Abstract
Transmission control is a challenging problem in vehicular delay-tolerant networks because the network has a high vehicle mobility which leads to a dynamic and unreliable network connectivity. In this paper, we propose a COoperative Transmission control Scheme using erasure coding (COTS) to improve the transmission efficiency. In this scheme, the cooperative message distribution algorithm uses delivery capacities to decide the transmission direction and traffic. Besides, the cooperative task scheduling algorithm sets the transfer order for messages from both sides. This algorithm uses a comprehensive parameter, the number of data blocks to send, to simplify the computation of transmission priority. After analyzing the vehicle transmission behavior under different storage conditions, we apply local deleting and creating behaviors instead of sending and receiving behaviors in specific states to decrease communication overhead. Simulation results show that COTS, compared with other well-known schemes, not only increases the delivery ratio but also decreases the delivery latency and the transmission overhead.
Similar content being viewed by others
References
Misra S, Krishna PV, Saritha V (2013) LACAV: an energy-efficient channel assignment mechanism for vehicular ad hoc networks. J Supercomput 62(3):1241–1262
Ott J, Kutscher D (2005) A disconnection-tolerant transport for drive-thru internet environments. In: Proceedings of IEEE INFOCOM’05, March, Miami, USA
Yu H, Ma J, Bian H (2012) Reasonable routing in delay/disruption tolerant networks. Front Comput Sci 5(3):327–334
Wu Y, Deng S, Huang H (2013) Optimal management of dynamic information in delay tolerant networks. J Supercomput. doi:10.1007/s11227-013-0909-8
Soares VNGJ, Farahmand F, Rodrigues J (2009) A layered architecture for vehicular delay-tolerant networks. In: Proceedings of IEEE ISCC’09. Sousse, Tunisia, July, pp 122–127
Lu X, Pan H, Lio P (2012) High delivery performance opportunistic routing scheme for delay tolerant networks. China Commun 9(6):145–153
Tang X, Pu J, Gao Y, Alshehri MAZ, Xiong Z, Wan Y (2013) Knowledge-based replica deletion scheme using directional anti-packets for vehicular delay-tolerant networks. Trans Emerg Telecommun Technol. doi:10.1002/ett.2685
Niyato D, Wang P (2009) Optimization of the mobile router and traffic sources in vehicular delay-tolerant network. IEEE Trans Veh Tech 58(9):5095–5104
Weatherspoon H, Kubiatowicz J (2002) Erasure coding vs. replication: a quantitative comparison. In: Proceedings of IPTPS’02, London, UK, pp 328–338
Wang Y, Jain S, Martonosi M, Fall K (2005) Erasure-coding based routing for opportunistic networks. Proceedings of ACM SIGCOMM WDTN’05. USA, August, Philadelphia, pp 229–236
Vahdat A, Becher D (2000), Epidemic routing for partially connected ad hoc networks. Duke University, Technical, Report CS-200006, April
Spyropoulos T, Psounis K, Raghavendra CS (2005) Spray and wait: an efficient routing scheme for intermittently connected mobile networks. In: Proceedings of ACM SIGCOMM WDTN’05, August, USA, Philadelphia, pp 252–259
Lindgren A, Doria A, Schelen O (2003) Probabilistic routing in intermittently connected networks. ACM SIGMOBILE Mob Comput Commun Rev 7(3):19–20
Burgess J, Gallagher B, Jensen D, Levine BN (2006) MaxProp: routing for vehicle-Based disruption-tolerant networks. In: Proceedings of IEEE INFOCOM’06, April, Barcelona, Spain
Xu M, Song WZ, Zhao Y (2011) Opportunistic network erasure coding in disruptive sensor networks. In: Proceedings of IEEE MASS’11, October, Valencia, Spain, pp 685–690
Bulut E, Wang Z, Szymanski BK (2010) Cost efficient erasure coding based routing in delay tolerant networks. In: Proceedings of IEEE ICC’10, May, Cape Town, South Africa
Wicker SB, Bhargava VK (eds) (1999) Reed–Solomon codes and their applications. Wiley, New York
Barry JR (2001) Low-density parity-check codes. Georgia Institute of Technology, Atlanta
MacKay DJC (2005) Fountain codes. IEE Proc Commun 152(6):1062–1068
Luby M (2002) LT codes. In: Proceedings of IEEE FOCS’02, November, Vancouver, Canada
Shokrollahi A (2006) Raptor codes. IEEE Trans Inf Theory 52(6):2551–2567
Tsapeli F, Tsaoussidis V (2012) Routing for opportunistic networks based on probabilistic erasure coding. In: Proceedings of WWIC’12, Greece, June, pp 257–268
Lu H, Liao W (2012) Cooperative multicasting in network-coding enabled multi-rate wireless relay networks. Proceedings of IEEE INFOCOM’12. Orlando, USA, March, pp 334–342
Yang J, Fei Z (2011) Statistical filtering based broadcast protocol for vehicular networks. In: Proceedings of IEEE ICCCN’11, Maui, Hawaii, USA, July, pp 1–6
