Skip to main content
Log in

Deploying Throwboxes to Enhance Fault-Tolerance Performance in Delay Tolerant Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Delay Tolerant Networks (DTNs) have attracted various interests these days. Since DTNs are subject to high loss rate, large delay, intermittent connection, and even no end-to-end connectivity, relay nodes, such as throwboxes, are deployed to enhance network performance. Internet-based systems have contemporaneous connectivity between location-distributed nodes, and this does not apply to DTNs. Thus, the traditional relay node deployment strategies are no longer suitable for DTNs. In this paper, we propose a novel strategy, named Connection-2 (\(CO_2\)), to deploy throwboxes to enhance the fault tolerance of DTNs. \(CO_2\) constructs a 2-connected DTN using an approximation algorithm. Every mobile node in the 2-connected DTN can reach another mobile node via two or more node-disjoint paths within its mobility range. While enhancing fault tolerance, the number of throwboxes that \(CO_2\) requires is small. We conduct various experiments based on the simulation of the real Tuscaloosa bus transit system and compare its performance with two popular strategies. Experimental results show that \(CO_2\) is effective.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Soares, V. N. G. J., Farahmand, F., & Rodrigues, J. J. P. C. (2009, July). Improving vehicular delay-tolerant network performance with relay nodes. In Proceedings of Next Generation Internet Networks (NGI’09) (pp. 1–5).

  2. Ivancic, W. D. (2010, March). Security analysis of DTN architecture and bundle protocol specification for space-based networks. In Proceedings of 2010 IEEE aerospace conference (pp. 1–12).

  3. Boucher, M. (2013). Generation InterPlanetary Internet. Available at http://www.spaceref.com/news/viewnews.html?id=87. Accessed January 2013.

  4. Xiao, Y., Peng, M., Gibson, J., Xie, G. G., Du, D., & Vasilakos, T. (2012). Tight performance bounds of multi-hop fair-access for MAC protocols in wireless sensor networks and underwater sensor networks. IEEE Transactions on Mobile Computing, 11(10), 1538–1554.

    Article  Google Scholar 

  5. Han, W., & Xiao, Y. (2016). CO\(_2\): Design fault-tolerant relay node deployment strategy for throwbox-based DTNs. In Proceedings of the 11th international conference on wireless algorithms, systems, and applications (WASA 2016), August 8–10, 2016, Bozeman, Montana, WASA 2016, LNCS 9798 (pp. 37–46).

  6. Rodrigo. (2013). Interplanetary Internet from NASA’s experiment. Available at http://writepass.co.uk/journal/2012/12/interplanetary-internet-from-nasas-experiment/, Accessed February 2013.

  7. Zhang, Y., & Xiao, Y. (2009, August). Primate-inspired scent marking for mobile and static sensors and RFID tags. In Proceedings of 18th international conference on computer communications and networks (ICCCN 2009) (pp. 1–5).

  8. Xiao, Y., Zhang, Y., & Liang, X. (2011, December). Primate-inspired communication methods for mobile and static sensors and RFID tags. In ACM Transactions on Autonomous and Adaptive Systems, 6(4), 26:1–26:37, Article 26.

  9. Zhao, W., Chen, Y., Ammar, M., Corner, M., Levine, B., & Zegura, E. (2006, October). Capacity enhancement using throwboxes in DTNs. In Proceedings of IEEE international conference on mobile adhoc and sensor systems (MASS) (pp. 31–40).

  10. Huh, W. T. (2004). Finding 2-edge connected spanning subgraphs. Operations Research Letters, 32(3), 212–216.

    Article  MathSciNet  MATH  Google Scholar 

  11. Xiao, Y., & Zhang, Y. (2013). A critical line based boundary surveillance strategy in wireless sensor networks. Telecommunication Systems Journal, 52(2), 423–434.

    Google Scholar 

  12. Xiao, Y., & Zhang, Y. (2011, July). Divide- and conquer-based surveillance framework using robots, sensor nodes, and RFID tags. In (Wiley) Wireless communications and mobile computing (WCMC) (Vol. 11, No. 7, pp. 964–979) New York: Wiley.

  13. Fu, B., Xiao, Y., Liang, X., & Chen, C. L. P. (2015). Bio-inspired group modeling and analysis for intruder detection in mobile sensor/robotic networks. IEEE Transactions on Cybernetics, 45(1), 103–115.

