Next Article in Journal
Co-Simulation and Data-Driven Based Procedure for Estimation of Nodal Voltage Phasors in Power Distribution Networks Using a Limited Number of Measured Data
Next Article in Special Issue
Review on Free-Space Optical Communications for Delay and Disruption Tolerant Networks
Previous Article in Journal
Deep Learning Techniques for Android Botnet Detection
Previous Article in Special Issue
An Adaptive Delay-Tolerant Routing Algorithm for Data Transmission in Opportunistic Social Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Efficient Routing Protocol with Overload Control for Group Mobility in Delay-Tolerant Networking

1
Department of Information and Telecommunications Engineering, Soongsil University, 369, Sangdo-ro, Dongjak-gu, Seoul 06978, Korea
2
School of Electronic Engineering, Soongsil University, 369, Sangdo-ro, Dongjak-gu, Seoul 06978, Korea
*
Author to whom correspondence should be addressed.
Electronics 2021, 10(4), 521; https://doi.org/10.3390/electronics10040521
Submission received: 11 January 2021 / Revised: 19 February 2021 / Accepted: 19 February 2021 / Published: 23 February 2021
(This article belongs to the Special Issue Delay Tolerant Networks and Applications)

Abstract

:
In delay-tolerant networking (DTN), messages are delivered to destination nodes by using opportunistic contacts between contact nodes, even if stable routing paths from source nodes to destination nodes do not exist. In some DTN network environments, such as military networks, nodes movement follows a group movement model, and an efficient DTN routing protocol is required to use the characteristics of group mobility. In this paper, we consider a network environment, where both intra- and intergroup routing are carried out by using DTN protocols. Then, we propose an efficient routing protocol with overload control for group mobility, where delivery predictability for group mobility is defined and proactive overload control is applied. Performance evaluation results show that the proposed protocol had better delivery ratios and overhead ratios than compared protocols, although the delivery latency was increased.

1. Introduction

In a harsh mobile network environment, where stable routing paths from source mobile nodes to destination mobile nodes are not available, mainly due to the nonexistence of infrastructure and sparse density of mobile nodes, conventional self-organizing networks based on the existence of stable routing paths, such as mobile ad hoc networks (MANET) [1], are not suitable to deliver messages from source nodes to destination nodes efficiently. In these networks, if a routing path is broken for a long time, the communication session between a source node and a destination node is disconnected, and messages are removed from the buffer memory of nodes. Therefore, a new communication model is needed to cope with the unstable connectivity problem, and delay-tolerant networking (DTN) [2,3,4,5] was proposed for this purpose. In DTN, a node has a bundle layer, which is located between a transport layer and an application layer, and messages can be stored for a long time at the buffer storage with the help of the bundle layer. Then, if a mobile node with messages in its buffer contacts another mobile node opportunistically while moving, it can forward messages to a contact node, and the forwarded messages are stored in the buffer of the receiving node. By using a series of opportunistic contacts between nodes, messages can be delivered to a destination node successfully in DTN, even though the delivery latency may be increased, compared to conventional self-organizing routing protocols based on stable routing paths, such as MANET.
DTN has its application mainly in deep space networks or military networks, since stable routing path between nodes is not available due to the long distance between nodes or sparse node density. Extensive work has been carried out for DTN routing protocols [2,3,4,5,6,7,8]. Epidemic protocol [6] is a flooding-based protocol, and a node forwards messages whenever it contacts another node, if the contact node does not have the messages already. It is simple but has significant traffic overload. In a Spray and Wait routing protocol [7], the total number of message copies in a network is limited to L for each generated message. When a message is generated at a source node originally, it forwards L − 1 copies of messages to L − 1 contact nodes in the Spray phase until L nodes including the source node has exactly one copy of the message. In the Wait phase, the message is forwarded to a destination node only. Although the Spray and Wait routing protocol can alleviate the high overload problem of an Epidemic protocol, it is a blinded forwarding protocol basically, since messages are forwarded to L − 1 contact nodes blindly without any efficient forwarding criteria. In a PRoPHET protocol [8], delivery predictability (DP) between any two nodes is calculated based on the contact history between nodes. If the delivery predictability between two nodes is higher, it is more probable to deliver messages between them. Therefore, if two nodes contact, they compare delivery predictability for the destination nodes of stored messages, and a message is forwarded to a contact node if a contact node has a higher delivery predictability to a destination node for the considered message. The PRoPHET protocol was standardized as an Internet Research Task Force (IRTF) request for comments (RFC) [8] by the DTN research group [9]. In [10], the authors define quality of node, which is a weighted sum of message handling capacity and the improved delivery predictability. Then, they proposed an adaptive Spray and Wait routing protocol based on quality node by adaptively allocating the number of message copies based on the quality of the node in the Spray phase. In the Wait phase, a message is forwarded only if the contact node has a higher improved delivery predictability. In [11], the authors proposed a vehicular DTN routing protocol, where the message forwarding decision is based on the encounter probability comparison in the PRoPHET protocol, and the number of message replications at forwarding is controlled based on the Spray and Wait protocol in the vehicular DTN networks.
In some network environments, such as military networks, nodes movement follows a group mobility model [12,13,14]. A group consists of a number of member nodes, and they move together based on an assumed group mobility model. In [12], a reference point group mobility model (RPGM) was proposed. In an RPGM, there is a logical center in each group and the mobility of group members follows the movement of the logical center, which includes location, speed, direction, acceleration, etc. Group members are distributed uniformly within the geographic scope of a group. A reference point is assigned to each group member by following the group movement, and a group member is located in the neighborhood of its assigned reference point randomly at each movement. In [13], an RPGM was extended by considering the velocity of groups and group members, and it was called as a reference velocity group mobility model (RVGM). In an RVGM, the mobility of each group is modeled by group velocity, and group members have velocities close to the group velocity, but the velocities have a slight deviation from group velocity. In [14], the authors proposed an ellipse group mobility (EGM) model for tactical MANET, where nodes in a group located in an elliptic region and compared the performance of the EGM model with that of the RPGM. The results showed that the EGM model is better for intergroup communication and worse for intragroup communication.
Work on routing protocols by considering group mobility models have been carried out, too [15,16,17,18,19,20,21]. In [15], a DTN network for the military battlefield is considered, where nodes move in a group according to the reference point established by the leader node. Then, the authors compared the delay of the group mobility model with that of an entity mobility model using an Epidemic routing protocol. It was shown that the group mobility model has lower delay. In [16], the authors considered a group mobility model and compared the performance of three MANET routing protocols, such as destination sequence distance vector (DSDV), ad hoc on-demand distance vector (AODV), and dynamic source routing (DSR) by considering an RPGM model and by varying pause time and mobility speed in a single group environment and the connection ratio between intra- and intergroup communications in a multiple group environment. In [17], the authors proposed a novel group mobility model in tactical MANET, where wedge formation was used as the basic movement technique. The authors analyzed the effect of the dynamics of network connectivity of the proposed mobility model on the performance by assuming an AODV routing protocol. In [18], a group Epidemic routing (G-ER) was proposed. In the G-ER, an AODV protocol was used for intragroup routing and an Epidemic protocol was used for intergroup routing. Additionally, the authors proposed a buffer sharing mechanism inside each group. In [19], the authors analyzed the performance of an RPGM for MANET from the aspects of average throughput, energy consumption, and average end-to-end delay. They considered a network with a static node and a network with an RPGM model and applied AODV protocol and an ad hoc on-demand multipath distance vector (AOMDV) protocol to these networks. Analysis results showed that the AOMDV with an RPGM model was more appropriate when higher throughput or lower energy consumption was required. On the other hand, an AODV with an RPGM model was more appropriate when less delay was required. In [20], the authors studied the feasibility of applying DTN architecture into an aircraft cluster network in order to cope with the intermittent communication links problem between aircraft—from the aspects of routing protocol, transport layer protocol, and safety issues. In [21], the authors considered a future tactical-battlefield network, where ground nodes formed several small groups and an unmanned aerial vehicle (UAV) was used to enlarge coverage and increase connectivity among small groups. Then, they formulated a group connectivity optimization problem and data slot allocation optimization problem. A UAV positioning mechanism was proposed to maximize group connectivity and a dynamic slot allocation mechanism was proposed to maximize group connectivity utility.
In most of the work mentioned above, however, a MANET protocol was mainly assumed as the basic routing protocol for group mobility. In [18], although a DTN protocol was assumed for intergroup routing, a MANET protocol was assumed for intragroup routing. In this paper, we consider a DTN protocol for both intra- and intergroup routing, since connectivity between group members in the same group may be broken due to the mobility and the destruction of nodes in a battlefield environment, and thus, a MANET routing protocol cannot work well, even for intragroup routing. Then, we propose an efficient DTN routing protocol with overload control for group mobility, which is an extension of our preliminary work in [22]. The group mobility model and the basic idea of using group delivery predictability in addition to individual delivery predictability are similar to our preliminary work in [22], but the work in this paper significantly extends the previous work in [22]. Our proposed work’s main novelty and major contributions, which include a major extension from our preliminary work, are summarized as follows:
  • The proposed group mobility model was elaborated.
  • A proactive overload control protocol with overload control table was proposed in order to reduce the message forwarding of a message delivered to a node in the same group with a destination node.
  • A message forwarding condition and overload control protocol were efficiently combined for an efficient routing protocol with overload control for group mobility.
  • The performance of the proposed routing protocol with overload control was compared with comparing protocols, and the effectiveness of the proposed protocol was validated from the aspects of delivery ratio and overhead ratio.
The remaining part of this paper is organized as follows. In Section 2, we propose a group mobility model and group delivery predictability model. In Section 3, we describe an algorithm of the proposed protocol in detail using examples. In Section 4, we analyze the performance of the proposed protocol extensively by using simulation. Finally, we conclude this work in Section 5.

2. A Proposed Group Mobility Model and Group Delivery Predictability Model

2.1. A Proposed Group Mobility Model

The group mobility model of this paper was extended from the RPGM model in [12], as shown in Figure 1. Each group consists of a number of mobile nodes distributed within group range from a logical group center. The next position of a logical group center is determined based on a random waypoint mobility model, and nodes within each group move based on a cluster mobility model [23]. For more elaborate modeling of the movement of nodes in a group, we placed a number of group intermediate points separated with fixed group movement distance along the straight line between two consecutive group random waypoints. If the distance between intermediate point and next random waypoint is less than the group movement distance, the next random waypoint is defined as the next intermediate point.
Figure 2 shows a detailed movement model of nodes in a group between two consecutive group intermediate points between two consecutive random waypoints of a logical group center. The notations in Figure 2 are defined as follows, which are partly based on [13]:
  • Position of a group center j at time t , based on random waypoint mobility model: Y j t
  • Velocity of a group center j at time t : W j t
  • Position of an intermediate point of a group center j at time t : I j t
  • Group movement distance, i.e., the distance between two consecutive intermediate points of a group center: G D
  • Position of an intermediate point of a group center j at time t m + t k + 1 : I j t m + t k + 1 = I j t m + t k + G D × Y j t m + 1 Y j t m / Y j t m + 1 Y j t m
  • Position of a node i in a group j at time t : X j , i t
  • Local displacement position of a node i in a group j at time t based on cluster mobility model: Z j , i t
  • Next position of a node i in a group j at time t m + t k + 1 : X j , i t m + t k + 1 = X j , i t m + t k + Z j , i t m + t k + I j t m + t k + 1 I j t m + t k
In Figure 2, a group center is at I j t m + t k and I j t m + t k + 1 when t = t m + t k and t = t m + t k + 1 , respectively. A node i in a group j was at X j , i t m + t k   when t = t m + t k . The next position of a node i in a group j at t = t m + t k + 1 , X j , i t m + t k + 1 , is determined by adding the local displacement position based on cluster mobility model, Z j , i t m + t k , and the difference between two consecutive group intermediate points, I j t m + t k + 1 I j t m + t k . Finally, the velocity of a node i in a group j at t = t m + t k + 1 is determined as follows:
  • Velocity of a node i in a group j at time t m + t k + 1 : V j , i t m + t k + 1 = W j t m × X j , i t m + t k + 1 X j , i t m + t k / I j t m + t k + 1 I j t m + t k

