An Integrated Credit-Based Incentive Protocol for Symbol-Level Network-Coded Cooperative Content Distribution among Vehicular Nodes
Abstract
:1. Introduction
- (1)
- To solve the aforementioned defect that traditional SLNC-based CCD schemes do not realize the difference of network-coded content pieces among vehicular nodes, SC designs the content bitmap to store which network-coded content pieces every node holds. Whenever SC begins its CCD operations, every node broadcasts the beacon message to interchange its content bitmap with its neighbors. In this way, each node is able to compute the number of distinct network-coded content pieces, the re-broadcast priority and the number of shared SLNC content pieces after re-encoding.
- (2)
- Based on distinct levels of interests and selfishness on different content data, SC first categorizes the vehicular node into four classes, that is, the destination, intermediate, irrelevant and overhearing ones and then designates their associated network-coding and re-broadcasting operations to share SLNC content pieces efficiently among these four types of nodes.
- (3)
- SC improves the conventional SLNC-based cooperative content distribution protocol as mentioned above. It further rigidly combines with the proposed credit-based incentive approach to encourage all classes of vehicular nodes to rise their incentives for sharing content data. In this paper, SC proposes its distributed flow to exchange credits among four types of nodes when they re-broadcast or receive SLNC-coded packets. Unselfish nodes increase their credits when they re-broadcast innovative content pieces to neighbors. Oppositely, selfish nodes decrease their credits as they overhear but reject to re-broadcast SLNC-coded content pieces. According to simulation results, SC stimulates these unselfish nodes for their generous content sharing but punishes selfish ones because they will run out of their credits eventually. To the best of our knowledge, SC is the first research that works on the integration of the credit-based incentive protocol and the SLNC-based cooperative content distribution.
2. Related Work
3. Concepts for Stimulating Incentives in SocialCode
3.1. Classification of Four Types of Vehicular Nodes in SocialCode
3.2. SocialCode Guidelines for Distributed Incentive Stimulation
- (1)
- Only the node that has enough credit value can broadcast a SLNC-coded packet to its neighbor nodes.
- (2)
- Only the node that has enough credit value can receive a SLNC-coded packet from its neighbor nodes.
- (3)
- The receiving node must pay certain credits to encourage the sending one when it receives valuable content pieces.
- (4)
- The sending node must compensate the receiving one with certain credits if it broadcasts valueless content pieces.
- (1)
- As soon as the overhearing or destination node receives an innovative piece broadcast from its nearby intermediate or destination one, it will cache this innovative content piece in its output queue and issue an ACK packet to the sending node for paying its credit value α to increase that of the sending node, if its credit value is not less than α. Thus, Table 3 expresses this guideline as Innovative piece: (+α, −α), which means SocialCode stimulates the sending node for sending an innovative piece. Otherwise, if the credit value of the destination or overhearing node is less than α, it cannot accept any innovative content piece from its neighbors.
- (2)
- Whenever the destination node receives a non-innovative piece broadcast from its nearby intermediate or destination one, it will drop this piece first. Then it will increase its credit value by β and issue an ACK packet to the sending node for requesting the credit value β from the sending node. Table 3 expresses this guideline as Non-innovative piece: (−β, +β), which means SocialCode punishes the sending node for sending a non-innovative piece. Thus, if the credit value of the destination or intermediate node is less than β, it cannot re-broadcast any non-innovative piece to its neighbors. Oppositely, when the overhearing node receives a non-innovative piece, it will not issue an ACK packet to request any credit from the sending node. Table 3 expresses this guideline as Non-innovative piece: (0, 0), which means SocialCode does not need to punish the sending node when it sends a non-innovative piece to the overhearing node, due to its selfish operation.
- (3)
- While the intermediate node finds the content piece it received already in its output queue, it will abandon this duplicate piece. Then it will increase its credit value by δ and issue an ACK packet to the sending node for requesting the credit value δ from the sending node. Therefore, Table 3 expresses this guideline as Duplicate piece: (−δ, +δ), which means SocialCode punishes the sending node for sending a duplicate piece to the intermediate node. Otherwise, it will issue an ACK packet to the sending node for paying its credit value δ to increase that of the sending node. Thus, Table 3 expresses this guideline as Non-duplicate piece: (+δ, −δ), which means SocialCode stimulates the sending node for sending a non-duplicate piece to the intermediate node. If the credit value of the intermediate node is less than δ, it cannot send any content piece, which may be a duplicate one, to its neighbors or accept any non-duplicate content piece from its neighbors.