    Article  Google Scholar 

  14. Zhang, Y., Xiao, Y., & Bales, K. L. (2009). Primate social systems, scent-marking, and their applications in mobile and static sensor networks. International Journal of Sensor Networks, 5(4), 210–222.

    Article  Google Scholar 

  15. Ibrahim, M., Nain, P., & Carreras, I. (2009, June). Analysis of relay protocols for throwbox-equipped DTNs, In Proceedings of the 7th international symposium on modeling and optimization in mobile, ad hoc, and wireless networks (WiOPT), Seoul Korea (pp. 1–9).

  16. Shahbazi, S., Harwood, A., Karunasekera, S. (2011, March). On placement of passive stationary relay points in delay tolerant networking. In Proceedings of the 25th IEEE international conference on advanced information networking and applications (AINA), Biopolis, Singapore (pp. 764–771).

  17. Yoo, J., Choi, B., & Gerla, M. (2010, October). An opportunistic relay protocol for vehicular road-side access with fading channels. In Proceedings of the 18th IEEE international conference on network protocols (ICNP) (pp. 233–242).

  18. Lo, C. K., Heath, R. W., & Vishwanath, S. (2009). The impact of channel feedback on opportunistic relay selection for hybrid-ARQ in wireless networks. IEEE Transactions on Vehicular Technology, 58(3), 1255–1268.

    Article  Google Scholar 

  19. Cho, S., Choi, W., & Huang, K. (2011). QoS provisioning relay selection in random relay networks. IEEE Transactions on Vehicular Technology, 60(6), 2680–2689.

    Article  Google Scholar 

  20. Song, L. (2011). Relay selection for two-way relaying with amplify-and-forward protocols. IEEE Transactions on Vehicular Technology, 60(4), 1954–1959.

    Article  Google Scholar 

  21. Zhou, M., Cui, Q., Jantti, R., & Tao, X. (2012). Energy-efficient relay selection and power allocation for two-way relay channel with analog network coding. IEEE Communications Letters, 16(6), 816–819.

    Article  Google Scholar 

  22. Xing, K., Wu, W., Ding, L., Wu, L., & Willson, J. (2014). An efficient routing protocol based on consecutive forwarding prediction in delay tolerant networks. International Journal of Sensor Networks, 15(2), 73–82.

    Article  Google Scholar 

  23. Gu, B., & Hong, X. (2011, August). Optimal routing strategy in throw-box based delay tolerant network. In Proceedings of the 6th international ICST conference on communications and networking, Harbin.

  24. Jain, S., Fall, K., & Patra, R. (2004). Routing in a delay tolerant network. In Proceedings of the 2004 ACM conference on applications, technologies, architectures, and protocols for computer communications (SIGCOMM), New York (pp. 145–158)

  25. Wu, J., & Wang, Y. (2012, March). Social feature-based multi-path routing in delay tolerant networks. In Proceedings of the 31st IEEE international conference on computer communications (INFOCOM).

  26. Vahdate, A., & Becker, D. (2000, June). Epidemic routing for partially-connected ad-hoc networks. Duke University, Technical Report CS-2000-06.

  27. Spyropoulos, T., Psounis, K., & Raghavendra, C. S. (2005). Spray and wait: An efficient routing scheme for intermittently connected mobile networks. In Proceedings of the 2005 ACM SIGCOMM workshop on delay-tolerant networking (WDTN’05) (pp. 252–259).

  28. Burgess, J., Gallagher, B., Jensen, D., & Levine, B. N. (2006, April). MaxProp: Routing for vehicle-based disruption-tolerant networks. In Proceedings of the 25th IEEE international conference on computer communications (INFOCOM).

  29. Wu, J., Xiao, M., & Huang, L. (2013). Homing Spread: Community home-based multi-copy routing in mobile social networks. In Proceedings of the 32nd IEEE International Conference on Computer Communications (INFOCOM).

  30. Wang, D., Wu, M., Lv, B., & Li, T. (2017). Exploiting the influence of infostation system on delay-tolerant networks. International Journal of Sensor Networks, 23(2), 87–99.

    Article  Google Scholar 

  31. Li, J., Pan, Y., & Xiao, Y. (2005). Performance study of multiple route dynamic source routing protocols for mobile ad hoc networks. Journal of Parallel and Distributed Computing, 65(2), 169–177.

    Article  MATH  Google Scholar 

  32. Resta, G., & Santi, P. (2012). A framework for routing performance analysis in delay tolerant networks with application to noncooperative networks. IEEE Transactions on Parallel and Distributed Systems, 23(1), 2–10.

    Article  Google Scholar 

  33. Banerjee, N., Corner, M. D., & Levine, B. (2010). Design and field experimentation of an energy-efficient architecture for DTN Throwboxes. IEEE/ACM Transactions on Networking, 18(2), 554–567.

    Article  Google Scholar 

  34. Banerjee, N., Corner, M. D., & Levine, B. (2007, May). An energy-efficient architecture for DTN throwboxes. In Proceedings of the 26th IEEE international conference on computer communications (INFOCOM) (pp. 776–784).

  35. Khouzani, M., Eshghi, S., Sarkar, S., Shroff, N. B., & Venkatesh, S. S. (2012). Optimal energy-aware epidemic routing in DTNs. In Proceedings of the thirteenth ACM international symposium on mobile ad hoc networking and computing (MobiHoc) (pp. 175–182).

  36. Zeng, Y., Wu, J., Xiong, N., & Li, D. (2012). Energy-efficient routing and rate allocation for delay tolerant networks. In Proceedings of the 2nd international workshop on cyber-physical networking systems (CPNS’12, IEEE ICDCS Workshop).

  37. Yang, S., Yeo, C., & Lee, B. (2012, August). CDC: An energy-efficient contact discovery scheme for pocket switched networks. In Proceedings of the 21st international conference on computer communications and networks (ICCCN) (pp. 1–7).

  38. Lu, R., Lin, X., Luan, T., Liang, X., Li, X., Chen, L., & Shen, X. (2012, March). PReFilter: An efficient privacy-preserving relay filtering scheme for delay tolerant networks. In Proceedings of the 31th IEEE international conference on computer communications (INFOCOM), Orlando (pp. 1395–1403).

  39. Keränen, A., & Ott, J. (2007. July). Increasing reality for DTN protocol simulations: Helsinki University of Technology, Networking Laboratory, Technical Report.

  40. Soares, V. N. G. J., Farahmand, F., & Rodrigues, J. J. P. C. (2010). VDTNsim: A simulation tool for vehicular delay-tolerant networks. In Proceedings of the 15th IEEE international workshop on computer aided modeling, analysis and design of communication links and networks (CAMAD).

  41. Soroush, H., Banerjee, N., Balasubramanian, A., Corner, M. D., Levine, B., & Lynn, B. (2009). DOME: A diverse outdoor mobile testbed. In Proceedings of ACM HotPlanet’09, Krakow, Poland.

  42. UMass Diverse Outdoor Mobile Environment (DOME) project, DieselNet (online). Available at: http://prisms.cs.umass.edu/dome/umassdieselnet. Accessed February 2013.

  43. Dias, J., Isento, J., Silva, B., Soares, V., & Rodrigues, J. (2012). Performance assessment of IP over vehicular delay-tolerant networks through the VDTN@Lab testbed. EURASIP Journal on Wireless Communication and Networking, 2012, 13. https://doi.org/10.1186/1687-1499-2012-13.

    Article  Google Scholar 

  44. Mahajan, R., Zahorjan, J., & Zill, B. (2007, October). Understanding WiFi-based connectivity from moving vehicles. In Proceedings of the 7th ACM SIGCOMM conference on internet measurement (IMC’07), San Diego (pp. 321–326).

  45. Research, M. (2013). VanLan: Investigating Connectivity from Moving Vehicles, (online). Available at: http://research.microsoft.com/en-us/projects/vanlan/. Accessed February 2013.

  46. CarTel (online). Available: http://cartel.csail.mit.edu/doku.php, Accessed February 2013.

  47. Bychkovsky, V., Chen, K., Goraczko, M., Hu, H., Hull, B., Miu, A., et al. (2006, November). The CarTel mobile sensor computing system, In Proceedings of the 4th ACM Conference on Embedded Networked Sensor Systems (ACM SenSys’06), Boulder (pp. 383–384).

  48. Eriksson, J., Balakrishnan, H., & Madden, S. (2008, September). Cabernet: Vehicular content delivery using WiFi, In Proceedings of the 14th ACM international conference on mobile computing and networking (MobiCom’08), San Francisco (pp. 199–210).

  49. Drive-thru Internet (online). Available at: http://www.drive-thru-internet.org/index.html. Accessed January 2013.

  50. Ott, J., & Kutscher, D. (2005, March). A disconnection-tolerant transport for drive-thru internet environments. In Proceedings of the IEEE conference on computer communications (INFOCOM’05), Miami (pp. 1849–1862).

  51. Wu, Z., Xiong, N., Han, W., Huang, Y. N., Hu, C. Y., Gu, Q., & Hang, B. (2013). A fault-tolerant method for enhancing reliability of services composition application in WSNs based on BPEL. International Journal of Distributed Sensor Networks, Article ID 493678.

  52. Zeng, H., Zhang, J., & Dai, G. (2013). Construction of low weighted and fault-tolerant topology for wireless ad hoc and sensor network. International Journal of Sensor Networks, 14(4), 197–210.

    Article  Google Scholar 

  53. Zhou, Y., Wang, X., Wang, T., Liu, B., & Sun, W. (2016). Fault-tolerant multi-path routing protocol for WSN based on HEED. International Journal of Sensor Networks, 20(1), 37–45.

    Article  Google Scholar 

  54. Wu, Z., Xiong, N., Han, W., Hu, C., Gu, Q., & Hang, B. (2013). A fault-tolerant method for enhancing reliability of services composition application in WSNs based on BPEL. Technical Report.

  55. Hao, B., Tang, J., Xue, G. (2004, August). Fault-tolerant relay node placement in wireless sensor networks: Formulation and approximation. In Proceedings of workshop on high performance switching and routing (HPSR) (pp. 246–250).

  56. Zhang, W., Xue, G., & Misra, S. (2007, May). Fault-tolerant relay node placement in wireless sensor networks: Problems and algorithms. In Proceedings of the 26th IEEE international conference on computer communications (INFOCOM) (pp. 1649–1657).

  57. Dandekar, D. R., & Deshmukh, P. R. (2012). Fault-tolerant relay placement in wireless sensor networks using particle swarm optimization. Intelligent and Soft Computing, 130, 749–757.

    Article  Google Scholar 

  58. Sitanayah, L., Brown, K. N., & Sreenan, C. J. (2012). Fault-tolerant relay deployment based on length-constrained connectivity and rerouting centrality in wireless sensor networks. In Proceedings of the 9th European conference on wireless sensor networks (EWSN’12) (pp. 115–130).

  59. Zhang, J., Tang, J., Wang, T., & Chen, F. (2017). Energy-efficient data-gathering rendezvous algorithms with mobile sinks for wireless sensor networks. International Journal of Sensor Networks, 23(4), 248–257.

    Article  Google Scholar 

  60. Xue, Y., Jiang, J., Zhao, B., & Ma, T. (2017). A self-adaptive artificial bee colony algorithm based on global best for global optimization. Soft Computing. https://doi.org/10.1007/s00500-017-2547-1.

  61. Zhang, Y., Sun, X. G., & Wang, B. (2016). Efficient algorithm for K-barrier coverage based on integer linear programming. China Communications, 13(7), 16–23.

    Article  Google Scholar 

  62. Tuscaloosa Bus Transit Routes Map. (2013). Available at: http://www.tuscaloosatransit.com/nss-folder/scrapbook/Overlaying%20Route%20Map.pdf. Accessed February 2013.

  63. Yuanming, W. (2017). An energy-balanced loop-free routing protocol for distributed wireless sensor networks. International Journal of Sensor Networks, 23(2), 123–131.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yang Xiao.

Appendices

Appendix A

1.1 Proof of Theorem 1

Proof

We prove it with mathematical induction.

Firstly, we prove that the DTN \(G_1(V_1,E_1,S_1,P_1)\) constructed in the first round by \(CO_2\), e.g., \(n=1\) round, is 2-connected.