2.2. A Proposed Delivery Predictability for Group Mobility Model

In this paper, a PRoPHET protocol is considered for message delivery between nodes basically. Then, it is extended for a group mobility model. In a PRoPHET protocol, a message is forwarded based on delivery predictability between two nodes, and delivery predictability between node a and node b , i.e., P a , b , is calculated as follows [8]:
P a , b = P a , b o l d + 1 δ P a , b o l d × P e n c o u n t e r ,
P a , b = P a , b o l d × γ K ,
P a , c = max P a , c o l d , P a , b × P b , c × β ,
where P e n c o u n t e r , γ , K , and β are a scaling factor, a limiting parameter, an aging constant, the number of elapsed time units after the last contact, and a parameter to control transitivity, respectively.
In this paper, we extend the above equations for delivery predictability to accommodate a group mobility model. To distinguish the proposed delivery predictability for group mobility, we denote it as group delivery predictability. The delivery predictability defined in Equations (1)–(3) is called individual delivery predictability for convenience. Since nodes within the same group move by following the same group mobility model, they have more contacts with each other than those between nodes, which belong to different groups, and thus have more opportunities to deliver messages to other nodes within the same group. Therefore, we define delivery predictability between a node and a set of nodes within a group as group delivery predictability. For simplicity, we assume that the group information of a node can be extracted from a node identifier. When node n A in group A contacts node n B in group B , the group delivery predictability between node n A and a set of nodes in group B , P g n A , G B , are defined and calculated as follows:
P g n A , G B = P g n A , G B o l d + 1 δ P g n A , G B o l d × P e n c o u n t e r ,
P g n A , G B = P g n A , G B o l d × γ K ,
P g n A , G C = max P g n A , G C o l d , P g n A , G B × P g n B , G C × β ,
P g n A , G A = 1 ,
where Equation (4) shows the group delivery predictability calculation, where delivery predictability between nodes a and b in Equation (1) is changed to group delivery predictability between a node n A and a set of nodes in group B , P g n A , G B . Equation (5) shows the aging of group delivery predictability and Equation (6) shows transitivity of group delivery predictability. Group delivery predictability between a node and a group including the node itself is defined as 1, as in Equation (7).

