Skip to main content

Improving Message Delivery Performance in Opportunistic Networks Using a Forced-Stop Diffusion Scheme

  • Conference paper
  • First Online:
Ad-hoc, Mobile, and Wireless Networks (ADHOC-NOW 2016)

Abstract

The performance of mobile opportunistic networks strongly depends on contact duration. If the contact lasts less than the required transmission times, some messages will not get delivered, and the whole diffusion scheme will be seriously affected.

In this paper we propose a new diffusion method, called Forced-Stop, that is based on controlling node mobility to guarantee a complete message transfer. Using the ONE simulator and realistic mobility traces, we compared our proposal with the classical Epidemic diffusion. We show that Forced-Stop improves the message delivery performance, increasing the delivery ratio up to 30 %, and reducing the latency of message delivery up to 40 %, with a limited impact on buffer utilisation and message relaying.

These results can be a relevant indication to the designers of opportunistic network applications that could integrate in their products strategies to inform the user about the need to temporarily stop in order to favor the overall data delivery.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Pelusi, L., Passarella, A., Conti, M.: Opportunistic networking: data forwarding in disconnected mobile ad hoc networks. IEEE Commun. Mag. 44(11), 134–141 (2006)

    Article  Google Scholar 

  2. Ferretti, S.: Shaping opportunistic networks. Comput. Commun. 36, 481–503 (2013)

    Article  Google Scholar 

  3. Keränen, A., Ott, J., Kärkkäinen, T.: The ONE simulator for DTN protocol evaluation. In: Proceedings of the Second International ICST Conference on Simulation Tools and Techniques, Rome (2009)

    Google Scholar 

  4. Tsai, T.-C., Chan, H.-H.: NCCU Trace: social-network-aware mobility trace. IEEE Commun. Mag. 53, 144–149 (2015)

    Article  Google Scholar 

  5. AnAverage WhatsApp User Sends Messages per Month, 15 September 2015. http://www.statista.com/chart/1938/monthly-whatsapp-usage-per-user

  6. Niu, J., Guo, J., Cai, Q., Sadeh, N., Guo, S.: predict and spread: an efficient routing algorithm for opportunistic networking. In: Wireless Communications and Networking Conference (WCNC), 2011 IEEE, pp. 498–503, Cancún (2011)

    Google Scholar 

  7. Thakur, G.S., Kumar, U., Helmy, A., Hsu, W.-J.: On the efficacy of mobility modeling for DTN evaluation: analysis of encounter statistics andspatio-temporal preferences. In: 7th International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 510–515, Istanbul (2011)

    Google Scholar 

  8. Warthman, F.: Delay-and Disruption-Tolerant Networks (DTNs) a tutorial, version 2.0. In: The InterPlaNetary (IPN) Internet Project. InterPlanetary Networking Special Interest Group (IPNSIG) (2012)

    Google Scholar 

  9. Battestini, A., Setlur, V., Sohn, T.: A large scale study of text messaging use. In: 12th International Conference on Human Computer Interaction with Mobile Devices and Services MobileHCI, pp. 1–10, Lisbon (2010)

    Google Scholar 

  10. Förster, A., Garg, K., Nguyen, H.A., Giordano, S. On context awareness and social distance in human mobility traces. In: Third ACM International Workshop on Mobile Opportunistic Networks, pp. 5–12, Zürich (2012)

    Google Scholar 

  11. Boldrini, C., Conti, M., Passarella, A.: Modelling data dissemination in opportunistic networks. In: Proceedings of the Third ACM Workshop on Challenged Networks - CHANTS 2008, pp. 89–96, San Francisco (2008)

    Google Scholar 

  12. Natalizio, E., Loscrí, V.: Controlled mobility in mobile sensor networks: advantages, issues and challenges. Telecommun. Syst. 52(4), 2411–2418 (2013)

    Article  Google Scholar 

  13. Neena, V.V., Rajam, V.M.A.: Performance analysis of epidemic routing protocol for opportunistic networks in different mobility patterns. In: 2013 International Conference on Computer Communication and Informatics, pp. 1–5, Coimbatore (2013)