According to \(CO_2\), the vertex set \(V_1\) of \(G_1\) consists of the relay nodes in two node disjoint paths from \(u_0\) to \(u'\), and the mobile nodes covered by these relay nodes includes the following

$$ V_1 = \{u_0\}\cup Q_{u'} \cup C(q'), $$
(14)

where \(q' \in \{u_0\}\cup Q_{u'}\). Since all the relay throwboxes are in the two paths from \(u_0\) to \(u'\), and the two paths are node disjoint, when one of the throwboxes fails, the others can still communicate with each other via one or multiple hops. Thus the throwbox set is 2-connected according to Definition 3. Now we only need to prove that each mobile node b in \(C(q')\), where \(q'\) in \( \{u_0\}\cup Q_{u'}\) can directly communicate with at least two throwboxes, according to Definition 4. Since \(u'\) is chosen according to Eq. (6), let’s define

$$ w = min(c(b,Q_{u}),2-label(b)), $$
(15)

where u is each node in U.

w only has three values: 0, 1 and 2.

  1. 1.

    When \(c(b,Q_{u}) = 2-label(b) = 2\), \(w =2\), which means that the mobile nodes are covered by \(Q_{u'}\) twice and are not covered by \(u_0\).

  2. 2.

    When \(c(b,Q_{u}) = 1\) and \(2-label(b) \ge 1\), or \(c(b,Q_{u}) \ge 1\) and \(2-label(b) = 1\), \(w =1\), which means that the mobile nodes are covered at least once by both \(u_0\) and \(Q_{u'}\).

  3. 3.

    When \(c(b,Q_{u}) = 0\) or \(2-label(b) = 0\), \(w =0\), which means that the mobile nodes are either not covered by \(u_0\) or are covered by \(Q_{u'}\) twice.

Since in Eq. (6), we choose the node with the largest value, all mobile nodes are covered twice by the 2-connected throwboxes.

Now define the constructed DTN as \(G_1\). Add a virtual node \(v'\) into \(G_1\) and connect \(v'\) with each node in R. The constructed throwbox set is 2-connected and the relay node \(u''\) has two node disjoint paths to \(v'\), which means that \(u''\) can be connected to the throwbox set via two node-disjoint routes. Thus, the new throwbox set is also 2-connected.

We define the mobile nodes set covered by \(V_1\) as \(C(V_1)\) and the mobile nodes covered by \(V_1 \cup u''\) as \(C(V'_1)\).

  1. 1.

    If \(C(V_1) = C(V'_1) \), each mobile node b can directly communicate with at least two throwboxes in \(V_1 \cup u''\), because it can directly communicate with at least two throwboxes in \(V_1\).

  2. 2.

    If \(C(V_1) \not = C(V'_1) \), for each mobile node b in \(C(V'_1) - C(V_1)\), it satisfies Eqs. (9) and (15). w can only have three values: 0, 1 and 2 according to Eq. (15). As proved above, b can be covered twice by the throwbox set if it satisfies Eq. (15) with the largest value of w.

Thus, each mobile node b covered by \(V'_1\) can directly communicate with at least two throwboxes in \(V'_1\).

Therefore when \(n=1\), the DTN is 2-connected. Note that as the assumption, the possible solution is included in the unchosen location set U.

Secondly, assume that the DTN \(G_k(V_k,E_k,S_k,P_k)\) constructed in the \(n = k\) round by \(CO_2\) is 2-connected, we prove that the DTN \(G_{k+1}(V_{k+1},E_{k+1},S_{k+1},P_{k+1})\) constructed in the \(n = k+1\) round by \(CO_2\) is also 2-connected.

Add a virtual node \(v'\) into \(G_k\), and connect \(v'\) with each node in R. Since

  1. 1.

    the throwbox set constructed in \(n = k\) round is 2-connected, because the DTN \(G_k(V_k,E_k,S_k,P_k)\) is 2-connected;

  2. 2.

    the relay node \(u''\) found in \(k+1\) round has two node disjoint paths to \(v'\), which means that \(u''\) can be connected to the throwbox set via two node-disjoint routes;

The throwbox set constructed in \(k+1\) round is also 2-connected. Now we only need to prove that each mobile node b covered by \(V_{k+1}\) can directly communicate with at least two throwboxes in \(V_{k+1}\).

We define the mobile nodes set covered by \(V_k\) as \(C(V_k)\) and the mobile nodes covered by \(V_{k+1}\) as \(C(V_{k+1})\).

  1. 1.

    If \(C(V_k) = C(V_{k+1}) \), each mobile node b can directly communicate with at least two throwboxes in \(V_{k+1}\), because it can directly communicate with at least two throwboxes in \(V_k\).

  2. 2.

    If \(C(V_k) \not = C(V_{k+1}) \), for each mobile node b in \(C(V_{k+1}) - C(V_k)\), it satisfies Eqs. (9) and (15). w can only have three values: 0, 1 and 2 according to Eq. (15). As proved above, b can be covered twice by the throwbox set if it satisfies Eq. (15) with the largest value of w.

Thus, each mobile node b covered by \(V_{k+1}\) can directly communicate with at least two throwboxes in \(V_{k+1}\).

Therefore, when the DTN \(G_k(V_k,E_k,S_k,P_k)\) constructed in the \(n = k\) round by \(CO_2\) is 2-connected, the DTN \(G_{k+1}(V_{k+1},E_{k+1},S_{k+1},P_{k+1})\) constructed in the \(n = k+1\) round by \(CO_2\) is also 2-connected.

Now, we have proved that the DTN G(VESP) constructed by \(CO_2\) is 2-connected.\(\square \)

Appendix B

1.1 Proof of Theorem 2

Proof

As previously defined, \(B = \{b_1,b_2,\ldots ,b_i,\ldots ,b_n \}\) is the set of mobile nodes. As shown in Fig. 13, \(B^1\) and \(B^2\) are 2 copies of B, where \(B^j = \{b_1^j,b_2^j,\ldots ,b_i^j,\ldots ,b_n^j\}\), \(i\in [1,n]\), and \(j\in [1,2]\). U is the set of unchosen possible locations of relay throwboxes. \(R_{min} = \{r^*_1, r^*_2, \ldots , r^*_i, \ldots , r^*_{min}\}\) is a minimal 2-connected throwbox set. \(R_{CO_2} = \{r_1, r_2, \dots , r_i, \ldots , r_{CO_2}\}\) is the throwbox set chosen by the proposed \(CO_2\) algorithm, and \(|R_{CO_2}| \ge |R_{min}|\). Their edge sets are \(E_{min}\) and \(E_{CO_2}\), respectively.

$$ |R_{CO_2}| < \mathcal O(D\ln n) |R_{min}|. $$
(16)
Fig. 13
figure 13

The 2-connected DTN graph constructed by \(CO_2\) shown on the right side and the corresponding minimal 2-connected DTN shown on the left side

For each \(b_i^j \in B^1 \cup B^2\), we define

$$ w(b^j_i) = |Q \cap U|/C(Q), $$
(17)

where Q is the throwbox set of two disjoint paths and C(Q) is the mobile node set covered by Q, as previously defined.

Assume that \(CO_2\) can find a solution \(R_{CO_2}\) after M steps. Then we have

$$ |R_{CO_2}| = \quad \underset{m=1}{\overset{M}{\sum }}|Q_m \cup U|. $$
(18)

Since \(|Q \cap U| = w(b^j_i)C(Q)\), according to Eq. (17), we get

$$ |R_{CO_2}| = \quad \underset{m=1}{\overset{M}{\sum }}\quad \underset{b^j_i covered \, by \, Q_m}{\sum }w(b^j_i) C(Q_m). $$
(19)

From Step 1 to Step M, \(CO_2\) has covered all the nodes in \(U^1\) and \(U^2\), thus

$$ \underset{m=1}{\overset{M}{\sum }}\quad \underset{b^j_i covered \, by \, Q_m}{\sum }w(b^j_i) C(Q_m) = \quad \underset{b^j_i\in B^1\cup B^2}{\sum }w(b^j_i). $$
(20)

Then we can obtain

$$ |R_{CO_2}| = \quad \underset{b^j_i\in B^1\cup B^2}{\sum }w(b^j_i). $$
(21)

Because all the nodes in \(U^1\) and \(U^2\) are also covered by previously assumed algorithm with a minimal 2-connected solution \(R_{min}\), as shown on the left side of Fig. 13, then

$$\begin{aligned} {\begin{matrix} \quad \underset{b^j_i\in B^1\cup B^2}{\sum }w(b^j_i) &{}= \quad \underset{r^*_i \in R_{min}}{\sum } \quad \underset{b^j_i covered \, by \, r^*_i}{\sum }w(b^j_i)\\ &{} = |R_{min}| \quad \underset{b^j_i covered \, by \, r^*_i}{\sum }w(b^j_i). \end{matrix}} \end{aligned}$$
(22)