3. A Proposed Routing Protocol with Overload Control for Group Mobility

In this paper, we propose a routing protocol for group mobility. Depending on the relationship of the group of contact node x , the group of contact node y , and the group of destination node z of a considered message, the message forwarding condition of the proposed protocol is classified as Cases 1, 2, 3, 4, and 5. Then, the forwarding of the proposed protocol operates as follows:
  • Case 1. If contact nodes x and y belong to the same group A and also destination node z belongs to the same group A , a message is forwarded to node y if P y , z > P x , z .
  • Case 2. If contact nodes x and y belong to the same group A but destination node z belongs to different group B , a message is forwarded to node y if P y , z > P x , z   AND   P g y , G B > P g x , G B .
  • Case 3. If contact nodes x and y belong to groups A and B , respectively, and destination node z belongs to the same group B with node y , a message is forwarded to node y if P y , z > T p   OR   P g y , G B > T p , where the message dissemination promotion threshold, T p , is generally set as a small value to promote the dissemination of a message.
  • Case 4. If contact nodes x and y belong to groups A and B , respectively, and destination node z belongs to group A , a message is forwarded to node y if P y , z > T r   AND   P g y , G A > T r , where the message dissemination restriction threshold, T r , is generally set as a large value to restrict the dissemination of a message.
  • Case 5. If contact nodes x and y belong to groups A and B , respectively, and destination node z belongs to group C , a message is forwarded to node z if P y , z > P x , z   AND   P g y , G C > P g x , G C .
The basic rationale of the proposed forwarding condition is to use both individual delivery predictability and group delivery predictability together to make a forwarding decision efficiently if the group of a destination node is different from either a group of contact node x or a group of contact node y . Additionally, when a group of contact node x and a group of contact node y are different from each other, if a group of destination node z is the same as the group of contact node y only, the message dissemination is promoted. On the other hand, if a group of destination node z is the same as the group of contact node x only, the message dissemination is restricted. Table 1 summarizes the forwarding conditions of the proposed protocol for Cases 1 to 5.
In addition to forwarding conditions proposed above, overload control is newly proposed in this paper. In DTN, messages are forwarded through opportunistic contacts and forwarding nodes are not aware of whether the generated message was delivered to a destination node successfully or not. Therefore, unnecessary forwarding of messages may occur even though the messages are delivered to destination nodes successfully already. To reduce this unnecessary forwarding of messages after successful delivery, a vaccine scheme was proposed in [24], where if a message is delivered to a destination node, an anti-packet for the delivered message is generated at a forwarding node. Then, the forwarding node does not receive the same message anymore, and it shares the anti-packet information with all contact nodes, and contact nodes remove the already delivered messages if they have them. Otherwise, they do not receive the message anymore. In this paper, we adopt an approach of the vaccine scheme [24] for overload control and extend the approach to reduce overload further.
Firstly, if a message is delivered to a destination node, the “delivery state of a message to a destination node”, which acts similarly as an anti-packet in [24], is recorded at the overload control table of the forwarding node as “delivered”. Then, this delivery information is shared with future contact nodes, and the already delivered message is removed from the buffer of the contact nodes in order to reduce unnecessary forwarding of already delivered messages, which is similar to the vaccine scheme [24]. This protocol is called reactive overload control (OC) in this paper. The concept of reducing unnecessary forwarding of already delivered messages to a destination node in reactive overload control is similar to the work in our previous work [25], where the concept of the anti-packet [24] was also applied for multiple requesters and multiple caching nodes environment in DTN for information-centric networking (ICN) by defining a satisfaction flag for a pair of delivered data and requester.
Secondly, in order to carry out the overload control more proactively, we propose a proactive overload control. In the proactive overload control, if a message is delivered to a node that belongs to the same group as the destination node of the message, the “delivery state of the message to a node in the same group as the destination node” is recorded as “delivered” at the overload control table of the forwarding node additionally. Then, the message that is delivered to any node in the same group as the destination node can be delivered to a destination node only, i.e., direct delivery, without forwarding to any other nodes to reduce overload.
The rationale of the proposed proactive protocol is to use the direct delivery by the receiving node within the same group as the destination node for intragroup delivery, which may have higher delivery probability. The delivery state information is shared with future contact nodes, and a contact node with the already delivered message to a node in the same group as a destination node does not forward the message to any other nodes, except the destination node, too. We note that the message delivered to a node in the same group as a destination node is not removed from the buffer of contact nodes, although it is not permitted to forward the message any further since it is not still guaranteed that the message is delivered to a destination node yet, and thus, it is safe not to remove the message at the buffer of future contact nodes.
In the proactive overload control, if a message is delivered to a destination node of the message, the “delivery state of the message to a destination node” is recorded as “delivered” at the overload control table of the forwarding node, too, as in reactive overload control. Then, this information is shared with contact nodes to reduce unnecessary forwarding of already delivered messages to destinations, and the delivered message is removed from the buffer of the contact node.
Reducing message forwarding for delivered a message to a node that belongs to the same group as the destination node of the message in proactive overload control is different from that in [24,25], since message forwarding is restricted proactively; although, a message is not delivered to a destination node but is only delivered to a node that belongs to the same group as the destination node of the message for more active overload control. Additionally, a message delivered to a node in the same group as a destination node is not removed from the buffer of contact nodes, different from that in [24,25], but direct delivery is only allowed for the message at the contact node.
Table 2 shows examples of the overload control table in the proposed proactive overload control protocol. The message m 1 x A , where m 1 is the message ID and x A is the destination node of the message m 1 , has not been delivered to a destination node or a node in the same group of a destination node yet. Therefore, the state of forwarding permission is stored as “permission”. The message m 2 y A has not delivered to a destination node yet, but it was delivered to a node in the same group of a destination node already. Thus, the status of forwarding permission is stored as “limited permission”, since forwarding is only permitted to a destination node only. The message m 3 u C has been delivered to a destination node already, and the status of forwarding permission is stored as “prohibition”, and it is not permitted to forward to any node anymore.
At contact with another node, a node in the proposed proactive protocol makes a forwarding decision based on the forwarding condition using the group delivery predictability defined in Table 1, and overload control is applied if a message is delivered to either a node in a group of a destination node or a destination node. Figure 3 shows examples of the overload control table, where information before contact is printed in black color and information after contact is printed in red color for illustration purposes. Message ID (destination node), delivery state to a destination node, delivery state to a node in the same group as a destination node, and state of forwarding permission in Table 2 are denoted as message ID, destination node, group of destination node, and forwarding state, respectively, for brevity.
In Figure 3a, nodes x A , y A , and w A belong to group A , and node z B belongs to group B . Node z B is in contact with w A now. Before contact, node z B has m 1 x A and m 2 y A in its buffer and has delivery state and forwarding state information of m 3 u C in its overload control table. Node w A has m 3 u C in its buffer and has delivery state and forwarding state information of m 2 y A in its overload control table before contact. At contact, it is assumed that m 1 x A in the buffer of z B is forwarded to w A according to the forwarding condition defined in Table 1. As shown in overload control table of node z B , m 3 u C was already delivered to destination node u C . Additionally, m 2 y A was already delivered to destination node y A , as shown in overload control table of node w A . Using this information, m 2 y A is removed from the buffer of z B , and the delivery state and forwarding state of m 2 y A are updated appropriately in the overload control table of node z B after contact. In addition, the delivery state and forwarding state of m 1 x A are updated in overload control table of z B after contact. After contact, m 3 u C is removed from the buffer of node w A . Then, the delivery state and forwarding state of m 1 x A and m 3 u C are updated appropriately in the overload control table of node w A .
In Figure 3b, w A is in contact with x A , and z B is in contact with y A now. Since x A is the destination node of m 1 x A , m 1 x A is delivered to x A from w A at contact, and m 1 x A is removed from the buffer of w A after contact. The delivery state and forwarding state of m 1 x A are updated in overload control table of node w A . After contact of z B and y A , y A receives delivery state and forwarding state information for m 1 x A , and delivery state and forwarding state information of m 1 x A are created newly in the overload control table of node y A .
In Figure 3c, z B is in contact with w A , and y A is in contact with x A now. Before contact with z B , w A has information of successful delivery state to destination x A , as shown in Figure 3b. Thus, this information is shared with z B , and m 1 x A is removed from the buffer of z B , and information on delivery state and forwarding state are updated in overload control table of z B . Since x A successfully received m 1 x A before contact with y A already, m 1 x A is removed from the buffer of y A after contact with x A . Then, information on delivery state and forwarding state are updated appropriately in the overload control table of y A .
Figure 4 shows a flowchart of the proposed algorithm. When node x and node y contact, they update individual and group delivery predictabilities by exchanging summary vectors, which includes information of messages in their buffer and delivery predictability. Then, they update the overload control table. Node x checks if there is any message for forwarding to node y. If there is any, node x checks the overload control table to check if it is permitted to forward. Then, if it is, the message is forwarded based on the forwarding condition, as proposed in Table 1. If node x receives a message from node y, it firstly checks if it is the destination node z of the message. If it is, the corresponding entry in the overload control table is updated. Otherwise, node x checks if it is located within the same group as the destination node z of the message. If it is, the corresponding entry in the overload control table is updated.