- (4)
- Because the irrelevant node does not join the SLNC-based CCD process, it just drops the received piece and keeps its credit value unchanged. Hence, Table 3 expresses this guideline as Any piece: (0,0).
4. Design of SocialCode
4.1. SLNC-Based Cooperative Content Distribution of SocialCode
- (1)
- In every 50 ms time slot of CCH, all destination and intermediate nodes will broadcast their beacon messages to neighbors such that they will know numbers of destination and intermediate nodes in their proximities. All beacon messages contain the sender’s ID and selfishness/interest levels for distinct contents. SocialCode adopts in the content bitmap, which will be mentioned in Section 4.2, to record those SLNC content pieces received by the destination node during a preceding CCH time slot. In this way, the destination node, for example, nodes A and B in Figure 2, attaches its content bitmap in the beacon message to notify its neighbors of this information. Oppositely, the intermediate node includes its output queue information in its beacon message such that the intermediate node, for example, node C in Figure 2, could compute its dynamic forwarding priority, which will be mentioned in Section 4.3. However, the overhearing and irrelevant nodes, for example, overhearing node D in Figure 2, will not broadcast any beacon message for this content data, because they do not forward receive SLNC pieces to neighbors.
- (2)
- After the time slot of CCH has expired, SCH starts its 50 ms service time slot. Among four types of vehicular nodes in SocialCode, only the destination node computes all three parameters, that is, the utility, the number of re-encoded content pieces and the backoff delay. As defined in Section 4.2, C(v) represents the number of re-encoded content pieces for the destination node to forward during a service time slot. Further, Δtdes(v) denotes the backoff delay of the destination node before it decides when to access channel. This value depends to the utility and the reception status, which is aggregated from the content bitmap, of the destination node. Whenever the backoff delay Δtdes(v) of the destination node has expired, it, for example, node A, will broadcast C(v) re-encoded content pieces as it senses an idle channel. Similarly, the intermediate node calculates its backoff delay Δtint(v), which will be discussed in Section 4.3. Since SocialCode gives the intermediate node the larger backoff delay, that is, Δtint(v), than Δtdes(v), the intermediate node, for example, node C, can broadcast the content pieces it received to its neighbors only after every destination node has completed broadcasting its re-encoded content pieces, as shown in Figure 2. Please note that all destination and overhearing nodes will store received SLNC pieces and attempts to decode them due to their high interests on these pieces. Oppositely, the intermediate node only stores received SLNC pieces and broadcasts them one at a time in each successive service time slot.
- (3)
- After step 2, all destination and intermediate nodes will send ACK messages back to the sending nodes for modifying their credit values and stimulating their incentives to join the SLNC-coded CCD process of SocialCode, according to guidelines in Section 3.2.
4.2. SocialCode Content Bitmaps among Destination Nodes
4.3. The Dynamic Forwarding Priority Assignment for Fair Scheduling among Intermediate Nodes
4.4. The Flow of SocialCode
- (1)
- Whenever a node has received a SLNC-coded content piece broadcast by the RSU during t, it executes the first kind of SocialCode operations as follows. It will use its interest and selfishness value on this received piece to recognize itself as which type of vehicular node according to rules of Table 2.
- (2)
- If it identifies itself as the intermediate or irrelevant node, it will discard this received piece. On the other hand, it will store this piece in its queue if it is the destination or overhearing node. Afterward, it continues receiving the content piece broadcast by the RSU and goes back to step 1.
- (3)
- If the node does not stay in the wireless signal scope of any RSU at step 1, which means it has not received any content piece broadcast by any RSU for the period of t, it will start the second kind of SocialCode operations to perform the SLNC-based CCD process between it and nodes also losing contacts with RSUs.
- (4)
- As soon as the node receives the SLNC-coded content piece, the beacon message or the ACK packet from any nearby intermediate or destination node during this process, it will invoke the CCD reception procedure to receive decode all SLNC-coded pieces of a generation.
- (5)
- If the node has received and decoded all content pieces of a data object, SocialCode has completed its flow. Otherwise, this node goes back to step 3 to repeat the SLNC-based CCD process.
- (6)
- Oppositely, if the node receives a fresh content piece broadcast by any RSU, it stops executing the SLNC-based CCD process and goes back to step 2, which recognizes itself as which type of vehicular node as described above.