    Google Scholar 

  14. Mehta, N., Shah, M.: Performance evaluation of efficient routing protocols in delay tolerant network under different human mobility models. Int. J. Grid Distrib. Comput. 8(1), 169–178 (2015)

    Article  Google Scholar 

  15. Su, J., Chin, A., Popivanova, A., Goel, A., Lara, E.D.: User mobility for opportunistic ad-hoc networking. In: Sixth IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2004), Low Wood (2004)

    Google Scholar 

  16. Feng, Z., Chin, K.-W.: A unified study of epidemic routing protocols and their enhancements. In: IEEE 26th International Parallel and Distributed Processing Symposium Workshops PhD Forum (IPDPSW), pp. 1484–1493, Shanghai (2012)

    Google Scholar 

  17. Vardalis, D., Tsaoussidis, V.: Exploiting the potential of DTN for energy-efficient internetworking. J. Syst. Softw. 90, 91–103 (2014)

    Article  Google Scholar 

  18. Rango, F.D., Amelio, S., Fazio, P.: Epidemic strategies in delay tolerant networks from an energetic point of view: main issues and performance evaluation. J. Networks 10(01), 4–14 (2015)

    Article  Google Scholar 

  19. Herrera-Tapia, J., Manzoni, P., Hernández-Orallo, E., Calafate, C.T., Cano, J.-C.: Power consumption evaluation in vehicular opportunistic networks. In: IEEE 12th CCNC 2015 Workshops - VENITS, pp. 925–930, Las Vegas (2015)

    Google Scholar 

  20. Erramilli, V., Crovella, M.: Forwarding in opportunistic networks with resource constraints. In: Proceedings of the third ACM workshop on Challenged networks - CHANTS 2008, pp. 41–47, San Francisco (2008)

    Google Scholar 

  21. Fathima, G., Wahidabanu, R.: Buffer management for preferential delivery in opportunistic delay tolerant networks. Int. J. Wirel. Mob. Netw. (IJWMN) 3, 15–28 (2011)

    Article  Google Scholar 

  22. Pan, D., Ruan, Z., Zhou, N., Liu, X., Song, Z.: A comprehensive-integrated buffer management strategy for opportunistic networks. EURASIP J. Wirel. Commun. Netw. 2013(1), 1–10 (2013)

    Article  Google Scholar 

  23. Hernández-Orallo, E., Herrera-Tapia, J., Cano, J.-C., Calafate, C.T., Manzoni, P.: Evaluating the impact of data transfer time in contact-based messaging applications. IEEE Commun. Lett. 19, 1814–1817 (2015)

    Article  Google Scholar 

  24. de Abreu, C.S., Salles, R.M.: Modeling message diffusion in epidemical DTN. Ad Hoc Netw. 16, 197–209 (2014)

    Article  Google Scholar 

Download references

Acknowledgment

This work was partially supported by the Ministerio de Economía y Competitividad, Programa Estatal de Investigación, Desarrollo e Innovación Orientada a los Retos de la Sociedad, Proyectos I+D+I 2014, Spain, under Grant TEC2014-52690-R, the Generalitat Valenciana, Spain, under Grant AICO/2015/108, the Secretaría Nacional de Educación Superior, Ciencia, Tecnología e Innovación del Ecuador (SENESCYT), and the Universidad Laica Eloy Alfaro de Manabí, Ecuador.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jorge Herrera-Tapia .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Herrera-Tapia, J., Hernández-Orallo, E., Tomas, A., Manzoni, P., Calafate, C.T., Cano, JC. (2016). Improving Message Delivery Performance in Opportunistic Networks Using a Forced-Stop Diffusion Scheme. In: Mitton, N., Loscri, V., Mouradian, A. (eds) Ad-hoc, Mobile, and Wireless Networks. ADHOC-NOW 2016. Lecture Notes in Computer Science(), vol 9724. Springer, Cham. https://doi.org/10.1007/978-3-319-40509-4_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-40509-4_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-40508-7

  • Online ISBN: 978-3-319-40509-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics