
L1
1
Y
L 1
E EDðS;DÞ ¼ TSD þ Tdl : ð30Þ
PRðTd \TÞ ¼ 1 PRSD ðTSD [ T Þ ð1 PRl ðTdl \TÞÞ L l¼1
PRðTd \TÞ
l¼1
ð24Þ TSD is included in (30) only if TSD \1.
! By assuming X totally generated messages in the net-
L1 X
Y kl
ðkl Þ bi T work, the average delivery delay can thus be calculated as
PRðTd \TÞ ¼ 1 ebSD T Ci e ð25Þ
l¼1 i¼1
1X X
DR ¼ Dg ð31Þ
By assuming X totally generated messages in the X g¼1
network, the average of the delivery probability in the
network is calculated as 6.3 Validation of analytical model
1X X
In order to evaluate the accuracy of the mathematical
PR ¼ PRg ð26Þ
X g¼1 expressions in this analysis, PF is examined under two
network status scenarios. In the first scenario, the network
6.2 Delivery delay is operating under no congestion, i.e., all the nodes have
infinite buffer space, and the bandwidth is much larger than
Theorem 2 The expected total time required to deliver a the amount of data to be exchanged between any two
message from S to D along an individual path l can be encountered nodes. In the second scenario, the network is
calculated as operating under limited resources, i.e., the forwarding
Z1 X
kl Z1 opportunities can be lost due to high traffic, limited
ðkl Þ
E½Dl ¼ PRl ðTdl [ tÞ ¼ Ci : ebi t dt bandwidth, limited buffer space, or contention (i.e., more
i¼1 than one node within the transmission range are trying to
0 0 ð27Þ
X
kl access the wireless channel at the same time). For both
ðk Þ 1
E½Dl ¼ Ci l : scenarios, 50 nodes move in a 1200 m 9 1200 m network
i¼1
bi
divided into 6 communities. The transmission range is set
Let message m have L - 1 copies (excluding the to 30 to enable moderate network connectivity with respect
message at the source) traversing on L - 1 independent to the considered network size. The traffic load is varied
paths. The minimum delivery delay can be written as: from a low traffic load (i.e., 20 messages generated per
DSD ¼ minfTSD; Td1 ; Td2 ; ::TdL1 g ð28Þ node in 30,000 time units) to high traffic load (i.e., 80
messages generated per node in 30,000 time units). A
where TSD and Tdl are a random variables representing the source node randomly chooses a destination and generates
delivery delay through direct path between S and D and messages to it during the simulation time. In this analysis
through one of L - 1 paths, respectively. The expected the message copies are set to 4 (i.e., forming a maximum of
delay of message m, E[DSD], can be calculated as 4 paths).
Examining PF under the two scenarios is very impor-
Z1
tant; in case of no congestion, the best path that is taken by
E½DSD ¼ PðTd [ tÞ a message is mainly based on the inter-contact and contact
0 time, while under congestion, the message will be buffered
Z1 !
L1 X
Y kl for longer period of time and forced to take longer path to
ðk Þ
¼ ebSD t Ci l :ebi t dt go around the congested area resulting in more dropping
l¼1 i¼1
0 rate and longer delivery delay.
Z1 ! To enable accurate analysis, the simulation program is
1 Y
L1 X
kl
ðk Þ
bSD t
¼ bSD e Ci l :ebi t dt run for a period of time (warm-up period of 10,000 time
bSD
0
l¼1 i¼1 units) such that each node can build and maintain the best
( !) forwarding paths with every other node in the network.
1 Y
L 1 X
kl
ðkl Þ bi TSD
¼ E Ci :e ; TSD \1 ð29Þ These forwarding paths are mainly based on the congestion
bSD l¼1 i¼1 degree (traffic loads values) considered in the analysis. The
123
Author's personal copy
2102 Wireless Netw (2013) 19:2093–2108
123
Author's personal copy
Wireless Netw (2013) 19:2093–2108 2103
P, steady state probability p, community inter-arrival rate results of the delivery delay, delivery ratio, and number of
ki, and sojourn time probability distribution Sij(k). Thus, transmissions, respectively. The buffer space was varied
the simulation was run for a ‘‘warm-up period’’ to reach the from 5 (very limited capacity) to 200 (relatively high
steady state with stable values of these parameters. The capacity) messages to reflect the performance of the pro-
simulation lasted for 30,000 time units in each scenario. tocols under the considered traffic load. As expected, due
The final result is the average of twenty runs. to the high traffic volumes, we see a significant impact
The message inter-arrival time is uniformly distributed upon the message forwarding decisions due to the degra-
in such a way that the traffic can be varied from low (20 dation of utility function values caused by buffer overflow.