- (7)
- If the node has not received a fresh content piece broadcast by an RSU and its backoff timer has been expired, this intermediate or destination node will invoke the CCD broadcast procedure to forward or re-broadcast content pieces stored in its queue. Afterward, this node goes back to step 3 to repeat the SLNC-based CCD process.
4.4.1. The CCD Broadcast Procedure
- (1)
- When node v starts the CCD broadcast procedure, it will check whether its output queue has cached SLNC-coded pieces. If no, this node has completed its CCD broadcast procedure.
- (2)
- Otherwise, this node decides its node type, according to its selfishness and interest values on SLNC-coded content pieces stored in its output queue.
- (3)
- If it is the overhearing or irrelevant node, it will not re-broadcast the piece to its nearby nodes. This node then exits its CCD broadcast procedure
- (4)
- If this node is the destination node, it will first adopt Equation (1) to calculate its aggregate utility, that is, util(v), based on the selfishness, interest and content bitmap values carried in beacon messages, which are issued by nearby destination nodes. Then, this node will use Equations (2) and (3) to calculate its backoff delay, that is, and the number of re-encoded content pieces, that is, C(v), respectively. Finally, it re-encodes C(v) content pieces, which initial ttl values are set as .
- (5)
- (6)
- If yes, it then defers its transmission until its backoff timer expires. At this time, if this node senses an idle service channel, it will update current ttl values of all C(v) re-encoded content pieces.
- (7)
- Later on, it re-broadcasts these content pieces only when their current ttl values are greater than 0. If ttl values of these content pieces are equal to 0, this node will drop these pieces. At this time, this node has finished its CCD broadcast procedure.
- (8)
- If the credit value of this node is less than at step 5, it has to wait for next service time slot and goes back to step 5.
- (9)
- If node v is the intermediate node after step 2, it will check whether the ttl value of this received piece is larger than 0. If no, it drops this piece and exits the CCD broadcast procedure.
- (10)
- If the ttl value of this received piece is larger than 0, this node has to check whether its credit value is less than .
- (11)
- If the credit value of intermediate node v is not less than at step 10 and there is any nearby intermediate node, it adopts Equations (4) and (5) to compute its forwarding priority, that is, and backoff delay, that is, , respectively.
- (12)
- When the backoff timer, that is, , of intermediate node v expires, it will broadcast the first SLNC-coded content piece in its queue. Details operations of this step are similar to those of steps 6 and 7 for destination nodes. After that, this node has finished its CCD broadcast procedure.
- (13)
- If the credit value of this intermediate node is less than at step 10, it has to wait for next service time slot and goes back to step 10.
4.4.2. The CCD Reception Procedure
- (1)
- When node v receives the beacon message sent by a destination node, it will store the ID, selfishness, interest and bitmap values carried in this beacon message. At this time, this procedure has been finished.
- (2)
- If this beacon message is issued by an intermediate node, node v stores the ID, selfishness, interest and queue length of this intermediate node and the ttl value of the first packet in the output queue of this sending node. Then node v exits this procedure.
- (3)
- If node v receives an ACK(CR) packet which carries the credit value CR, it will update its credit value as () and stop this procedure. For example, when the nearby destination node has successfully received an innovative SLNC-coded piece broadcast by node v in the preceding service time slot, it would subtract α from its credit value and send an ACK(α) back to node v for increasing the credit value of node v by α.
- (4)
- If node v does not receive an ACK(CR) packet at step 3, it further checks whether the ttl value of the received packet, that is, the SLNC-coded piece, is zero or not. If yes, it must drop this piece. Otherwise, it will decide its node type based on its interest and selfishness values for this piece.
- (5)
- If node v is the irrelevant node, it will drop this piece and exit this procedure.
- (6)
- If node v is the intermediate node, it will check whether its credit value is not less than δ. If no, it will drop this piece and exit this procedure.
- (7)
- If node v finds this piece is a duplicate one, it will add δ to its credit value, drop this piece and finally reply an ACK(−δ) to punish the nearby node that broadcasts this duplicate piece. Otherwise, it will subtract δ from its credit value, store this piece in its output queue and finally reply an ACK(δ) to stimulate the node that forwards this non-duplicate piece. Then node v exits this procedure.
- (8)
- If the type-checking operation at step 4 recognizes node v is not the irrelevant or intermediate one, this node must further examine whether the received SLNC-coded piece is innovative to it. If no, it will drop this piece.
- (9)
- After this, there are two cases to handle. First, if node v is a destination one, it will increase its credit value by β and reply an ACK(−β) to punish the node broadcast this non-innovative piece. Second, if node v is an overhearing one, it will not issue an ACK packet to request any credit from the sending node when it receives a non-innovative piece, according to guideline 2 in Section 3.2. Then node v exits this procedure.
- (10)
- If node v receives an innovative SLNC-coded piece at step 8 and its credit value is less than α, it must drop this piece and exit this procedure, even this piece is innovative to it. Otherwise, it will subtract α from its credit value, reply an ACK(α) to stimulate the node broadcast this coded piece, cache this piece in its decoding buffer and try to decode buffered pieces.
- (11)
- If the original content pieces can be decoded from buffered pieces, node v will pass them to the upper layer. Otherwise, node v stops this procedure.
- (12)
- Further, if this node is the destination one, it will update the SLNC-coded pieces that will be broadcast in successive service time slots when it has recovered the original content pieces. If this node is the overhearing one, it will not re-broadcast the received pieces, due to its high selfishness on this content data. After this step, node v has finished its CCD reception procedure.
5. Simulations
5.1. Simulation Setup
- (1)
- Average decoding percentage: this metric represents the average of the percentages to decode SLNC-coded content pieces back to the original file for all destination nodes as the time elapses;
- (2)
- Average file downloading delay: this metric denotes the average of all elapsed time for the destination node to decode content pieces back to the original file completely;
- (3)
- Average credits: this metric expresses the average of all credits owned by the intermediate, overhearing and destination nodes as the time elapses.
5.2. Simulation Results for Different File Sizes
5.3. Simulation Results for Different Numbers of Vehicular Nodes
6. Conclusions
Author Contributions
Funding
Conflicts of Interest
Abbreviations
AoI | Area of interest |
CCD | Cooperative content distribution |
CCH | Control channel |
CCS | Credit clearance service |
CR | Data communication range |
DP | Dynamic priority |
DTN | Disruption tolerant network |
ER | Energy detection range |
FRAME | Fair reimbursement and motivating sweepstake scheme |
MANET | Mobile ad-hoc network |
MDR | Multiplicative decreasing reward |
NC | Network coding |
OBU | On board units |
RCM | Receipt counting method |
RIS | Reciprocal incentive scheme |
RSU | Road side unit |
SC | SocialCode |
SLNC | Symbol-level network coding |
SUMO | Simulation of urban mobility |
TCCS | Trusted credit clearance service |
TTL | Time-to-live |
V2I | Vehicle-to-infrastructure |
V2V | Vehicle-to-vehicle |
VANET | Vehicular ad hoc network |
References
- Jiang, D.; Taliwal, V.; Meier, A.; Holfelder, W.; Herrtwich, R. Design of 5.9 Ghz DSRC-based vehicular safety communication. IEEE Wirel. Commun. 2006, 13, 36–43. [Google Scholar] [CrossRef]
- DSRC: The Future of Safer Driving. Available online: http://www.its.dot.gov/factsheets/dsrc_factsheet.htm (accessed on 15 September 2018).