Now, \(|R_{CO_2}|\) and \(|R_{min}|\) have a relationship as follows:

$$ |R_{CO_2}| = |R_{min}| \! \quad \underset{b^j_i covered \, by \, r^*_i}{\sum }w(b^j_i). $$
(23)

Let define

$$ {\mathscr {W} }= \quad \underset{b^j_i covered \, by \, r^*_i}{\sum }w(b^j_i), $$
(24)

and discuss its range. Because of Eq. (17) and that the step number of getting \(R_{min}\) is not larger than getting \(R_{CO_2}\),

$$ {\mathscr {W}} \le \underset{m=1}{\overset{M}{\sum }}(|B_{m-1}|-|B_m|)\frac{|Q_m \cap U|}{C(Q_m)}, $$
(25)

where \(|B_m|\) is the number of uncovered neighbor nodes of \(Q_m\) after Step m, \(B_m \in B^1 \cup B^2\). Note that they are only uncovered neighbor nodes, not all uncovered nodes in B.

Since \(C(Q_m) \ge |B{m-1}|\) and \(|Q_m \cap U|\le D\),

$$ \mathscr {W} \le D \underset{m=1}{\overset{M}{\sum }}\frac{|B_{m-1}|-|B_m|}{|B_{m-1}|}. $$
(26)

Actually \(|B{m-1}|-|B_m|\) is the newly covered number of nodes in Step m. Thus

$$ 1 \le |B_{m-1}|-|B_m| \le |B_0|. $$
(27)

The best situation occurs when all nodes are covered in the first step, that is

$$ \underset{m=1}{\overset{M}{\sum }}\frac{|B_{m-1}|-|B_m|}{|B_{m-1}|} = 1. $$
(28)

The worst situation occurs when only one node is covered in each step. Thus

$$ \mathscr {W} \le D \left( \frac{1}{|B_0|} + \frac{1}{|B_0|-1} + \frac{1}{|B_0|-2} + \cdots + 1\right). $$
(29)

Let define

$$\begin{aligned} f= & {} \underset{n \rightarrow \infty }{\lim }(\underset{k=1}{\overset{n}{\sum }}{\frac{1}{k}} - \ln {(n)})\nonumber \\= & {} \underset{n \rightarrow \infty }{\lim }(1 + \frac{1}{2} + \frac{1}{3} + \cdots + \frac{1}{n} - \ln {(n)})\nonumber \\= & {} \underset{n \rightarrow \infty }{\lim }(\underset{k=1}{\overset{n}{\sum }}\frac{1}{k} - \int ^n_1 \! \frac{1}{x} \, \mathrm {d} x)\nonumber \\= &\, {} \gamma \nonumber \\\approx\,&\, {} 0.577. \end{aligned}$$
(30)

Thus,

$$\begin{aligned} \underset{k=1}{\overset{n}{\sum }}{\frac{1}{k}}&\approx {} \int ^n_1 \! \frac{1}{x} \, \mathrm {d} x + \gamma \nonumber \\&= {} \gamma + \ln x\nonumber \\&< {} 1+\ln x. \end{aligned}$$
(31)

Therefore, according to Eqs. (29) (31), we have

$$ \mathscr {W} < \,D(1+\ln |B_0|). $$
(32)

Now put \(\mathscr {W}\) into Eqs. (23) (24), we can obtain

$$ |R_{CO_2}| <\, D(1+\ln |B_0|)|R_{min}| $$
(33)

And since \(|B_0| \le n\), where n is the number of mobile nodes, we get

$$ |R_{CO_2}| <\, D(1+\ln n)|R_{min}|. $$
(34)

Then Eq. (16) is established. Therefore, to construct a 2-connected DTN with \(CO_2\) strategy, the time complexity is \(\mathcal O(D\log n)\) times of constructing a minimal 2-connected DTN.\(\square \)

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Han, W., Xiao, Y. Deploying Throwboxes to Enhance Fault-Tolerance Performance in Delay Tolerant Networks. Wireless Pers Commun 99, 1247–1278 (2018). https://doi.org/10.1007/s11277-017-5183-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-017-5183-2

Keywords

Navigation