messages per node in 30,000 time units) to high (70 mes- Note that when the buffer of the encountered node is full,
sages per node in 30,000 time units). The message time to some messages cannot be delivered even though the
live (TTL) is set to 8,000 time units. Each source node encountered node utility value regarding the message
selects a random destination node, and begins generating destination is better than that of the custodian node. This
messages to it during simulation time. situation results in extra queuing delay, especially in the
To examine the performance of PF, it is compared to case when flooding-based schemes are in place. As shown
schemes belonging to the same category (utility-based rout- in the figures, when the buffer size is small (50 messages or
ing). Each one of the considered schemes employs the nodal less) the performance of the protocols is very sensitive to
mobility in a different way. The following schemes reported in the change of buffer capacity.
the literature were implemented in the simulation. It is observed that the PF scheme produced the best
performance in all scenarios, since it considers the situation
• Delegation forwarding (DF) [13]
that a node may have a full buffer, and then degrades the
• Spray and focus (S&F) [15]
corresponding utility metric, producing the best perfor-
• Predict and forward utility-based routing protocol (PF)
mance. In specific, PF yielded a shorter delivery delay than
• Most mobile first (MMF)[25]
that of PROPHET by 170 %, S&F by 59 %, and SARP by
• Self-adaptive routing protocol (SARP) [11]
25 %. PF can achieve a higher delivery ratio than DF by
• PROPHET [9]
76 %, PROPHET by 81 %, S&F by 68 %, and SARP by
For all the protocols, an attempt has been made to tune 19 %. Although PF produced more transmissions than
the parameters in each scenario separately, in order to MMF and DF, it yielded a smaller delivery delay than that
achieve the best transmission-delay performance. The of MMF by 84 %, and DF by 68 %. As the buffer size
utility’s threshold parameter for Spray and Focus, SARP, increased, the performance of all protocols improved
and PF was set to 150, 30, and 0.07, respectively. Simi- especially for MMF and SARP. When the buffer size is
larly, the number of message copies (L) was set 15 for larger than the traffic demand, the SARP scheme has
Spray and Focus, and 10 for SARP and PF. yielded a competitive performance due to the relaxation of
The performance comparison under the considered buffer capacity limitation. PF still yielded the best perfor-
mobility scenarios is in terms of average delivery delay, mance with a smaller number of transmissions than S&F
delivery ratio, and the total number of transmissions per- by 35 %.
formed for all delivered messages.
7.2.2 The effect of traffic load
7.2 Evaluation scenarios
The main goal of this scenario is to observe the perfor-
We analyze the performance implication of the following. mance impact and how PF reacts under different degrees of
First, the performance of the protocols is evaluated with wireless channel contention. The network connectivity is
respect to the low transmission range and varying buffer kept high (i.e., the transmission range is set to as high as
capacity under high traffic load. Second, with respect to the 40 m) under different traffic loads, while channel band-
high-level of connectivity at each community and varying width is set relatively quite small (i.e., one message
traffic load. Third, with respect to moderate-level of con- transfer per unit of time) in order to create congested
nectivity and varying message TTL. environment. We have two scenarios for nodal buffer
capacity: (1) unlimited capacity; and (2) low capacity (15
7.2.1 The effect of buffer size messages). Figures 7, 8, and 9 show the performance of all
the routing algorithms in terms of the average delivery
To examine the effect of buffer sizes upon the performance delay, delivery ratio, and total number of transmissions,
of PF, the transmission range is set to moderate (i.e., K = respectively.
10) and the traffic load is 60 messages generated per node It is observed that PROPHET produced the longest
(relatively high). Figures 4, 5 and 6 show the experiment delivery delay and requires a higher number of
123
Author's personal copy
2104 Wireless Netw (2013) 19:2093–2108
123
Author's personal copy
Wireless Netw (2013) 19:2093–2108 2105
MMF, DF, S&F, and SARP by 360, 54, 430, 270, and achieve as high as 93 %, compared with 90 % by SARP,
59 %, respectively. Regarding the delivery ratio, PF, 87 % by MMF, 77 % by DF, and 88 % by S&F. Even
MMF, S&F, and SARP can achieve excellent performance though DF produced the lowest number of transmissions, it
of 98 %, while the PROPHET routing degrades below is at the expense of the worst delivery delay.