- Jiang, D.; Delgrossi, L. IEEE 802.11p: Towards an international standard for wireless access in vehicular environments. In Proceedings of the IEEE Vehicular Technology Conference, Singapore, 11–14 May 2008. [Google Scholar]
- IEEE trial-use standard for wireless access in vehicular environments (WAVE)—Multi-channel operation. IEEE Std 1609.4-2006 2006, c1–74. [CrossRef]
- Mitropoulos, G.K.; Karanasiou, I.S.; Hinsberger, A.; Aguado-Agelet, F.; Wieker, H.; Hilt, H.-J.; Mammar, S.; Noecker, G. Wireless local danger warning: Cooperative foresighted driving using intervehicle communication. IEEE Trans. Intell. Transp. Syst. 2010, 11, 539–553. [Google Scholar] [CrossRef]
- Huang, W.; Wang, L. ECDS: Efficient collaborative downloading scheme for popular content distribution in urban vehicular networks. Comput. Netw. 2016, 101, 90–103. [Google Scholar] [CrossRef]
- Gong, H.; Yu, L. Content downloading with the assistance of roadside cars for vehicular ad hoc networks. Mob. Inf. Syst. 2017, 2017, 4863167. [Google Scholar] [CrossRef]
- Das, S.; Nandan, A.; Pau, G.; Sanadidi, M.Y.; Gerla, M. SPAWN: A swarming protocol for vehicular ad hoc networks. In Proceedings of the 1st ACM VANET, Philadelphia, PA, USA, 1 October 2004. [Google Scholar]
- Nandan, A.; Das, S.; Pau, G.; Gerla, M.; Sanadidi, M.Y. Co-operative downloading in vehicular ad-hoc wireless networks. In Proceedings of the WONS ’05, St. Moritz, Switzerland, 19–21 January 2005; pp. 32–41. [Google Scholar]
- Nandan, A.; Tewari, S.; Das, S.; Gerla, M.; Kleinrock, L. AdTorrent: Delivering location cognizant advertisements to car networks. In Proceedings of the WONS ’06, Les Ménuires, France, 18–20 January 2016; pp. 203–212. [Google Scholar]
- Li, S.-Y.R.; Yeung, R.W.; Cai, N. Linear network coding. IEEE Trans. Inf. Theory 2003, 49, 371–381. [Google Scholar] [CrossRef]
- Gkantsidis, C.; Rodriguez, P. Network coding for large scale content distribution. In Proceedings of the IEEE INFOCOM, Miami, FL, USA, 13–17 March 2005; pp. 2235–2245. [Google Scholar]
- Ahmed, S.; Kanhere, S.S. Vanetcode: Network coding to enhance cooperative downloading in vehicular ad-hoc networks. In Proceedings of the IWCMC ’06, Vancouver, BC, Canada, 3–6 July 2006; pp. 527–532. [Google Scholar]
- Lee, U.; Park, J.-S.; Yeh, J.; Pau, G.; Gerla, M. Codetorrent: Content distribution using network coding in VANET. In Proceedings of the MobiShare ’06, Los Angeles, CA, USA, 25–25 July 2006; pp. 1–5. [Google Scholar]
- Lee, S.H.; Lee, U.; Lee, K.W.; Gerla, M. Content distribution in VANETs using network coding: The effect of disk I/O and processing O/H. In Proceedings of the IEEE SECON ’08, San Francisco, CA, USA, 16–20 June 2008; pp. 117–125. [Google Scholar]
- Park, J.S.; Lee, U.; Oh, S.Y.; Gerla, M.; Lun, D.S. Emergency related video streaming in VANET using network coding. In Proceedings of the ACM VANET’06, Los Angeles, CA, USA, 29 September 2006; pp. 102–103. [Google Scholar]
- Katti, S.; Katabi, D.; Balakrishnan, H.; Medard, M. Symbol-level network coding for wireless mesh networks. ACM SIGCOMM Comput. Commun. Rev. 2008, 38, 401–412. [Google Scholar] [CrossRef]
- Li, M.; Yang, Z.; Lou, W. CodeOn: Cooperative popular content distribution for vehicular networks using symbol level network coding. IEEE J. Sel. Areas Commun. 2011, 29, 223–235. [Google Scholar] [CrossRef]
- Yang, Z.; Li, M.; Lou, W. CodePlay: Live multimedia streaming in VANETs using symbol-level network coding. IEEE Trans. Wirel. Commun. 2012, 11, 3006–3013. [Google Scholar] [CrossRef]
- Yu, T.-X.; Yi, C.-W.; Tsao, S.-L. Rank-based network coding for content distribution in vehicular networks. IEEE Wirel. Commun. Lett. 2012, 1, 368–371. [Google Scholar] [CrossRef]