Yan Q, Li M, Yang Z, Lou W, Zhai H (2012) Throughput analysis of cooperative mobile content distribution in vehicular network using symbol level network coding. IEEE J Sel Areas Commun 30(2):484–492
Liao Y, Zhang Z, Ryu B, Gao L (2007) Cooperative robust forwarding scheme in DTNs using erasure coding. In: Proceedings of IEEE MILCOM’07, October, Orlando, USA
Zhang L, Lakas A, El-Sayed H, Barka E (2013) Mobility analysis in vehicular ad hoc network (VANET). J Netw Comput Appl 36(3):1050–1056
Blum JJ, Natarajan R, Eskandarian A (2011) Synchronization challenges in media access coordination for vehicular ad hoc networks. Wirel Commun Mob Comput 11(7):954–963
Keranen A, Ott J, Karkkainen T (2009) The ONE simulator for DTN protocol evaluation. In: Proceedings of SIMUTOOL’09, March, Rome, Italy
Tang X, Pu J, Cao K, Zhang Y, Xiong Z (2012) Integrated extensible simulation platform for vehicular sensor networks in smart cities. Int J Distrib Sens Netw. doi:10.1155/2012/860415
Giordano E, Frank R, Pau G, Gerla M (2011) CORNER: a radio propagation model for VANETs in urban scenarios. Proc IEEE 99(7):1280–1294
Arshad SA, Murtaza MA, Tahir M (2012) Fair buffer allocation scheme for integrated wireless sensor and vehicular networks using markov decision processes. In: Proceedings of IEEE TVC Fall’12, September, Quebec City, Canada
Ekici E, Akyildiz IF, Bender MD (2001) A distributed routing algorithm for datagram traffic in LEO satellite networks. IEEE/ACM Trans Netw 9(2):137–147
Baheti R, Gill H (2011) Cyber-physical Systems. The Impact of Control Technology, IEEE, pp 161–166
Eisenman SB, Miluzzo E, Lane ND, Peterson RA, Ahn GS, Campbell AT (2009) BikeNet: a mobile sensing system for cyclist experience mapping. ACM Trans Sens Netw 6(1)
Acknowledgments
We gratefully acknowledge the support from China’s Natural Science Foundations (61272350 & 61173009), the National High Technology Research and Development Program of China (2013AA01A601), the International S&T Cooperation Program of China (2010DFB13350), the Science Foundation of Shenzhen City in China (JCYJ20120618170520900), the State Key Laboratory of Software Development Environment (SKLSDE-2013ZX-27) and the Innovation Foundation of BUAA for PhD Graduates.
Author information
Authors and Affiliations
Corresponding author
Appendix
Appendix
Proposition 1
In the cooperative message distribution algorithm, the expected number of coded blocks carried by node 1 in Eq. (2) is accurate.
Proof
Assume node 1 and node 2 are two meeting vehicles in the cooperative message distribution algorithm. Let \(\mathrm{CD}_1\) and \(\mathrm{CD}_2\) be their capacities of delivering a given data message, respectively. Considering the positiveness (or negativeness) of the weight \(w_i\) in Eq. (1) shows the positive (or negative) correlation with the delivery capacity, \(\mathrm{CD}_1\) and \(\mathrm{CD}_2\) may also be positive or negative. We compute the expected number of coded blocks according to the signs of these capacities below.
We use the delivery capacities and the current storage states in both sides to compute the expected storage states. The current numbers of data blocks in nodes 1 and 2 are \(\mathrm{Count}_1\) and \(\mathrm{Count}_2\), respectively. Take the expected number of coded blocks of this message in node 1, \(\mathrm{Count}_1^{'}\), as an instance. We analyze different cases in detail below. The computation of \(\mathrm{Count}_2^{'}\) for node 2 can be done in a similar way.
-
1.
When \(\mathrm{CD}_1=CD_2=0\), nodes 1 and 2 are independent with the delivery of this data message. As zero is better than negative values, it is still used in the block distribution. For these two nodes have the same capacity to deliver the blocks, we distribute the data blocks equally in the neighborhood, expressed as \(\mathrm{Count}_1^{'}=\frac{1}{2}(Count_1+Count_2)\).
-
2.
When \(\mathrm{CD}_1>0\) and \(\mathrm{CD}_2 \ge 0\), since the sum of these two capacities is positive, the data blocks are distributed in proportion to each node’s delivery capacity. Thus node 1 gets its part at the ratio of \(\mathrm{CD}_1\) to the sum capacity, as \(\mathrm{Count}_1^{'}=\frac{\mathrm{CD}_1}{\mathrm{CD}_1+\mathrm{CD}_2}(\mathrm{Count}_1+\mathrm{Count}_2)\).
-
3.
When \(\mathrm{CD}_1 \ge 0\) and \(\mathrm{CD}_2 <0\), it implies that node 2 interrupts the delivery of this data message, while node 1 does well to deliver the message. In order to avoid negative effects of node 2, we distribute all the blocks in the neighborhood to node 1. That is, \(\mathrm{Count}_1^{'}=\mathrm{Count}_1+\mathrm{Count}_2\).
-
4.
When \(\mathrm{CD}_1<0\) and \(\mathrm{CD}_2 \ge 0\) or \(\mathrm{CD}_1=0\) and \(\mathrm{CD}_2>0\), node 1 is not helpful to delivery this message (\(\mathrm{CD}_1=0\)) or even interrupts the delivery (\(\mathrm{CD}_1<0\)), while node 2 does well. In order to avoid negative effects of node 1, all the blocks are distributed to node 2. In other words, node 1 gets no blocks, shown as \(\mathrm{Count}_1^{'}=0\).
-
5.
When \(\mathrm{CD}_1<0\) and \(\mathrm{CD}_2<0\), both nodes 1 and 2 disturb the data delivery. However, the interruptions have different extents. The smaller the capacity is, the stronger the negative impact is. Thus less blocks should be distributed to the node having a smaller capacity. We distribute blocks at the reverse ratio of the capacities as \(\mathrm{Count}_1^{'}=\frac{\mathrm{CD}_2}{\mathrm{CD}_1+\mathrm{CD}_2}(\mathrm{Count}_1+\mathrm{Count}_2)\).
To sum up, these cases have covered all the possibilities of the capacities. It works well to compute \(\mathrm{Count}_1^{'}\) and \(\mathrm{Count}_2^{'}\) in nodes 1 and 2. Comparing the current and expected storage states, we get \(\mathrm{Count}_1^{'}+\mathrm{Count}_2^{'}=\mathrm{Count}_1+\mathrm{Count}_2\). Thus the total blocks in the neighborhood are distributed at two sides simultaneously. Therefore, Eq. (2) is accurate to compute the expected number of blocks carried by node 1 in the cooperative message distribution algorithm. \(\square \)
Proposition 2
\(\mathrm{TCount}\) is a suitable substitute for the local and neighbor parameters Prob and Count in the cooperative task scheduling algorithm.
Proof
As shown in Eq. (5), we construct the mathematical model of transmission priority of a given data message. Let node 1 and node 2 be two meeting vehicles. Assume \(\mathrm{TCount}_1>0\), which means that node 1 should send \(\mathrm{TCount}_1\) blocks of this message to node 2. Other cases when \(\mathrm{TCount}_2>0\) can be analyzed similarly. Denote the parameters from node 1 as \(\mathrm{Prob}_1\) and \(\mathrm{Count}_1\), and those from node 2 as \(\mathrm{Prob}_2\) and \(\mathrm{Count}_2\).
First, we qualitatively analyze the effects of \(\mathrm{Prob}_1\), \(\mathrm{Prob}_2\), \(\mathrm{Count}_1\) and \(\mathrm{Count}_2\) on the transmission priority of this message from node 1 to node 2.
Larger \(\mathrm{Prob}_1\) indicates a higher probability for the sender node 1 to deliver these blocks by itself. Thus node 1 has a smaller chance to forward these blocks to its neighbor. In other words, \(\mathrm{Prob}_1\) has a negative correlation with the transmission priority of this message from node 1 to node 2. Similarly, \(\mathrm{Prob}_2\) shows a positive correlation since a larger probability of the receiver node 2 to deliver these blocks prompts the data transmission from node 1 to node 2.
Larger \(\mathrm{Count}_1\) indicates that node 1 has more data blocks. As data dissemination is helpful for the data delivery, larger \(\mathrm{Count}_1\) requires more data transfers to others, to improve the cover range of these blocks. Thus \(\mathrm{Count}_1\) shows positive correlation with the priority. Similarly, \(\mathrm{Count}_2\) has a negative effect on the priority, since sufficient blocks in node 2 prohibit the extra transmission from node 1 to node 2. Therefore, it is concluded that the weights of \(\mathrm{Prob}_2\) and \(\mathrm{Count}_1\) in Eq. (5) should be positive, while those of \(\mathrm{Prob}_1\) and \(\mathrm{Count}_2\) should be negative.
Next we analyze Eq. (9) to check out the sign of each parameter. Note that Eq. (9) can be simplified as \(\mathrm{CT}=a \times \mathrm{TTL} +b \times \mathrm{TCount}\) where \(a>0, b>0\). By Eq. (4), we get
From Eqs. (11), (12), we derive that \(\mathrm{Prob}_2\) and \(\mathrm{Count}_1\) have positive correlations with CT, while \(\mathrm{Prob}_1\) and \(\mathrm{Count}_2\) have negative correlations, which are in accordance with the previous theoretical analysis. Therefore, we conclude that \(\mathrm{TCount}\) is a suitable substitute of the local and neighbor parameters Prob and Count in the cooperative task scheduling algorithm. \(\square \)
Rights and permissions
About this article
Cite this article
Tang, X., Pu, J., Ma, K. et al. Cooperative transmission control scheme using erasure coding for vehicular delay-tolerant networks. J Supercomput 68, 1462–1486 (2014). https://doi.org/10.1007/s11227-014-1101-5
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-014-1101-5