70 % for high traffic loads. DF can achieve delivery ratio As the buffer capacity is low (e.g., 15 messages) and the
above 90 %. traffic load is high, the available bandwidth decreases and
As expected, the performance of all the schemes the buffer occupancy increases accordingly, which
degrades as wireless channel contention is getting higher, degrades the performance of all protocols, especially for
especially when the traffic load exceeds 50 messages per the PROPHET and MMF. It is observed that PROPHET
node during the simulation period. We observed that PF produced the largest delivery delay. It is notable that PF
can achieve significantly better performance compared to outperforms all the multiple-copy routing protocols in
all the other schemes, due to the consideration of busy links terms of delivery delay and delivery ratio under all possible
in its message forwarding mechanism, where the corre- traffic loads. When the traffic load is high, PF yielded
sponding routing-metric is reduced accordingly. This shorter delivery delay than that of SARP by 28 %, MMF
results in the ability of rerouting the contended messages by 53 %, SF by 41 %, DF by 47 %, and PROPHET by
through the areas of low congestion. However, such a re- 233 %. Although PF requires more transmissions com-
routing mechanism makes messages take possibly long pared to the MMF and DF, the number is still smaller than
routes and results in more transmissions than that of MMF that produced by S&F. PF can achieve delivery ratio above
and DF. In summary, the delivery delay obtained by the PF 76 % for high traffic loads, while the SARP, PROPHET,
in this scenario is shorter than that of PROPHET by 330 %, DF, S&F, and MMF degrades by 66, 47, 51, 62, and 55 %,
MMF by 66 %, S&F by 88 %, DF by 233 %, and SARP by respectively. Even though SARP obtains the second best
30 % respectively. Regarding delivery ratio, PF can performance, its mechanism is not capable of dealing with
123
Author's personal copy
2106 Wireless Netw (2013) 19:2093–2108
8 Conclusion
123
Author's personal copy
Wireless Netw (2013) 19:2093–2108 2107
11. Elwhishi, A. & Ho, P. (2009). SARP—A novel multi-copy 32. Jindal, A., & Psounis, K. (2009). Contention-aware performance
routing protocol for intermittently connected mobile networks. In analysis of mobility-assisted routing. IEEE Transactions on
IEEE GLOBECOM (pp. 4482–4488). Mobile Computing, 8(2), 145–161.
12. Yuan, Q., Cardei I., & Wu, J. (2012). An efficient prediction- 33. Groenevelt, R., Nain, P., & Koole, G. (2005). The message delay
based routing protocol in disruption-tolerant networks. IEEE in mobile ad hoc networks. Performance Evaluation, 62(1–4),
Transactions on Parallel and Distributed Systems, 23(1), 19–31. 210–228.
13. Erramilli, V., Crovella, M., Chaintreau, A. , & Diot, C. (2008). 34. Akkouchi, M. (2008). On the convolution of exponential distri-
Delegation forwarding. In ACM MobiHoc (pp. 251–260). butions. Journal of Chungcheong Mathematical Society, 21(4),
14. Spyropoulos, T., Psounis, K., & Raghavendra, C. S. (2008). 501–510.
Efficient routing in intermittently connected mobile networks: 35. Karagiannis, T., Boudec, J., & Vojnović, M. (2010). Power law and
The single-copy case. IEEE/ACM Transactions on Networking, exponential decay of intercontact times between mobile devices.
16(1), 63–76. IEEE Transactions on Mobile Computing, 9(10), 1377–1390.
15. Spyropoulos, T., Psounis, K., & Raghavendra, C. S. (2008).
Efficient routing in intermittently connected mobile networks:
The multiple-copy case. IEEE/ACM Transactions on Networking,
16(1), 77–90.
16. Nelson, S., Bakht, M., Kravets, R., & Harris, A. (2009).
Encounter: Based routing in DTNs. SIGMOBILE Mobile Com-
Author Biographies
puting and Communications Review, 13(1), 56–59.
17. Jones, E., Lily, L., Schmidke, J. K., & Ward, P. (2007). Practical
routing in delay-tolerant networks. IEEE Transactions on Mobile Ahmed Elwhishi received the
Computing, 6(8), 943–959. B.S. degree in computer Engi-
18. Ling, S. & Wei, W. (2009). Feedback adaptive routing algorithm neering from Tripoli University,
for DTN. In WRI International Conference on Communications Libya, in 1993, the M.Sc. and
and Mobile Computing, CMC, (Vol. 2, pp. 267–271). Ph.D. degrees from the Electrical
19. Erramilli, V., & Crovella, M. (2008). Forwarding in opportunistic and Computer Engineering
networks with resource constraints. In ACM CHANTS (pp. 41–48). Department, University of Water-
20. Li, Z., & Shen, H. (2008). Utility-based distributed routing in loo, ON, Canada, in 2006 and
intermittently connected networks. InICPP (pp. 604–611). 2012, respectively. He is now a
21. Musolesi, M., & Mascolo, C. (2009). CAR: Context-aware research associate in the Depart-
adaptive routing for delay-tolerant mobile netwoks. IEEE ment of Electrical and Computer
Transactions on Mobile Computing, 8(2), 246–260. Engineering at the University of
22. Elwhishi, A., Ho, P., Naik, K., & Shihadda, B. (2010). ARBR: Waterloo. His research interests
Adaptive reinforcement-based routing for DTNs. In IEEE WiMob are in the areas of delay tolerant
(pp. 376–385). networks, P2P system.
23. Samuel, H., Zhuang, W., & Preiss, B. (2009). DTN based domi-
nating set routing for MANET in heterogeneous wireless net- Pin-Han Ho received the B.Sc.
working. ACM Mobile Networks and Applications, 14(2), 154–164. and M.Sc. degrees from the
24. Chaintreau, A., Hui, P., Crowcroft, J., Diot, C., Gass, R., & Scott, Electrical Engineering Depart-
J. (2007). Impact of human mobility on opportunistic forwarding ment, National Taiwan Univer-
algorithms. IEEE Transactions on Mobile Computing, 6(6), sity, in 1993 and 1995,
606–620. respectively, and the Ph.D.
25. Spyropoulos, T., Turletti, T., & Obraczka, K. (2009). Routing in degree from Queen’s University
delay-tolerant networks comprising heterogeneous node popula- at Kingston in 2002. He is now an
tions. IEEE Transactions on Mobile Computing, 8(8), 1132–1147. associate professor in the
26. DTN java simulator, http://people.ee.ethz.ch/spyropot/dtnsim.html. Department of Electrical and
27. Liao, Y., Zhang, Z., Ryu, B., & Gao, L. (2007). Cooperative Computer Engineering, Univer-
robust forwarding scheme in DTNs using erasure coding. In IEEE sity of Waterloo, Canada. He is
MILCOM (pp.1917–1923). the author or coauthor of more
28. Spyropoulos, T., Rais, R., Turletti, T., Obraczka, K., & Vasilakos, than 150 refereed technical
A. (2010). Routing for disruption tolerant networks: Taxonomy papers, several book chapters,
and design. Wireless Networks, 16(8), 2349–2370. and the coauthor of a book on optical networking and survivability. His
29. Dvir, A., & Vasilakos, A. (2010). Backpressure-based routing current research interests cover a wide range of topics in broadband
protocol for DTNs. In SIGCOMM (pp. 405–406). wired and wireless communication networks, including survivable
30. Alresaini, A., Sathiamoorthy, M., Krishnamachari, B., & Neely, network design, wireless Metropolitan Area Networks such as IEEE
M. (2012). Backpressure with Adaptive Redundancy (BWAR). In 802.16 networks, Fiber Wireless (FIWI) network integration, and net-
INFOCOM (pp. 2300–2308). work security. He is the recipient of Distinguished Research Excellent
31. Zeng, Y., Xiang, K., Li, D., & Vasilakos, A. V. (2013). Direc- Award in the ECE Department of University of Waterloo, Early
tional routing and scheduling for green vehicular delay tolerant Researcher Award (Premier Research Excellence Award) in 2005, the
networks. Wireless Networks, 19(2), 161–173. Best Paper Award in SPECTS’02, ICC ’05 Optical Networking
123
Author's personal copy
2108 Wireless Netw (2013) 19:2093–2108
Symposium, and ICC ’07 Security and Wireless Communications wireless communication networks, including wireless Metropolitan
Symposium, and the Outstanding Paper Award in HPSR ’02. Area Networks such as IEEE 802.16 networks, Fiber-Wireless (FIWI)
network integration, and optical networks, and green communica-
Basem Shihada has been tions. In 1997, he obtained a Bachelor’s degree in Computer Science
appointed Assistant Professor of from the UAE University. In 2001, he obtained a Master’s degree in
Computer Science in the Math- Computer Science from Dalhousie University, Halifax, Canada. In
ematical and Computer Science 2007, he obtained a Ph.D. degree in Computer Science, University of
and Engineering Division at Waterloo, David R. Cheriton School of Computer Science, Waterloo,
KAUST. He joint Stanford Canada.
University as a visiting faculty
in Stanford Computer Science
in 2008. Prior to his appoint-
ment at KAUST, Dr. Shihada
was a research associate in the
Department of Electrical and
Computer Engineering at the
University of Waterloo in
Ontario, Canada. Dr. Shihada’s
current research covers a wide range of topics in broadband wired and
123