- Zhu, W.; Li, D.J.; Saad, W. Multiple vehicles collaborative data download protocol via network coding. IEEE Trans. Veh. Technol. 2015, 64, 1607–1619. [Google Scholar] [CrossRef]
- Toh, C.K.; Kim, D.; Oh, S.; Yoo, H. The controversy of selfish nodes in ad hoc networks. In Proceedings of the 12th International Conference on Advanced Communication Technology (ICACT ’10), Phoenix Park, Korea, 7–10 February 2010; Volume 2, pp. 1087–1092. [Google Scholar]
- Lu, R.; Lin, X.; Zhu, H.; Zhang, C.; Ho, P.H.; Shen, X. A novel fair incentive protocol for mobile ad hoc networks. In Proceedings of the IEEE WCNC, Las Vegas, NV, USA, 31 March–3 April 2008; pp. 3237–3242. [Google Scholar]
- Buttyan, L.; Dora, L.; Felegyhazi, M.; Vajda, I. Barter-based cooperation in delay-tolerant personal wireless networks. In Proceedings of the IEEE International Symposium on World of Wireless, Mobile and Multimedia Networks, Espoo, Finland, 18–21 June 2007; pp. 1–6. [Google Scholar]
- Lee, S.; Pan, G.; Park, J.; Gerla, M.; Lu, S. Secure incentives for commercial ad dissemination in vehicular networks. In Proceedings of the ACM MobiHoc, Montreal, QC, Canada, 9–14 September 2007. [Google Scholar]
- Li, F.; Wu, J. FRAME: An innovative incentive scheme in vehicular networks. In Proceedings of the IEEE ICC, Dresden, Germany, 14–18 June 2009; pp. 1–6. [Google Scholar]
- Chen, B.; Chan, M.C. MobiCent: A credit-based incentive system for disruption tolerant network. In Proceedings of the IEEE INFOCOM, San Diego, CA, USA, 14–19 March 2010; pp. 1–9. [Google Scholar]
- Zhao, G.; Chen, M.; Wei, X. RIS: A reciprocal incentive scheme in selfish opportunistic networks. Wirel. Pers. Commun. 2013, 70, 1711–1734. [Google Scholar] [CrossRef]
- Liu, H.; Lee, P.C.; Lui, J.C.S. On the credit evolution of credit-based incentive protocols in wireless mesh networks. Comput. Netw. 2013, 57, 3327–3343. [Google Scholar] [CrossRef]
- Seregina, T.; Brun, O.; El-Azouzi, R.; Prabhu, B.J. On the design of a reward-based incentive mechanism for delay tolerant networks. IEEE Trans. Mob. Comput. 2017, 16, 453–465. [Google Scholar] [CrossRef]
- Jethawa, H.; Madria, S. Reputation and credit based incentive mechanism for data-centric message delivery in DTNs. In Proceedings of the 19th IEEE International Conference on Mobile Data Management (MDM), Aalborg, Denmark, 25–28 June 2018; pp. 207–216. [Google Scholar]
- Li, J.; Wang, X.; Yu, R. Reputation-based incentives for data dissemination in mobile participatory sensing networks. Int. J. Distrib. Sens. Netw. 2015, 11, 172130. [Google Scholar] [CrossRef]
- Katmada, A.; Satsiou, A.; Kompatsiaris, I. A reputation-based incentive mechanism for a crowdsourcing platform for financial awareness. In Proceedings of the International Workshop on the Internet for Financial Collective Awareness and Intelligence (IFIN 2016), Florence, Italy, 12 September 2016; pp. 57–80. [Google Scholar]
- Pal, S.; Saha, B.K.; Misra, S. Game theoretic analysis of cooperative message forwarding in opportunistic mobile networks. IEEE Trans. Cybern. 2017, 47, 4463–4474. [Google Scholar] [CrossRef] [PubMed]
- Zhan, Y.; Xia, Y.; Zhang, J.; Wang, Y. Incentive mechanism design in mobile opportunistic data collection with time sensitivity. IEEE Int. Things J. 2018, 5, 246–256. [Google Scholar] [CrossRef]
- Chang, I.-C.; Lo, J. A credit-based incentive protocol for stimulating network-coded cooperative content distribution in VANET. In Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2014), Birmingham, UK, 2–4 July 2014; pp. 452–457. [Google Scholar]
- Simulation of Urban Mobility (SUMO). Available online: http://sumo.sourceforge.net (accessed on 15 September 2018).
- NS-2. Available online: http://www.isi.edu/nsnam/ns (accessed on 15 September 2018).
