Proceedings of IC-BNMT2009

FORMAL TAXONOMY RESEARCH ON OPPORTUNISTIC NETWORKS Zhou Qiang1, Ying Jing1,2, Wu Minghui1,2 1 College of Computer Science, Zhejiang University 2 Zhejiang University City College [email protected], [email protected], [email protected]

Abstract Opportunistic networks have complex construction and are multi-formed. In order to standardize the research on opportunistic networks, a formal taxonomy was proposed, which formally defined the geographical preferences, movement terminals and special transmit nodes of opportunistic networks. Then the opportunistic networks were classified according to the taxonomy. This taxonomy provided an open platform for the other research fields of opportunistic networks. Keywords: taxonomy

opportunistic

networks;

formal;

whales). There are applications for pocket wireless devices such as PSN[6], and for in-vehicle devices networks such as CarTel[7]. And there is a variety of other applications[2]. Therefore, opportunistic network is a valuable and potential research field. Mobility models play an important role in the research of mobile networks. The current research on the opportunistic networks is usually "bottomup" – in other words, it’s based on a particular mobility model or realistic application, and did not form a unified specification. In order to standardize a "top-down" research method on opportunistic networks, in this paper we will analyze the current research on opportunistic networks and then propose a formal taxonomy.

1 Introduction

2 Related work

In the classical fields of network communication, connected topology is a basic request. It means, when the messages transmit from the source node to the destination node, a data path exists between them. However, as the wireless networks are extensively used in more and more fields, the structure of networks has become much complex and unstable. In some realistic applications of the network, the information transmission delay may be far more than the classic network latency, the network connectivity can not be guaranteed. Under certain circumstances, the network nodes themselves are ambulant, which has led to such a phenomenon: the network itself is not connected, but the movements of the nodes have the opportunity to meet other nodes. Then the messages may be transmitted from the source node to the destination node by taking advantage of the meeting opportunities. Therefore, the concept of “opportunistic networks” has been founded[1]: the nodes of opportunistic network exploit the meeting opportunities with others to transmit messages while the topology of the network is disconnected.

In opportunistic networks, the messages are transmitted when the nodes opportunistically meet the other peer. Therefore, the characteristics of node movement will greatly affect the message transmission, which made the research on mobility models an important point of the study. As the structure of opportunistic networks is unstable and the movement characteristics differ from each other, there are diversified mobility models. In general, we have classic mobility models and realistic mobility models.

There are numerous applications of opportunistic networks because of the unstable and disconnected network structures of the realistic self-organizing ad hoc networks. There are applications for tracking wild animals such as ZebraNet[4] (for tracking Zebras) and SWIM[5] (for tracking ___________________________________ 978-1-4244-4591-2/09/$25.00 ©2009 IEEE 

Classic mobility models described a chaotic situation of networks, in which the nodes are moving disorderly and aimlessly. In this case, the mobility model is IID (Identical and Independently Distributed)[3]. It means that the trajectories of each node will not be impacted by other nodes, and each node moves non-differently from others. RWP (Random Waypoint), RD (Random Direction) and RW (Random Walk) are examples of classic mobility models. As the nodes’ movements are completely random in such classic models, the circumstances are relatively simple and provided an easier way to study the routing protocols of the opportunistic networks. However, the realistic opportunistic network nodes’ movements are usually not completely random, so the classic model is often divorced from the realistic situations

and cannot portray the realistic opportunistic networks well. Realistic mobility models described the actual applications of opportunistic networks. In practice, the network nodes can be the wireless equipments carried by people, vehicles or even wild animals. In order to portray these realistic opportunistic networks, researchers put forward statistics-based models and community-based models. Such models may describe the characteristics of the nodes’ movements via statistical methods instead of the random-moving suppose, and community characteristics can often be obtained in such models. Realistic mobility models are usually more complex than the classic ones, but they are able to portray the actual opportunistic networks.

probability

pk exceeds the threshold D .

Geographic preference of nodes can not be described correctly if the value of threshold D is too large or too small. For the whole opportunistic network N, the set of "Frequently Reached Location" of all the nodes is defined as FN : Definition 1.2:

FN

*F

i

1di  | N |

There are FN

) for classic mobility models, and

FN z ) for realistic mobility models. 3.2 Movement terminals of nodes

Both classic and realistic mobility models described above are based on specific opportunistic networks. In other words, they are bottom-up models.

3 Formal taxonomy We are looking for a unified specification of opportunistic networks research, which needs a topdown analysis. This section discusses the significant features of the opportunistic networks, and then proposes a formal taxonomy. 3.1 Geographic preferences of nodes Classic mobility models such as RWP and RD assume that the nodes are moving randomly. So the arriving probabilities at different locations of different nodes are equal. That is to say, there is no preferred location of any node. However, the nodes’ movements are not completely random in realistic mobility models. The movements might be based on community. Some nodes may tend to move towards a particular destination. Some nodes’ movements may be restricted within a particular area. Some nodes may prefer to meet specific nodes than others. So actually the nodes usually have geographic preferences. Now we give out the definitions. For a node i in opportunistic network N, the set of "Frequently Reached Location" is defined as Fi : Definition 1.1:

Fi

{( Lk , pk ) pk ! D } 

( Lk , pk ) is a two-tuple. Lk is a frequently reached

location of node i. pk is the arriving probability at

Lk of node i in unit time. D is a predetermined threshold. We consider the node i to have "Frequently Reached Location" Lk if the

The movements of nodes in opportunistic networks usually have time or space limitations. A node reaches its time terminal when the node can no longer transmit messages even if it is still moving. For instance, when the wireless device battery of a node has run out, it will stop transmitting messages and be considered to reach its time terminal. On the other hand, a node of an opportunistic network reaches its space terminal when the node leaves the network geographically. Taking an opportunistic network consist of the wireless equipments carried by vehicles in a highway for example: when a car node exits the highway, it leaves the current opportunistic network geographically, which means it has reached its space terminal of the network. Moreover, the node might go on moving and join a new opportunistic network after it leaves the current one, but it does reach the current space terminal because we do not concern about the new one. We call both time and space terminals "Terminal of Movement". We can estimate whether a node has reached its terminal by the formula defined as below: Definition 2.1:

ToM (i ) ToM ( Li , TP i ) 1 

| Li  TLi | TPi ˜ D max T max

TLi is the location of space terminal of node i in opportunistic network. Li is the current location of node i. Dmax is the length of geographic diameter of the opportunistic network. TPi is the remaining power supply time of node i. Tmax is the maximum power supply time of node i. We can determine that node i has reached its terminal when ToM (i ) 1 . In particular, the movements of the network nodes might have no time limitations – for example, the



power supply is infinite – then we have TPi and Definition2.1 has become: Definition 2.2:

ToM (i ) ToM ( Li ) 1 

Tmax ,

| Li  TLi |  D max

On the other hand, the movements of the nodes might have no space limitations – for example, the nodes will never leave the network – then we transform the Definition2.1 into: Definition 2.3: TPi ToM (i ) ToM (TPi ) 1  T max If the terminals of movements exist in an opportunistic network, there is ToM (i )  [0,1] . We can infer that ToM (i) { 0 if the nodes in opportunistic network do not have movement terminals. 3.3 Special nodes

The fixed nodes are a kind of special nodes in opportunistic networks. The fixed nodes will no change there locations, and they are usually well equipped: they may have no limitation of power supply, and have high performance of message transmitting and so on. For example, the fixed nodes in an office building can provide the data storage and transmitting services for the portable wireless devices carried by people. A fixed node in the network can be a landmark for the other moving nodes. In this paper, we call the fixed nodes "base station", as the definition below: Definition 3.1:

{(bk , Lk , ck ) k

TN

TN is the set of all transporter nodes t k in opportunistic network N. ck is the storage capacity of t k . There is TN ) for the opportunistic network N which has no transporter node. 3.4 Classification of opportunistic networks We can determine FN , Tom(i ) , B N and TN by the definitions above. Then we have a classification of opportunistic networks according to these characteristics as Figure 1:

characteristic FN

Description )

FN FN z )

ToM (i)  [0,1]

ToM (i)

ToM (i ) { 0

1,2,3...}

B N is the set of all base stations bk in opportunistic network N. Lk is the location of base station bk . ck is the storage capacity of bk .

for the opportunistic network N which has base stations. In particular, if | B N | | N | , then all the nodes in the network are fixed, which means the opportunistic network N has degenerated to a common ad hoc network. A second kind of special nodes in opportunistic networks are "transporter nodes", which are defined as "ferry" in some other literatures. These nodes can take the initiative to move toward specific nodes which they need to meet. These nodes have

.realistic opportunistic networks .the nodes' movements have preferences .often community based .the nodes' movements have time or space limitations .nodes will reach the terminal at specific time or location .the nodes' movements have no time or space limitations .nodes will never leave the network

)

BN z )

.no base station exists in the opportunistic networks

)

.transporter nodes exist in the opportunistic networks .transporter nodes can take the initiative to move toward specific nodes

TN z )

no transporter node exists in the opportunistic networks

BN

) for the opportunistic network N which has no base station, while there is BN z ) 

.classic opportunistic networks .the nodes' movements are IID

.base stations exist in the opportunistic networks .base stations have higher performance than other nodes

BN

There is BN



{(t k , ck ) k 1,2,3...}

Classification of Opportunistic Networks

In opportunistic networks there may be special nodes which have different behaviors than the common nodes.

BN

the knowledge about the network, so when they need to transmit a message to a specific node, they will move to look for it. They will have higher probability to meet the destination nodes than the common ones. Definition 3.2:

TN

TN

Figure 1. classification of opportunistic networks The formal taxonomy we proposed above is open. Other characteristics can be added to this taxonomy.

According to this taxonomy, we can classify an opportunistic network first, and then begin to study the problems such as routing protocols using the knowledge of the classification.

4 Conclusions Now the researches on opportunistic networks are usually based on a specific model or application. In order to found a unified research specification, we formally define the characteristics about the geographic preferences, movement terminals and special transmit nodes of the opportunistic networks in this paper. And then a taxonomy is proposed, which provides an open platform and top-down method for the opportunistic networks studies. The platform can be extended by formally adding other characteristics to it. Top-down studies on opportunistic networks such as the routing protocols can be proceeding by taking advantage of this taxonomy.

References [1] Pelusi L, Passarella A, Conti M. Opportunistic networking: data forwarding in disconnected mobile ad hoc networks[J]. Communications Magazine, 2006,44(11):134141. [2] Xiong Yongping, Sun Limin, Niu Jianwei, et al. Opportunistic Networks[J]. Journal of Software, Vol.20, No.1, January 2009:124137 [3] Spyropoulos T, Psounis K, Raghavendra C S. Performance Analysis of Mobility-assisted Routing[C]. MobiHoc’06, May 22–25, 2006, Florence, Italy [4] Juang P, Oki H, Wang Yong, et al. Energyefficient computing for wildlife tracking: Design tradeoffs and early experiences with ZebraNet[C]. Proceedings of the 10th Int’l Conf. on Architectural Support for Programming Languages and Operating Systems, New York: ACM, 2002. 96107. [5] Small T, Hass Z. The shared wireless infostation model: A new ad hoc networking paradigm (where there is a whale, there is a way)[C]. Proceedings of the 4th ACM Int’l Symp. on Mobile Ad Hoc Networking,Annapolis: ACM, 2003. 233244. [6] Pan Hui, Chaintreau A, Scott J, et al. Pocket switched networks and human mobility in conference environments[C]. Proceedings of the 2005 ACM SIGCOMM Workshop on Delay-Tolerant Networking. Philadelphia: ACM. 2005.244251. [7] Hull B, Bychkovsky V, Zhang Y,et al.CarTel: A distributed mobile sensor computing system[C]. Proceedings of the 4th Int’l Conf.

on Embedded Networked Sensor Systems. Boulder: ACM, 2006. 125138. [8] Song Libo, Kotz D F. Evaluating Opportunistic Routing Protocols with Large Realistic Contact Traces[C]. CHANTS’07, September 14, 2007, Montréal, Québec, Canada. [9] Boldrini C, Conti M, Passarella A. ContentPlace: Social-aware Data Dissemination in Opportunistic Networks[C]. MSWiM’08, October 27–31, 2008, Vancouver, BC, Canada. [10] Abdulla M, Simon R. Characteristics of Common Mobility Models for Opportunistic Networks[C]. PM2HW2N’07, October 26, 2007, Chania, Crete Island, Greece. [11] Boldrini C, Conti M, Passarella A. Modelling Data Dissemination in Opportunistic Networks[C]. CHANTS’08, September 15, 2008, San Francisco, California, USA. [12] Collins M P,Shimeall T J, Faber S, et al. Using Uncleanliness to Predict Future Botnet Addresses[C]. IMC’07, October 24-26, 2007, San Diego, California, USA. [13] Pan Hui, Crowcroft J. How Small Labels create Big Improvements[C]. Proceedings of the 2006 ACM CoNEXT conference, Lisboa, Portugal,2006: Article No. 34 [14] Campbell A, Eisenman S, Lane N, et al. People-centric urban sensing[C]. IEEE Wireless Internet Conference, August 2006. [15] Henderson T, Kotz D, Abyzov I. The changing usage of a mature campus-wide wireless network[C]. Proceedings of the 10th Annual International Conference on Mobile Computing and Networking (MobiCom), pages 187–201, September 2004.



formal taxonomy research on opportunistic networks - IEEE Xplore

OPPORTUNISTIC NETWORKS. Zhou Qiang. 1. , Ying Jing. 1,2. , Wu Minghui. 1,2. 1 College of Computer Science, Zhejiang University. 2 Zhejiang University ...

