12 research outputs found

    Optimal storage allocation on throwboxes in Mobile Social Networks

    Get PDF
    In the context of Mobile Social Networks (MSNs), a type of wireless storage device called throwbox has emerged as a promising way to improve the efficiency of data delivery. Recent studies focus on the deployment of throwboxes to maximize data delivery opportunities. However, as a storage device, the storage usage of throwboxes has seldom been addressed by existing work. In this paper, the storage allocation of throwboxes is studied as two specific problems: (1) if throwboxes are fixed at particular places, how to allocate storage to the throwboxes; and (2) if throwboxes are deployable, how to conduct storage allocation in combination with throwbox deployment. Two optimization models are proposed to calculate the optimal storage allocation with a knowledge of the contact history of users. Real trace based simulations demonstrate that the proposed scheme is able to not only decrease data loss on throwboxes but also improve the efficiency of data delivery

    SOCIAL AND LOCATION BASED ROUTING IN DELAY TOLERANT NETWORKS

    Get PDF
    Delay tolerant networks (DTNs) are a special type of wireless mobile networks which may lack continuous network connectivity. Routing in DTNs is very challenging as it must handle network partitions, long delays, and dynamic topology in such networks. Recently, the consideration of social characteristics of mobile nodes provides a new angle of view in the design of DTNs routing protocols. In many DTNs, a multitude of mobile devices are used and carried by people (e.g. pocket switched networks and vehicular networks), whose behaviors are better described by social models. This opens the new possibilities of social-based routing, in which the knowledge of social characteristics is used for making better forwarding decision. However, the social relations do not necessarily reflect the true device communication opportunities in a dynamic DTN. On the other hand, the increasing availability of location technologies (GPS, GSM networks, etc.) enables mobile devices to obtain their locations easily. Consider that an individual’s location history in the real world implies his/her social interests and behaviors to some extent, in this dissertation, we study new social based DTN routing protocols, which utilize location and/or social features to achieve efficient and stable routing for delay tolerant networks. We first incorporate the location features into the social-based DTN routing methods to improve their performance by treating location similarity among nodes as possible social relationship. Then, we dis- cuss the possibility and methods to further improve routing performance by adding limited amount of throw-boxes into the networks to aid the DTN relay. Several throw-boxes based routing protocols and location selection methods for throw-boxes are proposed. All pro- posed routing methods are evaluated via extensive simulations with real life trace data (such as MIT reality, Nokia MDC, and Orange D4D)

    A location aided controlled spraying routing algorithm for Delay Tolerant Networks

    Get PDF
    Delay Tolerant Networks (DTNs) often suffer from intermittent disruption and variable long delay due to factors such as mobility and energy. In this paper, a Location Aided Controlled Spraying (LACS) routing algorithm is proposed to deal with the challenging issues in DTN routing. Only the routing information carried by the contacted nodes is needed in this algorithm, and there is no need for global networks knowledge and hardware support. The routing process is divided into two stages, i.e., controlled spraying routing stage and single-copy routing stage. The maximum transfer throughput of the contact is checked before each message is forwarded. During the controlled spraying stage, the current node adjusts spraying strategy according to the encounter angle of the contact nodes. During the single-copy stage, a location prediction model based on the semi-Markov process (SMP) is introduced, and the node's behaviors can be captured both in the temporal and spatial domains with this model. The current node predicts the destination node's location, and then decides whether to forward the message to target node based on the time used for meeting the destination node. Simulation results show that the proposed algorithm can achieve better performance than the traditional routing schemes of DTNs in terms of delivery ratio, network overhead and transmission delay under both random node movement model and realistic trace scenario

    A Message Repository for Delay-tolerant Networks

    Get PDF
    Internet technology, as well as other networking technologies, is running based on some assumptions, such as the existence of an end-to-end path between source and destination, low data loss rate, utilizing a packet-switching mechanism in communication and end devices supporting the TCP/IP protocol suite. However, these assumptions may not hold in the emerging challenged networks such as mobile ad-hoc networks. Thus, new solutions are needed to address the arising problem in challenged environments. Delay-tolerant Networking (DTN) approach is one robust way to enable communication in the environments with high delay and frequent disruption. Due to the challenged environments, DTN nodes have limited contact opportunities to forward messages. Therefore, the message delivery ratio of DTN networks is always lower compared to that of the traditional Internet. With the intention of enhancing the network performance and increasing the message delivery ratio, we deploy a set of infrastructure nodes, which are called message repositories (MRs), into DTN networks. MRs are the normal DTN nodes with infrastructure connectivity and supporting specific message exchange mechanism. When a mobile user connects to a MR, they are able to retrieve messages which they are not hold from each other following a specific message exchange procedure. We evaluate the performance of the MR scheme by means of simulation. We expect to figure out in which cases, and by how much the MR increases the message delivery rate and shortens the message delivery delay in DTN networks. We unitize an urban scenario with multiple environmental variables for our simulation. The most important environmental variables include underlying DTN routing protocols, the number of MRs and MRCs, node buffer size, etc. Furthermore, we compare the performance of multiple message exchange mechanisms of MR scheme in our simulation

    A Fog Computing Architecture for Disaster Response Networks

    Get PDF
    In the aftermath of a disaster, the impacted communication infrastructure is unable to provide first responders with a reliable medium of communication. Delay tolerant networks that leverage mobility in the area have been proposed as a scalable solution that can be deployed quickly. Such disaster response networks (DRNs) typically have limited capacity due to frequent disconnections in the network, and under-perform when saturated with data. On the other hand, there is a large amount of data being produced and consumed due to the recent popularity of smartphones and the cloud computing paradigm. Fog Computing brings the cloud computing paradigm to the complex environments that DRNs operate in. The proposed architecture addresses the key challenges of ensuring high situational awareness and energy efficiency when such DRNs are saturated with large amounts of data. Situational awareness is increased by providing data reliably, and at a high temporal and spatial resolution. A waypoint placement algorithm places hardware in the disaster struck area such that the aggregate good-put is maximized. The Raven routing framework allows for risk-averse data delivery by allowing the user to control the variance of the packet delivery delay. The Pareto frontier between performance and energy consumption is discovered, and the DRN is made to operate at these Pareto optimal points. The FuzLoc distributed protocol enables mobile self-localization in indoor environments. The architecture has been evaluated in realistic scenarios involving deployments of multiple vehicles and devices
    corecore