- Panahi, F.H.; Ohtsuki, T. Analytical modeling of cognitive heterogeneous cellular networks over Nakagami-m fading. EURASIP J. Wirel. Commun. Netw. 2015, 2015, 61. [Google Scholar] [CrossRef]
Barter-Based | RCM | FRAME | MobiCent | RIS | SocialCode | |
---|---|---|---|---|---|---|
Selfishness considered | Y | Y | Y | Y | Y | Y |
Interest considered | Y | N | N | N | N | Y |
Distributed credit control | N | N | N | N | Y | Y |
Credit overspent | N | Y | N | N | N | N |
Nodes may reluctant to forward packets | N | N | Y | N | N | N |
Attacks considered | N | N | N | Y | N | N |
Integrating with the SLNC-based CCD approach | N | N | N | N | N | Y |
High Selfishness | Low Selfishness | |
---|---|---|
High Interest | Overhearing Node: This kind of node stores received SLNC pieces and attempts to decode them. It does not forward them to its neighbors. | Destination Node: This kind of node stores received SLNC pieces and attempts to decode them. It re-encodes them and forwards re-encoded pieces to neighbors. |
Low Interest | Irrelevant Node: This kind of node drops received SLNC pieces. It does not forward them to neighbors. | Intermediate Node: This kind of node stores received SLNC pieces. It just forwards them to neighbors. |
Receiver | Destination Node | Intermediate Node | Overhearing Node | |
---|---|---|---|---|
Sender | ||||
Destination Node | Innovative piece: (+α, −α) Non-innovative piece: (−β, +β) | Duplicate piece: (−δ, +δ) Non-duplicate piece: (+δ, −δ) | Innovative piece: (+α, −α) Non-innovative piece: (0, 0) | |
Intermediate Node | Innovative piece: (+α, −α) Non-innovative piece: (−β, +β) | Duplicate piece: (−δ, +δ) Non-duplicate piece: (+δ, −δ) | Innovative piece: (+α, −α) Non-innovative piece: (0, 0) |
Parameters | Value |
---|---|
Simulation Area | 10524 × 6924 m2 area in urban Taipei, Taiwan, with 25 junctions and 40 road segments |
MAC layer | 802.11p |
Propagation model | Nakagami m = 3 |
Data communication range (CR) | 250 m |
Energy detection range (ER) | 700 m |
Base rate in the control channel | 3 Mbps |
Data rate in the service channel | 12 Mbps |
The number of APs | 4 |
Generation size | 32 pieces |
TTL of a SLNC-coded content piece | 60 s |
The size of a SLNC-coded content piece | 1 KBytes |
Output queue length | 100 pieces |
, | 2 ms, 100 μs |
Initial credit γ | 50 |
α, β, δ, ω | 0.2, 0.04, 0.01, 0.5 |
File size | 10, 6, 2 MBytes |
The number of vehicular nodes | 3468, 867, 216 |
File Size | 10 MB | 6 MB | 2 MB | |
---|---|---|---|---|
Normalized Ratio of File Downloading Delay | ||||
SocialCode | 0.47 | 0.43 | 0.36 | |
SC without DP | 0.57 | 0.56 | 0.49 | |
FRAME + CodeOn (FRAME) | 0.81 | 0.81 | 0.69 | |
RCM + CodeOn (RCM) | 1.00 | 1.00 | 1.00 |
The Number of Nodes | 3468 | 867 | 216 | |
---|---|---|---|---|
Normalized Ratio of File Downloading Delay | ||||
SocialCode | 0.51 | 0.43 | 0.54 | |
SC without DP | 0.62 | 0.56 | 0.64 | |
FRAME + CodeOn (FRAME) | 0.80 | 0.80 | 0.81 | |
RCM + CodeOn (RCM) | 1.00 | 1.00 | 1.00 |
© 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Chang, I.-C.; Yen, C.-E.; Lo, J. An Integrated Credit-Based Incentive Protocol for Symbol-Level Network-Coded Cooperative Content Distribution among Vehicular Nodes. Appl. Sci. 2018, 8, 2035. https://doi.org/10.3390/app8112035
Chang I-C, Yen C-E, Lo J. An Integrated Credit-Based Incentive Protocol for Symbol-Level Network-Coded Cooperative Content Distribution among Vehicular Nodes. Applied Sciences. 2018; 8(11):2035. https://doi.org/10.3390/app8112035
Chicago/Turabian StyleChang, Ing-Chau, Chin-En Yen, and Jacky Lo. 2018. "An Integrated Credit-Based Incentive Protocol for Symbol-Level Network-Coded Cooperative Content Distribution among Vehicular Nodes" Applied Sciences 8, no. 11: 2035. https://doi.org/10.3390/app8112035
APA StyleChang, I.-C., Yen, C.-E., & Lo, J. (2018). An Integrated Credit-Based Incentive Protocol for Symbol-Level Network-Coded Cooperative Content Distribution among Vehicular Nodes. Applied Sciences, 8(11), 2035. https://doi.org/10.3390/app8112035