4. Simulation Results

The performance of the proposed protocol was analyzed through simulation using an opportunistic network environment (ONE) simulator [26,27], which is one of the most widely used simulators for the DTN protocol—from the aspects of delivery ratio, overhead ratio, and delivery latency, as defined in Equations (8)–(10) as follows:
D e l i v e r y   r a t i o = N o . o f   d e l i v e r e d   m e s s a g e s N o . o f   g e n e r a t e d   m e s s a g e s ,
O v e r h e a d   r a t i o = N o .   o f   f o r w a r d e d   m e s s a g e s N o .   o f   d e l i v e r e d   m e s s a g e s N o . o f   d e l i v e r e d   m e s s a g e s ,
D e l i v e r y   l a t e n c y = S u m   o f   l a t e n c y   o f   d e l i v e r e d   m e s s a g e s N o . o f   d e l i v e r e d   m e s s a g e s ,
Table 3 shows parameter values used in the simulation. In this paper, we consider a traffic scenario, where all messages generated at mobile nodes are delivered to a single mobile node, such as a mobile sink node in delay-tolerant wireless sensor networks [28], since in a battlefield environment, which is one of the main application areas of the proposed group mobility, it is likely that messages generated at mobile units of each group would be delivered to a single command center node.
For performance comparison, we considered three comparable protocols in simulation. Table 4 compares the proposed protocol and three comparable protocols. In the individual DP protocol, forwarding conditions of the original PRoPHET protocol with individual delivery predictability were modified appropriately by using the forwarding conditions in Table 1 for fair comparison. Group DP protocol was the protocol proposed in our preliminary work [22]. Group DP + Reactive OC protocol is a combination of Group DP protocol [22] and the reactive overload control protocol, where overload control is enabled only when the message is delivered to a final destination node, as in [24]. Group DP + Proactive OC protocol is a combination of Group DP protocol and the proposed proactive overload control protocol, and we refer to this as the proposed protocol in numerical examples.
Figure 5 shows the delivery ratio for varying buffer size. Delivery ratios of all the considered protocols increased as buffer size increased but it saturated as the buffer size increased to accommodate messages sufficiently. Routing protocols with overload control had a significantly higher delivery ratio, since they efficiently reduced unnecessary message forwarding. The proposed protocol using group delivery predictability and proactive overload control had a higher delivery ratio by proactively reducing messages that were delivered to a node within the same group as the destination nodes of the messages.
Figure 6 shows the overhead ratio for varying buffer size. Overhead ratios of all the considered protocols decreased as buffer size increased. This is because delivery ratio increases as buffer size increases due to the increase of the number of successfully delivered messages, as shown in Equation (9). As can be expected, routing protocols with overload control had significantly lower overhead ratio, since they efficiently reduced unnecessary message forwarding by overload control. The proposed protocol using group delivery predictability and proactive overload control had a lower overhead ratio by proactively reducing messages that were delivered to a node within the same group as the destination nodes of the messages.
Figure 7 shows the delivery latency for varying buffer size. Delivery latencies of all the considered protocols increased as buffer size increased, since a large buffer accommodates more messages, and thus more time is needed to deliver a message to a destination node through transmission with limited bandwidth and limited contact time. Since protocols with overload control had smaller copies of messages for a given buffer size, more time was needed for them to be delivered to the destination node using a smaller number of forwarded messages. The proposed protocol had the largest delivery latency due to proactive overload control.
Figure 8 shows the delivery ratio for varying the message size with a buffer size of 50 Mbytes. The delivery ratios of all the considered protocols decreased as message size increased. This is because higher messages size generates more message drop due to buffer overflow, and thus results in a lower delivery ratio. The protocols with overload control had a significantly higher delivery ratio than those without overload control by efficiently reducing unnecessary message forwarding. The proposed protocol using group delivery predictability and proactive overload control had a higher delivery ratio by proactively controlling overload.
Figure 9 shows the overhead ratio for varying message size with a buffer size of 50 Mbytes. Overhead ratios of all the considered messages increased as message size increased due to the decreased number of successfully delivered messages. Routing protocols with overload control had a significantly lower overhead ratio. The proposed protocol using group delivery predictability and proactive overload control had a lower overhead ratio because of proactive overload control.
Figure 10 shows the delivery latency for varying message size with a buffer size of 50 Mbytes. The delivery latencies of all the considered protocols decreased as message size increased. This is because when the message size increases, the average number of messages stored in buffer decreases, and thus each message has a higher chance for forwarding and results in a lower delivery latency. For a given message size, delivery latency of overload control protocols was higher since they had smaller copies of messages and there was a smaller chance of message delivery. The proposed protocol had the largest delivery latency due to proactive overload control.
Figure 11 shows the delivery ratio for varying time-to-live (TTL) with a buffer size of 50 Mbytes. The delivery ratio of protocols without overload control increased as TTL value increased from 60 m to 180 m, but it decreased as TTL value increased from 180 m to 600 m. Since the number of message copies increased as TTL increased, thus the delivery ratio also increased because of more message dissemination by increasing the TTL value for small values of TTL. However, if TTL increases for large values of TTL, it is highly likely that more messages are dropped due to buffer overflow at fixed buffer size, since fewer messages are removed because of TTL expiration, and thus delivery ratio decreases. The delivery ratio of protocols with overload control increased as TTL values increased, since the number of message copies could be controlled efficiently using overload control. The proposed protocol had the largest delivery ratio in most of the considered TTL values, except for small TTL values, where the protocol with reactive overload control had a higher delivery ratio than the proposed protocol because of the effect of more message dissemination in small TTL values.
Figure 12 shows the overhead ratio for varying TTL with a buffer size of 50 Mbytes. The overhead of all the protocols increased as TTL values increased due to more message forwarding. The overhead of the protocols with overload control was significantly smaller than those without overload control. Especially, the overhead ratio of the proposed protocol was the smallest due to proactive overload control.
Figure 13 shows delivery latency for varying TTL with a buffer size of 50 Mbytes. The delivery latencies of all considered protocols increased as TTL values increased, since more time was needed to deliver a message to the destination node for large values of TTL using limited transmission speed because of more message copies in the buffer. The proposed protocol had the largest delivery latency, since the proposed protocol proactively removed message copies if they were delivered to any node in the same group of the destination node, and thus more time was needed to deliver a message to a destination node.

5. Conclusions

In this paper, we considered a group mobility environment, where both intra- and intergroup routing are carried out by using a DTN protocol. Then, we newly defined delivery predictability for group mobility and proposed an efficient DTN routing protocol for group mobility by using both individual delivery predictability and group delivery predictability for making a forwarding decision, depending on the relationship of the group of contact node x , group of contact node y , and group of destination node z of a considered message. To improve the performance of the proposed protocol further, we proposed proactive overload control, where if a message is delivered to any node in the same group as the destination node of the message, further message dissemination is prohibited proactively.
Using a ONE simulator, we evaluated the performance of the proposed protocol from the aspects of delivery ratio, overhead ratio, and delivery latency by varying buffer size, message size, and TTL. Performance evaluation results show that the proposed protocol had better delivery ratios and overhead ratios than the compared protocols by efficiently forwarding messages and controlling overload proactively to delivered messages to any node in the same group as the destination node of the message, although delivery latency was increased. Since DTN is delay-tolerant basically, it is justified that the proposed protocol with a better delivery ratio and overhead ratio is more suitable for DTN than the comparable protocols, even though the proposed protocol had larger delivery latency.

Author Contributions

Conceptualization, M.W.K. and Y.W.C.; formal analysis, M.W.K. and Y.W.C.; funding acquisition, Y.W.C.; investigation, M.W.K. and Y.W.C.; methodology, M.W.K. and Y.W.C.; software, M.W.K.; writing—original draft, M.W.K. and Y.W.C.; writing—review and editing, M.W.K. and Y.W.C. All authors have read and agreed to the published version of the manuscript.

Funding

This work has been supported by the Future Combat System Network Technology Research Center program of Defense Acquisition Program Administration and Agency for Defense Development (UD190033ED).

Data Availability Statement

Not applicable.