69KB Sizes 0 Downloads 248 Views

Recommend Documents

Codebook-Based Opportunistic Interference Alignment - IEEE Xplore
May 9, 2014 - based on the exiting zero-forcing receiver. We first propose a codebook-based OIA, in which the weight vectors are chosen from a predefined ...

Opportunistic Downlink Interference Alignment - IEEE Xplore
Computer Science and Engineering, Dankook University, Yongin, 448-701, Korea. 3 ... This research was supported by the Basic Science Research Program.

Opportunistic Downlink Interference Alignment - IEEE Xplore
Electrical and Computer Engineering, UNIST, Ulsan 689-798, Korea. 2. Computer Science and Engineering, Dankook University, Yongin, 448-701, Korea. 3.

Throughput Maximization for Opportunistic Spectrum ... - IEEE Xplore
Abstract—In this paper, we propose a novel transmission probability scheduling scheme for opportunistic spectrum access in cognitive radio networks. With the ...

Energy-Efficient Opportunistic Interference Alignment - IEEE Xplore
Abstract—We introduce an energy-efficient distributed op- portunistic interference alignment (OIA) scheme that greatly improves the sum-rates in multiple-cell ...

Opportunistic Interference Alignment for Random ... - IEEE Xplore
Dec 14, 2015 - the new standardization called IEEE 802.11 high-efficiency wireless ... Short Range Wireless Transmission Technology with Robustness to ...

Evolutionary Computation, IEEE Transactions on - IEEE Xplore
search strategy to a great number of habitats and prey distributions. We propose to synthesize a similar search strategy for the massively multimodal problems of ...

Opportunistic Noisy Network Coding for Fading Relay ... - IEEE Xplore
Nov 9, 2015 - Abstract—The parallel relay network is studied, in which a single source node sends a message to a single destination node with the help of N ...

Investigating Sensor Networks with Concurrent ... - IEEE Xplore
The background behind this demonstration is described as an one-page poster submission. The goal is to show a flow of tools for quick sensor network modeling, from an high level abstraction down to a system validation, including random network genera

Intra-vehicular Wireless Networks - IEEE Xplore
cost and labor in harness manufacturing and installation, increased design complexity, etc. Wireless communications provides an intriguing alternative to wiring.

Capacity of 3D Erasure Networks - IEEE Xplore
Jul 12, 2016 - Abstract—In this paper, we introduce a large-scale 3D erasure network, where n wireless nodes are randomly distributed in a cuboid of nλ × nμ ...

Research on Excitation Control of Flexible Power ... - IEEE Xplore
induction machine; direct-start; Back-to-back converters;. Speed control mode. I. INTRODUCTION. The power imbalance caused by power system fault.

IEEE Photonics Technology - IEEE Xplore
Abstract—Due to the high beam divergence of standard laser diodes (LDs), these are not suitable for wavelength-selective feed- back without extra optical ...

On the Polarization Entropy - IEEE Xplore
polarimetric SAR image. In this paper, the authors propose a new method to calculate the polarization entropy, based on the least square method. Using a ...

wright layout - IEEE Xplore
tive specifications for voice over asynchronous transfer mode (VoATM) [2], voice over IP. (VoIP), and voice over frame relay (VoFR) [3]. Much has been written ...

Device Ensembles - IEEE Xplore
Dec 2, 2004 - time, the computer and consumer electronics indus- tries are defining ... tered on data synchronization between desktops and personal digital ...

wright layout - IEEE Xplore
ACCEPTED FROM OPEN CALL. INTRODUCTION. Two trends motivate this article: first, the growth of telecommunications industry interest in the implementation ...

Increasing Device Lifetime in Backbone Networks with ... - IEEE Xplore
is the application of sleep modes to network devices. Sleep mode is a low power state, which typically lasts for minutes or hours, during which the device does ...

Future Perspectives on Nanotechnology/Material ... - IEEE Xplore
Delphi Studies and Sci-Tech Policies in Japan, Mainland China and Taiwan ... culture and geography. .... approach technologies which will meet with China's.

Sensor Data Cryptography in Wireless Sensor Networks - IEEE Xplore
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 3, NO. 2, JUNE 2008. 273. Sensor Data Cryptography in. Wireless Sensor ...

The Prospect of Inter-Data-Center Optical Networks - IEEE Xplore
maintenance events, many of Google services' backend designs maintain redundancy by keep- ing copies in multiple data centers. This combi- nation of global ...

Elastic Routing in Wireless Networks With Directional ... - IEEE Xplore
Abstract— Throughput scaling law of a large wireless network equipping directional antennas at each node is analyzed based on the information-theoretic ...