Social-Distance Based Anycast Routing in Delay Tolerant Networks Tuan Le, Mario Gerla Dept. of Computer Science, UCLA Los Angeles, USA {tuanle, gerla}@cs.ucla.edu

Abstract—Delay Tolerant Networks (DTNs) are sparse mobile ad-hoc networks in which there is typically no complete path between the source and destination. Anycast is an important group communication paradigm for numerous DTN applications such as resource discovery and information exchange in emergency or crisis situations. While anycasting has been studied extensively in the context of the Internet and Mobile Ad-Hoc Networks (MANETs), efficient anycasting in DTNs is a significantly different and challenging problem due to frequent partitions and intermittent connectivity among nodes. In this paper, we propose a single-copy anycast routing strategy in which the current carrier forwards the message to an encounter node with a higher Anycast Social Distance Metric (ASDM). We formulate ASDM based on the multi-hop social distances to anycast group members. ASDM balances the trade-off between a short path to the closest, single group member and a longer path to the area where many other group members reside. That is, it optimizes both the efficiency and robustness of message delivery. We derive the social distances from the multi-hop delivery probabilities over the most probable path in the social contact graph. Through extensive simulation studies using a realworld mobility trace, we show that our scheme achieves a high delivery ratio, low delay, and low transmission cost compared to other anycast strategies. Keywords—Delay Tolerant Networks; Anycast Routing; Social Contact Graph; Social Distance; Forwarding Metric

I. I NTRODUCTION Delay Tolerant Networks (DTNs) [1] are sparse mobile ad-hoc networks in which nodes connect with each other intermittently, and end-to-end communication paths are rarely available. There are many practical applications to DTNs, including wildlife tracking sensor networks [2], transportation monitoring systems such as peoplenet [3], ocean sensor networks [4], military networks [5], and vehicular ad-hoc networks [6]. To handle the sporadic connectivity of mobile nodes in DTNs, the store-carry-and-forward method is used. That is, messages are temporarily stored at a node until an appropriate communication opportunity arises. A key challenge in DTN routing is to determine the appropriate relay selection strategy in order to minimize the number of packet replicas in the network, and to expedite the data delivery process. Anycast is a network service that allows a node to send a message to any one member in a group of nodes. There are many benefits of anycast communication in DTNs. For example, anycast can be used in emergency response networks c 2016 IEEE 978-1-5090-1983-0/16/$31.00

to request the help of a doctor, a fireman, or a police without knowing their IDs or accurate locations. Another example is the use of anycast in urban community networks, in which people can use the network to call for any cab. Although many anycast routing protocols have been proposed in the Internet and MANETs, they cannot be easily applied to DTNs due to the lack of stable end-to-end paths to a destination group member in DTNs. Furthermore, in traditional DTN unicast routing, the destination of a message is fixed at the time of creation. By contrast, the destination can change dynamically in anycast routing according to the movement of nodes. As a result, anycast routing is a particularly challenging problem. In this paper, we focus on developing an anycast routing scheme that is both robust and efficient (e.g, having a high delivery probability and short delay). The scheme is based on the single-copy model in which there is at most one copy of the message in the network. To cope with the highly volatile node mobility, we exploit the stable social network structure for message forwarding. Specifically, we measure the social-tie strength between nodes, and propose a novel social distance metric considering multi-hop delivery paths. We then make a forwarding decision, which considers the trade-off between a short path to the closest, single group member (i.e., short social distance) and a longer path to the area where many other group members reside. While the former can shorten the delivery delay, it is less robust than the latter, especially when the nearest node is socially isolated from other group members, and it may often leave or move to another location in a dynamic network. Note that the robustness of the latter choice comes from the intuition that a node is more likely to encounter a particular group member if it is closer to many group members. The paper makes the following contributions: • We design a single-copy anycast routing protocol that achieves a good balance between robustness and efficiency of message delivery. • We present a novel forwarding metric called Anycast Social Distance Metric (ASDM), which is a function of multi-hop social distances to anycast group members. • We introduce a social-tie metric that captures the social relationship between nodes, considering both the frequency and recency of node contacts. Social-tie values are then normalized to represent the edge weights in the social contact graph.

We propose a method of computing the social distance between a pair of nodes based on the multi-hop delivery probability over the most probable path in the social contact graph. The rest of the paper is organized as follows. Section II reviews the related work. Section III describes the anycast routing protocol in detail. Section IV presents the experimental results. Section V concludes the paper. •

II. R ELATED W ORK In this section, we review existing works on anycasting in the Internet, MANETs, and DTNs. A. Anycasting in the Internet and MANETs Much work has been done regarding network architectures and algorithms for anycast routing and forwarding in the Internet and MANETs. Katabi et al. [7] proposed a scalable architecture for global IP anycast, that allows a sender to access the nearest of a group of receivers that share the same anycast address. Recent efforts to make IP anycast more easily deployable were proposed in [8] and [9]. In the context of MANETs, many anycast routing protocols are implemented by modifying the existing unicast routing protocols to route packets toward the closest group member. Park et al. [10] extended unicast routing protocols such as link state, distance vector, and link reversal to support anycast routing in MANETs. Wang et al. [11], [12] extended AODV [13] and DSR [14] for anycast delivery. In [15], a unicast routing protocol TORA is modified to support anycasting. The authors then proposed a geocasting protocol GeoTORA, which combines anycasting with local flooding to deliver messages to all nodes within a given geographical region. The main drawbacks of all these anycast protocols is that they only consider the closest group member when computing routes. However, in MANETs, the closest node might leave or move to another location, which decreases the chance of a successful delivery. B. Anycasting in DTNs Thus far, few works have addressed the DTN anycast routing problem. Gong et al. [16] proposed a set of semantic models to unambiguously describe anycast in the context of DTNs. They introduced an anycast routing algorithm based on the EMDDA (Expected Multi-Destination Delay for Anycast) metric. In this algorithm, they assumed that nodes in the network are stationary, and the communication among nodes relies on a few mobile nodes that act as message carriers to deliver messages for the nodes. The algorithm computes the PED (Practical Expected Delay) values from a node to each group member, and then set EMDDA to be the minimum PED value. A mobile node then carries the message from the current node to the next hop only if the delay to get to the next hop plus the EMDDA of the next hop is smaller than the EMDDA of the current node. This relay process repeats until the message finally reaches any one of the group members. Xiao et al. [17] proposed an anycast routing scheme based on the MDRA (Maximum Delivery Rate for Anycast) metric.

MDRA indicates the probability that a message carrier meets a node in the anycast group, and is computed using individual meeting probabilities between a node and each group member. Based on the metric, messages are forwarded from the nodes with low MDRA values to the nodes with high MDRA values until arriving at any one of the destinations. Another anycast routing technique attempts to utilize genetic algorithms (GAs) for route decisions [18]. The GA is applied to find the appropriate path combination to comply with the delivery needs of a group of anycast sessions simultaneously. However, this work assumes that the mobility of nodes is deterministic and known ahead of time, which is not a valid assumption for most DTNs. Our work differs from all these studies in several aspects. First, unlike existing forwarding metrics such as EMDDA and MDRA, which favor a routing path toward an anycast member with the best meeting probability, our proposed social distance based metric ASDM also takes into account the density of group members. More often, ASDM routes the message in the direction where most group members reside to increase the probability of meeting a group member. ASDM may also explore a sparse area with one or a few group members if these nodes have very high reachability probabilities. Thus, ASDM is more suitable for highly unpredictable networks than EMDDA and MDRA. Second, whereas existing works utilize direct encounter probabilities between a node and each group member to compute the forwarding metrics, our ASDM metric is based on multi-hop delivery probabilities, which offer a broader view for forwarder selection. Third, we employ a novel social-tie metric, which takes into account both the frequency and recency of encounter events to measure the tie strength between nodes. The normalized tie strength values are then used to compute the one-hop and multi-hop delivery probabilities. III. P ROTOCOL D ESIGN In this section, we first describe the basic framework that enables nodes to compute the direct (one-hop) and multihop delivery probabilities between pairs of nodes. We then introduce two anycast forwarding metrics: one based on the probability of direct meeting with any group member, and the other based on the multi-hop social distance to the group. Lastly, we present the complete anycast routing strategy in detail. A. Social Tie Computation In sociological terms, social tie describes an interpersonal connection by way of friendship or acquaintance. There are many tie strength indicators: frequency, intimacy/closeness, longevity, reciprocity, recency, multiple social context, and mutual confiding (trust) [19]. Among them, the most widely used heuristics in socially-aware networking applications are the recency and frequency of encounters [20]. Two nodes are said to have a strong tie if they have met frequently in the recent past. We compute the social tie between two nodes using the history of encounter events. How

much each encounter event contributes to the social-tie value is determined by a weighing function F (x), where x is the time span from the encounter event to the current time. Assume that the system time is represented by an integer, and is based on n encounter events of node i. Then, the social-tie value of node i’s relationship with node j at the current time tbase , denoted by Ri (j), is computed as: Ri (j) =

n X

F (tbase − tjk )

PeerX S S A A B D

PeerY C A B D D E

Social-tie 2 3 1 2 4 3

C$

D$

2/15$



3/15$

2/15$

S$

A$ 3/15$

4/15$

1/15$

E$

B$

Fig. 1. An example of node S’s social-tie table and its corresponding social contact graph.

(1)

k=1

where F (x) is a weighing function, {tj1 , tj2 , · · · , tjn } are the encounter times when node i met node j, and tj1 < tj2 < · · · < tjn ≤ tbase . As an example, suppose node i met node j at times 1, 3, and 5, and that the current time (tbase ) is 10. Then, node i’s social-tie relationship with node j at tbase , denoted by Ri (j), is computed as: Ri (j) = F (10 − 1) + F (10 − 3) + F (10 − 5) = F (9) + F (7) + F (5) The weighing function F (x) essentially reflects the influence of the recency and frequency of encounter events. In order to give more weight to more recent encounter events, F (x) should be a monotonically non-increasing function. A class of functions that satisfy this condition is F (x) = ( z1 )λx , where z ≥ 2 and 0 ≤ λ ≤ 1. The control parameter λ allows a trade-off between recency and frequency in contributing to the social-tie value. As λ approaches 0, frequency contributes more than recency. On the other hand, as λ approaches 1, recency has higher weight than frequency. The social-tie value is solely determined by frequency when λ = 0, and by recency when λ = 1. Following [21], we set z = 2 and λ = e−4 , which have previously been shown to achieve a good tradeoff between recency and frequency. B. Social Knowledge Formation In order to make an informed forwarding decision, a node needs to obtain network-wide knowledge of social-tie strength between any node pairs. This knowledge is contributed by both local observation and knowledge exchange. 1) Local observation: Upon each encounter event, a node records the encounter node ID and the timestamp of the encounter event, and stores it in the encounter table. Periodically, social-tie values between the current node and its direct encounters are re-computed using Equation 1, where the input comes from the history of encounter events stored in the encounter table. In addition, each node maintains a social -tie-table, where each row has the following format: hpeerX, peerY, social -tie-value, timestampi Through local observation, peerX is always the current node ID. P eerY is the encounter node ID. T imestamp is the time at which the social-tie value between peerX and peerY is computed. It is the tbase variable in Equation 1. As we will see next, timestamp plays an important role in knowledge exchange among nodes.

2) Knowledge exchange: Nodes, especially those that are not socially active, tend to have limited knowledge of the social network through local observation (i.e., through direct contacts with other nodes). To gain knowledge of nodes that have never met, during the encounter period, nodes can exchange and merge their local observations in the form of a social -tie-table. In the event of a merge conflict (i.e., when there are two entries with the same peerIDs), we keep the entry with the latest timestamp. Through this process, a node can learn the social-tie values between almost any pair of nodes in the network. C. Multi-Hop Delivery Probability Computation The delivery probability P (i, j) represents the likelihood that a data item buffered at node i will be delivered to node j, either through direct contact or through a sequence of two or more relays. We propose to compute the delivery probability based on the social contact graph constructed from the local social-tie table. In the social-tie table, each unique peerID represents a graph node, and each pair of peerIDs (or row) represents an undirected edge between two graph nodes. Assume there are n entries in the social-tie table. Then, the edge weight wk (i, j) of the k th entry is defined as the meeting probability between two nodes i and j relative to other pairs of nodes in the social-tie table, and is computed as: social -tie-valuerow -k (2) wk (i, j) = Pn k=1 social -tie-valuerow -k Pn where i and j are unique peerIDs, and k=1 wk = 1. Note that we normalize the social-tie values between 0 and 1 by dividing each social-tie value by the summation of all the values in the table. The normalized social-tie values represent the edge weights in the social contact graph. As an example, Fig. 1 shows the social-tie table of node S after meeting and merging node A’s social-tie table, and the resulting social contact graph with the edge weights properly computed using Equation 2. For simplicity, the fourth column for the timestamp is not shown, and the social-tie values are in the form of integers. In a graph, two nodes can be connected by many different paths. However, as described in Subsection III-E, our anycast scheme is based on the single-copy model in which at most one network node holds the packet at a time. This means that only one path is used for routing between the source node and an anycast member. This motivates us to compute the delivery probability through the most probable path between a pair of

nodes. Given a P AT Hk (i, j) between two nodes i and j, the delivery probability over the k th path can be computed as: Y Pk (i, j) = w(e), ∀e ∈ P AT Hk (i, j) (3) e

One way to compute the delivery probability over the most probable path is to find all the paths between i and j, compute the delivery probability through each path, and then select the maximum value. Suppose there are n paths between i and j. Then, the delivery probability through the most probable path Q(i, j) can be computed as: Q(i, j) = max {Pk (i, j), 1 ≤ k ≤ n}

(4)

However, this approach is computationally infeasible as finding all the paths between two nodes on an undirected graph is NP-hard. This can be proven as follows: It is shown in [22] that finding the longest path between two graph nodes in an undirected graph is NP-hard. Suppose that we could find all the paths between two nodes in polynomial time. Then, by sorting the results in polynomial time, we could find the longest path, also in polynomial time. This contradiction shows that finding all the paths between two graph nodes is NP-hard. Alternatively, we propose to transform the problem of finding a path where the product of edge weights is maximized, into the problem of finding a path where the sum of edge weights is minimized. Note that the two problems are equivalent as shown below: arg max Pk (i, j) ≡ arg max log(Pk (i, j)) P AT Hk P AT Hk Y = arg min −log( w(e)), ∀e ∈ P AT Hk P AT Hk

= arg min P AT Hk

D. Anycast Delivery Probability Metric In this subsection, we introduce two metrics based on the social-tie information between nodes to evaluate the chance that a node can successfully deliver a packet to any one member of an anycast group either through direct contact or through a sequence of two or more relays. We consider an anycast group D of size n, in which D = {d1 , d2 , · · · , dn }. 1) Anycast Direct Encounter Metric (ADEM): ADEM is defined as the probability of directly encountering at least one node in the anycast group. We compute this metric by first normalizing the social-tie values between 0 and 1. Let M (i, j) denote the meeting probability between two nodes i and j. Then, based on our earlier analysis from Subsection III-C, M (i, j) is the normalized social-tie value between i and j. That is, M (i, j) = w(i, j), where w(i, j) is computed as in Equation 2. The probability that a node x meets any node in set D can be computed as: ADEM (x, D) = 1 −

Y

(1 − M (x, d))

(5)

d∈D

Q where d∈D (1 − M (x, d)) is the probability that x does not meet all members of the group. A metric similar to ADEM has been proposed in [17]. Yet, ADEM differs in terms of how M (x, d) is computed. In this paper, we introduce ADEM primarily for comparison purposes against Anycast SocialDistance Metric, which we describe next. 2) Anycast Social-Distance Metric (ASDM): ASDM is defined as the probability of successfully delivering a packet to any members of an anycast group based on the social distances to members of the group. The social distance SD(x, di ) from a node x to a member di ∈ D is formulated as:

e

X

−log(w(e)), ∀e ∈ P AT Hk

e

A polynomial-time algorithm such as Dijkstra’s algorithm can then be used to find the least-cost path (which is the most probable path) and the corresponding delivery probability over that path. Note that the edge weights need to be transformed by negating the log values of the current edge weights. As an example, consider again the contact graph in Fig. 1. Suppose that S’s objective is to deliver a data item to E. Thus, upon meeting A, S is interested in computing the delivery probability from A to E. S, in turn, runs Dijkstra’s algorithm using the log-transformed edge weights (not shown on the graph). The resulting least-cost path is P AT HA→D→E with the cost (summation of logs) = (− log 2/15) + (− log 3/15) = 1.574. Note that the cost of P AT HA→B→D→E is (− log 1/15) + (− log 4/15) + (− log 3/15) = 2.449. The delivery probability is the product of non-transformed edge weights on P AT HA→D→E , which is 2/15 × 3/15 = 0.0267. For comparison, the product of non-transformed edge weights on P AT HA→B→D→E is 1/15 × 4/15 × 3/15 = 0.0036 < 0.0267. This confirms that our approach correctly identifies the most probable path and computes the delivery probability over that path.

SD(x, di ) = 1 − P (x, di )

(6)

where P (x, di ) is the multi-hop delivery probability over the most probable path from x to di (see Subsection III-C). This formulation favors an encounter node x with a high multi-hop delivery probability to di (i.e., a small social distance toward the destination). Intuitively, in order to increase the chance of reaching any group member in an unpredictable network, we should favor a relay node that is “socially” close to the network area where more group members reside. Inspired from [23], we model ASDM based on the individual social distance to each group member as shown below: ASDM (x, D) ∝

X d∈D

1 SD(x, d)α

(7)

where 0 ≤ SD(x, d) ≤ 1 and α > 0. The control parameter α determines the balance between forwarding in the direction where most group members reside and forwarding toward a few close members. While a small value of α favors the former direction, a larger value of α prefers the latter direction. Depending on the network characteristic, α should be tuned carefully so that anycast packet can be forwarded in the direction that has a high chance to meet a group member with

u$

s$

d1$

x$ v$

d2$

Fig. 2. Social contact graph at node s. D = {d1 , d2 } forms an anycast group.

a short delay. The value of ASDM (x, D) ranges from 0 to ∞, and it is ∞ when x is an anycast group member. As an example, consider an anycast group D = {d1 , d2 , d3 , d4 }. Suppose that the current node with the anycast packet meets two relay nodes u and v that have the multi-hop delivery probabilities to the four group members as follows: P (u, di ) = [0.2, 0.4, 0.3, 0.1] and P (v, di ) = [0.1, 0.05, 0.1, 0.5]. The corresponding social distances are SD(u, di ) = [0.8, 0.6, 0.7, 0.9] and SD(v, di ) = [0.9, 0.95, 0.9, 0.5]. As we can see, u is socially closer to d1 , d2 , and d3 than v, whereas v is closer to d4 than u. Also, note that the shortest distance between a relay to group D is SD(v, d4 ) = 0.5. Since SD(v, d4 ) is not significantly shorter than min {SD(u, di ), 1 ≤ i ≤ 4}, ASDM metric (with α = 1.5) will prefer u over v as a relay node (ASDM (u, D) = 6.43 > ASDM (v, D) = 6.25). That is, ASDM will select the direction toward an area where most group members reside. Note that if SD(v, d4 ) becomes further smaller (i.e., when P (v, d4 ) ≥ 0.6), ASDM will instead favor v over u as a relay node. This decision is justifiable since the value of SD(v, d4 ) is now in a safe range, in which we have a certain confidence in reaching the closest anycast member d4 despite that it may be socially isolated from other group members. Compared to ADEM metric, ASDM is more conservative. That is, ASDM is less attracted toward the closest, single member than ADEM. Rather, ASDM attempts to balance between moving toward an area with many group members (which is more robust) and moving toward a few closer members (which is more efficient). Furthermore, by considering long routing paths with multi-hop delivery probabilities, ASDM has a broader view for forwarder selection than ADEM, which only considers one-hop routing paths through direct meeting between a relay node and a group member. To see the benefit of using multi-hop delivery probabilities in the formulation of an anycast routing metric, considering the following example. Suppose that the source node s meets node x, and it aims to deliver a packet to an anycast group D = {d1 , d2 }. Fig. 2 shows the contact graph constructed by s. Node x has no edges to anycast members since it has not encountered any group members in the past. Thus, ADEM (x, D) = 0. Consequently, s mistakenly identifies x as a bad relay node, even though x may often meet v who has strong connections to anycast members. In contrast, ASDM takes into account a broader view of the network. ASDM uses

multi-hop delivery probabilities from x to d1 and d2 in computing social distances, which results in ASDM (x, D) > 0. As a result, s correctly identifies x as closer to the anycast group, and thus selects x as a next relay node, which is a desired behavior. E. Anycast Routing Strategy We use a single-copy model in which, at any point in time, there is at most one copy of the message in the network. Consider an anycast group D. When a message carrier node u encounters a node v, they exchange and merge their social-tie tables. Node u then computes the delivery probability from v to the anycast group using one of the metrics introduced in Subsection III-D. Node u only forwards the message to v if and only if v has a larger delivery probability metric than u, i.e. ADEM (v, D) > ADEM (u, D) or ASDM (v, D) > ASDM (u, D) depending on the forwarding metric used. If the message is forwarded to v, u will remove the message from its caching buffer to comply with the single-copy model. Otherwise, u continues to hold the message until the next meeting opportunity arises. In our routing strategy, we take a group-based view at each intermediate relay node to make a forwarding decision. That is, we always consider the movement behavior of the entire anycast group at each intermediate routing step. This approach is suitable in highly unpredictable network environments. In contrast, another approach to anycasting is to have the source node simply picks the “best” group member according to some metric, and then use unicast techniques to reach it. We name a family of this approach Unicast-Based Anycasting (UBA). UBA may not perform well since the best group member is likely to change over time, and unicasting denies intermediate relay nodes the opportunity to react to this change. In Section IV, we will evaluate our proposed group-based routing scheme against UBA. We implement UBA by computing the multi-hop delivery probabilities P (s, d) from the source node s to each anycast group member d ∈ D. Node s then selects dbest = max {P (s, d), d ∈ D} as the best group member, and unicasts the message to dbest by forwarding to an encounter node e that has P (e, dbest ) > P (s, dbest ). Each intermediate node keeps the final destination dbest unchanged, and follows the same relay strategy until the message is delivered to dbest . IV. P ERFORMANCE E VALUATION In this section, we evaluate the performance of the proposed ASDM-based routing scheme in a packet-level simulation, using a real-world mobility trace. We first describe the simulation setup, followed by the metrics used and the results. A. Simulation Setup We implement the proposed routing protocol using the NS3.19 network simulator. We adopt the IEEE 802.11g wireless channel model and the PHY/MAC parameters as listed in Table I. To obtain meaningful results, we use the real-life mobility trace of San Francisco’s taxi cabs [24]. This data set consists of GPS coordinates of 483 cabs, collected over a

0.8

2500

ASDM ADEM UBA Epidemic

2000 Average delay (sec)

Delivery ratio

0.7 0.6 0.5 0.4 0.3 0.2

6

ASDM ADEM UBA Epidemic

5

ASDM ADEM UBA Epidemic

4 Average cost

1 0.9

1500

1000

3

2

500

1

0.1 0 1000

1500

2000 2500 Duration (sec)

3000

3600

0 1000

(a) Delivery ratio

1500

2000 2500 Duration (sec)

3000

3600

0 1000

(b) Average delay

1500

2000 2500 Duration (sec)

3000

3600

(c) Average cost

Fig. 3. Performance comparison of various anycast routing strategies on the San Francisco cab trace. TABLE I. SIMULATION PARAMETERS Parameter RxNoiseFigure TxPowerLevels TxPowerStart/TxPowerEnd m channelStartingFrequency TxGain/RxGain EnergyDetectionThreshold CcaModelThreshold RTSThreshold CWMin CWMax ShortEntryLimit LongEntryLimit SlotTime SIFS

Value 7 1 12.5 dBm 2407 MHz 1.0 -74.5 dBm -77.5 dBm 0B 15 1023 7 7 20 µs 20 µs

period of three consecutive weeks. For our studies, we select an NS-3 compatible trace file from downtown San Francisco (area dimensions: 5,700m x 6,600m) with 116 cabs, tracked over a period of one hour [25]. Vehicles advertise Hello messages every 100ms [26]. The broadcast range of each vehicle is fixed to 300m, which is typical in a vehicular ad hoc network (VANET) setting [27]. In our experiments, we select 5 random nodes as the destination anycast group members. Every other node acts as the anycast source, which transmits a unique data packet of size 1MB after 1,000 seconds of the warming-up period. For statistical convergence, we repeat each simulation 20 times with different random seeds. We evaluate ASDM against ADEM, UBA, and Epidemic routing [28]. The value of α is carefully tuned based on the analysis of the network characteristic and is set to 1.5. ADEM and UBA were introduced in Section III-D and IIIE, respectively. ADEM forwards the message based on the probability of directly encountering any one group member. UBA extends the unicast protocol, and routes the message to a fixed destination, to which the source node has the highest multi-hop delivery probability at the time of message creation. Epidemic routing is a flooding-based protocol, which has a delivery ratio and delay that approach the theoretical maximum, but also has the highest delivery cost.

B. Evaluation Metrics We use the following metrics for evaluation: • Delivery ratio: the proportion of unique packets that are received by an anycast group out of the total number of unique packets generated. • Average delay: the average interval of time required for an anycast group to receive the data item. • Average cost: the average number of relays required for an anycast group to receive the data item. C. Comparative Results Fig. 3 shows the performance of Epidemic, ADEM, UBA, and our proposed ASDM scheme. The delivery ratio is compared in Fig. 3a. As we increase the simulation time from 1,000 seconds (the warming-up period) to 3,600 seconds, the delivery ratio of all schemes is improved. As expected, Epidemic has the highest delivery ratio. By using a flooding method, Epidemic has a high chance to successfully deliver a data item to an anycast group, even when the group is comprised of hard-to-reach members. ASDM outperforms ADEM by more than 10%. The improvement of ASDM over ADEM is a result of two factors. First, the use of multi-hop delivery probabilities generates more path choices to reach a group member than the direct (one-hop) delivery probabilities. Second, from this pool of available paths, the function of social distances to group members allows the selection of the most probable path to reach at least one group member. Lastly, UBA performs the worst because the best group member at the time of message creation is likely to change over time, and thus, unicasting to this member is not guaranteed to be successful within the simulation time. In terms of the average delay as shown in Fig. 3b, Epidemic has the smallest average delay as a result of its floodingbased approach. ASDM has a lower delay than ADEM and UBA. This is because ASDM considers multi-hop forwarding opportunities, which enable a packet to travel through a fast route to an anycast group member. Furthermore, a well-tuned parameter α in ASDM function, while favoring density of group members over proximity, can drive a packet to the nearest group member if it possesses a high successful delivery probability. This has the effect of reducing the routing delay.

Lastly, average cost is compared in Fig. 3c. Epidemic has the highest cost as it floods the packet to every network node. The cost of UBA is the second highest as UBA is vulnerable to the movement of the best node that is selected at the time of message creation. ADEM has a lower cost than UBA because ADEM takes a group-based view for anycast routing, and therefore is not vulnerable to the movement of a particular group member. Finally, ASDM has a lower cost than ADEM because the delivery probability of ASDM is more stable than ADEM, thus making ASDM less vulnerable to the movement of the entire group. Note that the stability of ASDM is due to its consideration of a broad network view based on multi-hop delivery probabilities and the density of group members. V. C ONCLUSION In this paper, we have proposed the design of a singlecopy DTN anycast routing strategy that makes forwarding decisions based on Anycast Social Distance Metric (ASDM). The social distances to group members are derived from multi-hop delivery probabilities, which offer a broad view for forwarder selection. ASDM, which is a function of social distances, balances the trade-off between a short path to the closest, single group member and a longer path over which many other group members are accessible. That is, it optimizes both the efficiency and robustness of message delivery. Extensive simulation results show that our scheme achieves a high delivery ratio, low delay, and low transmission cost compared to other anycast strategies. R EFERENCES [1] K. Fall, “A delay-tolerant network architecture for challenged internets,” in Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications. ACM, 2003, pp. 27–34. [2] P. Juang, H. Oki, Y. Wang, M. Martonosi, L. S. Peh, and D. Rubenstein, “Energy-efficient computing for wildlife tracking: Design tradeoffs and early experiences with zebranet,” in ACM Sigplan Notices, vol. 37, no. 10. ACM, 2002, pp. 96–107. [3] M. Motani, V. Srinivasan, and P. S. Nuggehalli, “Peoplenet: engineering a wireless virtual social network,” in Proceedings of the 11th annual international conference on Mobile computing and networking. ACM, 2005, pp. 243–257. [4] J. Partan, J. Kurose, and B. N. Levine, “A survey of practical issues in underwater networks,” ACM SIGMOBILE Mobile Computing and Communications Review, vol. 11, no. 4, pp. 23–33, 2007. [5] Z. Lu and J. Fan, “Delay/disruption tolerant network and its application in military communications,” in Computer Design and Applications (ICCDA), 2010 International Conference on, vol. 5. IEEE, 2010, pp. V5–231. [6] J. Ott and D. Kutscher, “A disconnection-tolerant transport for drivethru internet environments,” in INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE, vol. 3. IEEE, 2005, pp. 1849–1862. [7] D. Katabi and J. Wroclawski, “A framework for scalable global ipanycast (gia),” ACM SIGCOMM Computer Communication Review, vol. 30, no. 4, pp. 3–15, 2000. [8] I. Stoica, D. Adkins, S. Zhuang, S. Shenker, and S. Surana, “Internet indirection infrastructure,” in ACM SIGCOMM Computer Communication Review, vol. 32, no. 4. ACM, 2002, pp. 73–86. [9] H. Ballani and P. Francis, “Towards a global ip anycast service,” in ACM SIGCOMM Computer Communication Review, vol. 35, no. 4. ACM, 2005, pp. 301–312. [10] V. D. Park and J. P. Macker, “Anycast routing for mobile services,” DTIC Document, Tech. Rep., 1999.

[11] J. Wang, Y. Zheng, and W. Jia, “An aodv-based anycast protocol in mobile ad hoc network,” in Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003. 14th IEEE Proceedings on, vol. 1. IEEE, 2003, pp. 221–225. [12] J. Wang, Y. Zheng, C. Leung, and W. Jia, “A-dsr: A dsr-based anycast protocol for ipv6 flow in mobile ad hoc networks,” in Vehicular Technology Conference, 2003. VTC 2003-Fall. 2003 IEEE 58th, vol. 5. IEEE, 2003, pp. 3094–3098. [13] S. R. Das, E. M. Belding-Royer, and C. E. Perkins, “Ad hoc on-demand distance vector (aodv) routing,” 2003. [14] D. B. Johnson, “The dynamic source routing protocol for mobile ad hoc networks,” draft-ietf-manet-dsr-09. txt, 2003. [15] Y.-B. Ko and N. H. Vaidya, “Anycasting-based protocol for geocast service in mobile ad hoc networks,” Computer Networks, vol. 41, no. 6, pp. 743–760, 2003. [16] Y. Gong, Y. Xiong, Q. Zhang, Z. Zhang, W. Wang, and Z. Xu, “Wsn123: Anycast routing in delay tolerant networks,” in Global Telecommunications Conference, 2006. GLOBECOM’06. IEEE. IEEE, 2006, pp. 1–5. [17] M. Xiao, L. Huang, A. Liu, and W. Chen, “Anycast routing in probabilistically contacted delay tolerant networks,” in Communications and Mobile Computing (CMC), 2010 International Conference on, vol. 3. IEEE, 2010, pp. 442–446. [18] E. R. da Silva and P. R. Guardieiro, “Anycast routing in delay tolerant networks using genetic algorithms for route decision,” in Computer and Information Technology, 2008. ICCIT 2008. 11th International Conference on. IEEE, 2008, pp. 65–71. [19] E. M. Daly and M. Haahr, “Social network analysis for information flow in disconnected delay-tolerant manets,” Mobile Computing, IEEE Transactions on, vol. 8, no. 5, pp. 606–621, 2009. [20] F. Xia, L. Liu, J. Li, J. Ma, and A. V. Vasilakos, “Socially aware networking: A survey,” 2013. [21] D. Lee, J. Choi, J.-H. Kim, S. H. Noh, S. L. Min, Y. Cho, and C. S. Kim, “Lrfu: A spectrum of policies that subsumes the least recently used and least frequently used policies,” IEEE transactions on Computers, vol. 50, no. 12, pp. 1352–1361, 2001. [22] D. S. Hochbaum, Approximation algorithms for NP-hard problems. PWS Publishing Co., 1996. [23] D. Liben-Nowell, J. Novak, R. Kumar, P. Raghavan, and A. Tomkins, “Geographic routing in social networks,” Proceedings of the National Academy of Sciences of the United States of America, vol. 102, no. 33, pp. 11 623–11 628, 2005. [24] Cabspotting. [Online]. Available: http://cabspotting.org/ [25] J. Lakkakorpi, “ns-3 module for routing and congestion control studies in mobile opportunistic dtns,” in Performance Evaluation of Computer and Telecommunication Systems, 2013 International Symposium on. [26] M. van Eenennaam, W. K. Wolterink, G. Karagiannis, and G. Heijenk, “Exploring the solution space of beaconing in vanets,” in Vehicular Networking Conference (VNC), 2009 IEEE. IEEE, 2009, pp. 1–8. [27] S. Al-Sultan et al., “A comprehensive survey on vehicular ad hoc network,” Journal of network and computer applications, 2014. [28] A. Vahdat, D. Becker et al., “Epidemic routing for partially connected ad hoc networks,” Technical Report CS-200006, Duke University, Tech. Rep., 2000.

Social-Distance Based Anycast Routing in Delay Tolerant Networks

Page 1 ... node with a higher Anycast Social Distance Metric (ASDM). We formulate ... Keywords—Delay Tolerant Networks; Anycast Routing; Social. Contact ...

371KB Sizes 0 Downloads 292 Views

Recommend Documents

Contact Duration-Aware Routing in Delay Tolerant Networks
Abstract—Delay Tolerant Networks (DTNs) are sparse mobile ad-hoc networks in which there is typically no complete path between the source and destination.

Delay Tolerant Networks in partially overlapped ...
shown to hold in [9] for the actual discrete control problem. A game problem between two groups of DTN networks was further studied in [9]. 2 The Model. We consider two overlapping network regions, where source and destination nodes are each in disti

A Survey Paper on Routing in Delay-tolerant Networks
National Institute of Technology. Patna, India ... Wireless networks refers to the network in which ... satellite networks, terrestrial wireless networks, with moderate ...

Multi Receiver Based Data Sharing in Delay Tolerant Mobile ... - IJRIT
resources such as storage space, batterey power and available bandwidth provided ... based on providing incentive such as battery power storage capacity to.

Multi Receiver Based Data Sharing in Delay Tolerant Mobile ... - IJRIT
Multi Receiver Based Data Sharing in Delay Tolerant Mobile .... resources such as storage space, batterey power and available bandwidth provided by ...

pdf-1859\advances-in-delay-tolerant-networks-dtns-architecture-and ...
... the apps below to open or edit this item. pdf-1859\advances-in-delay-tolerant-networks-dtns-arch ... ad-publishing-series-in-electronic-and-optical-mat.pdf.

Implementing Delay-Tolerant Routing for a ... - Felix Ableitner
In this thesis, we want to show that it is possible to create a chat service that .... Delay-Tolerant Network: A delay-tolerant network is one that allows mes-.

Ant System Based Anycast Routing in Wireless Sensor ...
Data Fusion Tree(MADFT) for energy constraint wireless sensor networks. Different from ..... Analytical and experimental results show that MADFT adapts well to.

Fault-Tolerant Routing in Interconnection Networks
Furthermore, product information from company websites ... these solutions have resembled that of traditional software development processes. In ... as the requirement for good network performance, the requirement for fault tolerance,.

Fault-Tolerant Routing in Interconnection Networks
As an illustration, 11 of the top 15 spots on the current top 500 ..... For instance, there are no routing tables in the BlueGene/L supercomputer. [1], while routing ...

Efficient multicasting for delay tolerant networks using ...
proposed method completes in less than 10 seconds on datasets ...... networks: a social network perspective,” in Proc. of MobiHoc, 2009, pp. 299–308.

Optimized, delay-based privacy protection in social networks
1 Aggregated Facebook and Twitter activity profiles are shown in [7] per .... some sites have started offering social networking services where users are not ...

An Anycast Routing Strategy with Time Constraint in ... - IEEE Xplore
Tuan Le, Mario Gerla. Dept. of Computer Science, UCLA. Los Angeles, USA. {tuanle, gerla}@cs.ucla.edu. Abstract—Delay Tolerant Networks (DTNs) are sparse ...

Middleware for Long-term Deployment of Delay-tolerant ...
ware/software interfaces; C.3 [Computer Systems Or- ganization]: ... Sensor Networks, Delay-tolerant Networks, Middleware Sys- tem, Application Scheduling. 1.

Call Routing Management in Enterprise VoIP Networks
based phones (softphones) are used to initiate and listen for incom- ing calls. ... messages such as call initiation and termination between the caller and the ..... ica (to toll free numbers, internal PBX numbers except for those ... 5.3 Mobile User

Routing in Ad-Hoc Networks
generate a significant amount of network control traffic when the topology of the network changes frequently. Lastly, packets can .... time, which happens very often in radio networks due to collisions or other transmission problems. In addition, OLS

delay-tolerant wireless network protocol with lq-arq ...
Gopalram. 1Department of Electrical Engineering, Sun College of Engineering and Technology [email protected]. 2Department of Electrical Engineering, Sun College of Engineering and Technology [email protected]. Abstract. In cooperative strategy se

Milgram-Routing in Social Networks
The advent of the internet has made it possible .... tribution of the Internet graph (the graph whose vertices ...... the conference on Applications, technologies,.

Delay-Tolerant Distributed Linear Convolutional Space ...
Feb 4, 2009 - In cooperative communication networks, the performance of distributed space-time code will be severely degraded if ... hardware complexity.

Fault Tolerant and Energy Efficient Routing for Sensor ...
Sep 1, 2004 - most common routing protocol for ad hoc wireless networks [1], including ... advantage of energy efficient routing over minimum hop routing.

Packet Delay in Models of Data Networks
networks. Additionally, these models are not only amenable to computer simu- ... introduces certain amount of randomness or noise into the system, and as a.

Delay-Tolerant Control Design for Semiconductor ... - IEEE Xplore
Page 1 ... state space formulation of a linear SOA model to design and analyze controller ... derive a design tradeoff on the feedback controller and delay.

Delay-Tolerant Algorithms for Asynchronous ... - Research at Google
Nov 7, 2014 - delays grow large (1000 updates or more), our new algorithms ... are particularly concerned with sparse data, where n is very large, say 106 ...