Acknowledgments

The preliminary version of this paper, entitled “A novel DTN protocol for group mobility” was presented at the International Conference on ICT Convergence, which was held in Jeju, Korea in 2020.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Weniger, K.; Zitterbart, M. Mobile ad hoc networks—Current approaches and future directions. IEEE Netw. 2004, 18, 6–11. [Google Scholar] [CrossRef]
  2. Burleigh, S.; Hooke, A.; Torgerson, L.; Fall, K.; Cerf, V.; Durst, B.; Scott, K. Delay-tolerant networking: An approach to interplanetary internet. IEEE Commun. Mag. 2003, 41, 128–136. [Google Scholar] [CrossRef] [Green Version]
  3. Zhang, Z. Routing in intermittently connected mobile ad hoc networks and delay tolerant networks: Overview and challenges. IEEE Commun. Surv. Tutor. 2006, 8, 24–37. [Google Scholar] [CrossRef] [Green Version]
  4. Khabbaz, M.; Assi, C.M.; Fawaz, W.F. Disruption-Tolerant Networking: A Comprehensive Survey on Recent Developments and Persisting Challenges. IEEE Commun. Surv. Tutor. 2012, 14, 607–640. [Google Scholar] [CrossRef]
  5. Cao, Y.; Sun, Z. Routing in Delay/Disruption Tolerant Networks: A Taxonomy, Survey and Challenges. IEEE Commun. Surv. Tutor. 2013, 15, 654–677. [Google Scholar] [CrossRef] [Green Version]
  6. Zhang, X.; Neglia, G.; Kurose, J.; Towsley, D. Performance modeling of epidemic routing. Comput. Netw. Int. J. Comput. Telecommun. Netw. 2007, 51, 2867–2891. [Google Scholar] [CrossRef]
  7. Spyropoulos, T.; Psounis, K.; Raghavendra, C.S. Spray and wait: An efficient routing scheme for intermittently connected mobile networks. In Proceedings of the ACM SIGCOMM Workshop on Delay-Tolerant Networking (WDTN 2005), Philadelphia, PA, USA, 26 August 2005. [Google Scholar]
  8. Lindgren, A.; Doria, A.; Davies, E.; Grasic, S. Probabilistic Routing Protocol for Intermittently Connected Networks. IRTF RFC 6693, 2012. Available online: https://datatracker.ietf.org/doc/rfc6693/ (accessed on 23 November 2020).
  9. Delay Tolerant Networking Research Group. Available online: https://irtf.org/concluded/dtnrg (accessed on 23 November 2020).
  10. Cu, J.; Cao, S.; Chang, Y.; Wu, L.; Liu, D.; Yang, Y. An adaptive spray and wait routing algorithm based on quality of node in delay tolerant network. IEEE Access 2020, 7, 35274–35286. [Google Scholar] [CrossRef]
  11. Du, Z.; Wu, C.; Yoshinaga, Y.; Ji, Y. A prophet-based DTN for VANETs. In Proceedings of the IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018), Guangzhou, China, 8–12 October 2018. [Google Scholar]
  12. Hong, X.; Gerla, M.; Pei, G.; Chiang, C. A group mobility model for ad hoc wireless networks. In Proceedings of the 2nd ACM International Workshop on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM 1999), Seattle, WA, USA, 20 August 1999. [Google Scholar]
  13. Wang, K.H.; Li, B. Group mobility and partition prediction in wireless ad-hoc networks. In Proceedings of the IEEE International Conference on Communications (ICC 2002), New York, NY, USA, 28 April–2 May 2002. [Google Scholar]
  14. Chen, W.; Dou, L.; Li, Y.; Wei, Y. Ellipse group mobility model for tactical MANET. In Proceedings of the Chinese Control and Decision Conference, Xuzhou, China, 26–28 May 2010. [Google Scholar]
  15. Olajide, T.; Washington, A.N. Epidemic modeling of military networks using group and entity mobility models. In Proceedings of the 5th International Conference on Information Technology: New Generations (ITNG 2008), Fifth, Las Vegas, NV, USA, 7–9 April 2008. [Google Scholar]
  16. Yeo, I.H.; Kim, Y.W.; Rhee, J.M.; Kim, H.A.; Yang, H.S. Performance analysis of routing protocols in mobile ad-hoc networks under group mobility environment. In Proceedings of the 11th International Conference on Advanced Communication Technology (ICACT 2009), Phoenix Park, Korea, 15–18 February 2009. [Google Scholar]
  17. Regragui, Y.; Moussa, N. Dynamics of network connectivity in tactical MANETs. In Proceeding of the International Conference on Advanced Communication Technologies and Networking (CommNet 2018), Marrakech, Morocco, 2–4 April 2018. [Google Scholar]
  18. Xie, L.F.; Chong, P.H.J.; Guan, Y.L.; Ng, B.C. G-ER: Group-epidemic routing for mobile ad hoc networks with buffer sharing mechanism. In Proceedings of the 7th International Wireless Communications and Mobile Computing Conference (IWCMC 2011), Istanbul, Turkey, 4–8 July 2011. [Google Scholar]
  19. Dorge, P.D.; Meshram, S.L. Design and performance analysis of reference point group mobility model for mobile ad hoc network. In Proceedings of the First International Conference on Secure Cyber Computing and Communications (ICSCCC 2018), Jalandhar, India, 15–17 December 2018. [Google Scholar]
  20. Fan, X.; Dong, W. Application of DTN protocol in aircraft cluster network. In Proceedings of the IEEE 20th International Conference on Communication Technology (ICCT 2020), Nanning, China, 28–31 October 2020. [Google Scholar]
  21. Lee, J.S.; Yoo, Y.S.; Choi, H.S.; Kim, T.J.; Choi, J.K. Group connectivity-based UAV positioning and data slot allocation for tactical MANET. IEEE Access 2020, 8, 220570–220584. [Google Scholar] [CrossRef]
  22. Kang, M.W.; Chung, Y.W. A novel DTN protocol for group mobility. In Proceedings of the 11th International Conference on ICT Convergence (ICTC 2020), Jeju, Korea, 21–23 October 2020. [Google Scholar]
  23. Cluster Mobility Model. Available online: https://github.com/akeranen/the-one/blob/master/src/movement/ClusterMovement.java (accessed on 23 November 2020).
  24. Haas, Z.J.; Small, T. A New Networking Model for Biological Applications of Ad Hoc Sensor Networks. IEEE/ACM Trans. Netw. 2006, 14, 27–40. [Google Scholar] [CrossRef] [Green Version]
  25. Kang, M.W.; Seo, D.Y.; Chung, Y.W. An efficient delay tolerant networks routing protocol for information-centric networking. Electronics 2020, 9, 839. [Google Scholar] [CrossRef]
  26. The Opportunistic Network Environment Simulator. Available online: https://www.netlab.tkk.fi/tutkimus/dtn/theone/ (accessed on 23 November 2020).
  27. Keranen, A.; Ott, J.; Karkkainen, T. The ONE simulator for DTN protocol evaluation. In Proceedings of the 2nd International Conference on Simulation Tools and Techniques (SIMUTools 2009): 2nd, Rome, Italy, 2–6 March 2009. [Google Scholar]
  28. Yun, Y.; Xia, Y.; Behdani, B.; Smith, J.C. Distributed algorithm for lifetime maximization in delay-tolerant wireless sensor network with a mobile sink. IEEE Trans. Mob. Comput. 2013, 12, 1920–1930. [Google Scholar] [CrossRef]
Figure 1. A considered group mobility model.
Figure 1. A considered group mobility model.
Electronics 10 00521 g001
Figure 2. A movement model of nodes in a group.
Figure 2. A movement model of nodes in a group.
Electronics 10 00521 g002
Figure 3. Examples of overload control table. (a) Overload control table of nodes z B and w A ; (b) Overload control table of nodes w A and y A ; (c) Overload control table of nodes z B and y A .
Figure 3. Examples of overload control table. (a) Overload control table of nodes z B and w A ; (b) Overload control table of nodes w A and y A ; (c) Overload control table of nodes z B and y A .
Electronics 10 00521 g003
Figure 4. Flowchart of the proposed protocol.
Figure 4. Flowchart of the proposed protocol.
Electronics 10 00521 g004
Figure 5. Delivery ratio for varying buffer size.
Figure 5. Delivery ratio for varying buffer size.
Electronics 10 00521 g005
Figure 6. Overhead ratio for varying buffer size.
Figure 6. Overhead ratio for varying buffer size.
Electronics 10 00521 g006
Figure 7. Delivery latency for varying buffer size.
Figure 7. Delivery latency for varying buffer size.
Electronics 10 00521 g007
Figure 8. Delivery ratio for varying message size.
Figure 8. Delivery ratio for varying message size.
Electronics 10 00521 g008
Figure 9. Overhead ratio for varying message size.
Figure 9. Overhead ratio for varying message size.
Electronics 10 00521 g009
Figure 10. Delivery latency for varying message size.
Figure 10. Delivery latency for varying message size.
Electronics 10 00521 g010
Figure 11. Delivery ratio for varying TTL.
Figure 11. Delivery ratio for varying TTL.
Electronics 10 00521 g011
Figure 12. Overhead ratio for varying TTL.
Figure 12. Overhead ratio for varying TTL.
Electronics 10 00521 g012
Figure 13. Delivery latency for varying TTL.
Figure 13. Delivery latency for varying TTL.
Electronics 10 00521 g013
Table 1. Forwarding conditions of the proposed protocol.
Table 1. Forwarding conditions of the proposed protocol.
CaseGroup of Node xGroup of Node yGroup of Node zForwarding Condition
1 A A A P y , z > P x , z
2 A A B P y , z > P x , z   AND   P g y , G B > P g x , G B
3 A B B P y , z > T p   OR   P g y , G B > T p
4 A B A P y , z > T r   AND   P g y , G A > T r
5 A B C P y , z > P x , z   AND   P g y , G C > P g x , G C
Table 2. Overload control table of the proposed proactive overload control protocol.
Table 2. Overload control table of the proposed proactive overload control protocol.
Message ID (Destination Node ID)Delivery State to a Destination NodeDelivery State to a Node in the Same Group as a Destination NodeState of
Forwarding Permission
m 1 x A Not deliveredNot deliveredPermission
(permitted to forward to any node)
m 2 y A Not deliveredDeliveredLimited permission
(permitted to forward to a destination node only)
m 3 u C DeliveredDeliveredProhibition
(Not permitted to forward to any node)
Table 3. Parameter values.
Table 3. Parameter values.
ParameterValue
Simulation time (s)43,200
Number of simulation iteration50
Transmission range (m)10
Transmission speed (Mbps)2
Mobility modelGroup random waypoint
Node movement distance (m)400
Group speed (m/s)1.0
Number of nodes per group10
Number of groups10
Group range100
Buffer size (Mbytes)10~100 (default: 50)
Message time-to-live (m)60~600 (default: 300)
Message size (Mbytes)U[0.1,0.6]~U[1.0,1.5] (default: U[0.5,1.0])
Message generation interval (s)U[25,35]
T p 0
T r 1
Table 4. Comparison of the proposed protocol with comparable protocols.
Table 4. Comparison of the proposed protocol with comparable protocols.
ProtocolForwarding ConditionOverload Control
Individual DP
-
In Cases 1, 2, and 5, message is forwarded to node y from node x if P y , z > P x , z .
-
In Case 3, message is forwarded to node y from node x if P y , z > T p .
-
In Case 4, message is forwarded to node y from node x if P y , z > T r .
No overload control
Group DPForwarding, as in Table 1No overload control
Group DP + Reactive OCForwarding, as in Table 1Forwarding is prohibited if a message is delivered to a destination node, and the delivered message to a destination node is removed from the buffer of the contact node.
Group DP + Proactive OC
(Proposed)
Forwarding, as in Table 1Forwarding is prohibited if a message is delivered to either a node in a group of a destination node or a destination node. The message delivered to a destination node is removed from the buffer of the contact node. The message delivered to a node in a group of the destination node is not removed from the buffer of contact node but delivered to a destination node only by applying direct delivery.
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Kang, M.W.; Chung, Y.W. An Efficient Routing Protocol with Overload Control for Group Mobility in Delay-Tolerant Networking. Electronics 2021, 10, 521. https://doi.org/10.3390/electronics10040521

AMA Style

Kang MW, Chung YW. An Efficient Routing Protocol with Overload Control for Group Mobility in Delay-Tolerant Networking. Electronics. 2021; 10(4):521. https://doi.org/10.3390/electronics10040521

Chicago/Turabian Style

Kang, Min Wook, and Yun Won Chung. 2021. "An Efficient Routing Protocol with Overload Control for Group Mobility in Delay-Tolerant Networking" Electronics 10, no. 4: 521. https://doi.org/10.3390/electronics10040521

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop