forwarding redundancy in opportunistic mobile...
TRANSCRIPT
1
Forwarding Redundancy in Opportunistic MobileNetworks: Investigation, Elimination and
ExploitationWei Gao, Member, IEEE, Qinghua Li, Member, IEEE, and Guohong Cao, Fellow, IEEE
AbstractโOpportunistic mobile networks consist of mobile devices which are intermittently connected via short-range radios.Forwarding in such networks relies on selecting relays to carry and deliver data to destinations upon opportunistic contacts. Dueto the intermittent network connectivity, relays in current forwarding schemes are selected separately in a distributed manner. Thecontact capabilities of relays hence may overlap when they contact the same nodes and cause forwarding redundancy. This redundancyreduces the efficiency of resource utilization in the network, and may impair the forwarding performance if being unconsciously ignored.In this paper, based on investigation results on the characteristics of forwarding redundancy in realistic mobile networks, we proposemethods to eliminate unnecessary forwarding redundancy and ensure efficient utilization of network resources. We first developtechniques to eliminate forwarding redundancy with global network information, and then improve these techniques to be operablein a fully distributed manner with limited network information. We furthermore propose adaptive forwarding strategy to intentionallycontrol the amount of forwarding redundancy and satisfy the required forwarding performance with minimum cost. Extensive trace-driven evaluations show that our schemes effectively enhance forwarding performance with much lower cost.
Index TermsโData Forwarding, Opportunistic Mobile Networks, Redundancy, Relay Selection, Adaptability.
โฆ
1 INTRODUCTION
Opportunistic Mobile Networks, also known as De-lay/ Disruption Tolerant Networks (DTNs) [16], consistof hand-held mobile devices such as PDAs, laptops andsmartphones. These devices are connected only intermit-tently when they opportunistically contact each other,i.e., move into the communication range of their short-range radios (e.g., Bluetooth, WiFi). Such intermittentnetwork connectivity can be a result of mobility, devicesparsity or power outage. Examples of such networksinclude groups of individuals moving in disaster re-covery areas, urban sensing [13] and Vehicular Ad-hocNetworks (VANETs) [5].The intermittent network connectivity among mobile
devices makes it difficult to maintain end-to-end com-munication links or global network information. To facil-itate communication in opportunistic mobile networks,node mobility is exploited to let nodes physically carrymessages as relays, which forward messages when theyopportunistically contact other nodes. The key problemis hence how to make effective forwarding decisions, toensure that the messages are carried by relays with the
This work was supported in part by the DOD Grant W911NF-14-1-0262.
โ Wei Gao is with the Department of Electrical Engineering and Com-puter Science, University of Tennessee at Knoxville, 1520 Middle Drive,Knoxville, TN 37996. E-mail: [email protected].
โ Qinghua Li is with the Department of Computer Science and ComputerEngineering, University of Arkansas, Fayetteville, AR 72701. E-mail:[email protected]
โ Guohong Cao is with the Department of Computer Science and Engineer-ing, Pennsylvania State University, Information Science and TechnologyBuilding, University Park, PA 16802. E-mail: [email protected].
best chance to contact their destinations.Forwarding decision in opportunistic mobile networks
consists of two stages. First, the utility of a node forforwarding a message is determined. Due to the lack ofglobal information about how to reach the destination,nodeโs utility is evaluated by predicting the nodeโs capa-bility of contacting others in the future. Various utilityfunctions evaluating such nodes contact capability havebeen proposed based on node mobility pattern [9], [40],stochastic node contact process [30], [2] or social networkconcepts [10], [25], [23]. Second, node utilities are appliedto various forwarding strategies for different tradeoffsbetween forwarding performance and cost. Epidemic[38] and RAPID [2] optimize forwarding performance byutilizing all the nodes and contact opportunities for repli-cating messages. Most strategies only replicate messagesto relays with high utilities and improve forwardingperformance with lower cost.In this paper, we envision that conventional wisdom
has been focusing on developing various relay utilityfunctions or forwarding strategies for opportunistic mo-bile networks, but generally ignore the large amountof forwarding redundancy produced by the current for-warding schemes, i.e., the calculated utility of a relaymay not reflect its actual contribution on forwarding amessage. The major reason for such redundancy is thatthe utility of a relay, in current forwarding schemes, isevaluated separately without considering the existenceof other relays carrying replicas of the same message,and the contact capabilities of relays hence may overlapwith each other. The relays may contact the same nodeat different times in the future, but only the first relay
2
having contacted the destination delivers the message.The capabilities of all other relays contacting this nodeare redundant and wasted.The existence of forwarding redundancy generally
reduces the efficiency of resource utilization in oppor-tunistic mobile networks, because some relays may haveonly little contribution on forwarding the message ifthe forwarding redundancy is unconsciously neglectedand inappropriately grows. Message replicas carried bythese relays ineffectively consume the limited networkresources including channel bandwidth and local storagebuffer, and further impair the performance of forwardingother messages. On the other hand, in application scenar-ios with strict performance requirements such as disasterrecovery or emergency notification, intentionally main-taining and exploiting such redundancy with specificforwarding strategies helps create a sufficient number ofmessage replicas and satisfy the required performancefor forwarding the message.The major focus of this paper, therefore, is to appro-
priately address the impact of forwarding redundancyin opportunistic mobile networks, and make forwardingschemes i) being able to correctly identify and eliminateunnecessary forwarding redundancy from relaysโ utili-ties, so as to improve the efficiency of resource utilizationand forwarding performance in opportunistic mobilenetworks, and ii) being able to adaptively maintain theamount of forwarding redundancy in the network, so asto exploit such forwarding redundancy for satisfying thespecific performance requirements of different mobileapplications. Our basic idea is to develop cost-effectivemethods which identify the nodes that existing relaysare likely to contact in the future, so that forwardingredundancy can be eliminated by avoiding these nodesfrom being contacted again, when the contact capabilitiesof other relays are later evaluated. Such redundancyhence can be further exploited by adaptively adjustingthe criteria of relay selection with respect to the requiredcontact capabilities of relays. More specifically, we madethe following contributions:
โ Investigation. We investigate characteristics of for-warding redundancy from both theoretical and ex-perimental perspectives. We first formulate a the-oretical framework about variations of forwardingperformance and redundancy when message repli-cas are created, and then conduct experimental stud-ies using existing forwarding schemes over real-world mobile network traces. We observe that somemessage replicas contribute little on improving thedelivery ratio, and up to 70% of relaysโ utilities incurrent forwarding schemes are redundant. This re-sult seriously impairs forwarding effectiveness andhighlights the necessity of redundancy elimination.
โ Elimination. The major challenge of eliminating for-warding redundancy is the lack of global networkinformation. This makes it hard to estimate thecumulative contact capability of existing relays anddetermine forwarding redundancy. To address this
challenge, we first propose a scheme to eliminateforwarding redundancy with global network infor-mation, and then make it distributed. We provideformal analysis on the accuracy of distributed re-dundancy elimination, and propose two alternativemethods to correct the possible errors during redun-dancy elimination due to incompleteness of networkinformation. After redundancy elimination, limitedresources at each relay is effectively allocated tomessages according to the relayโs utilities for for-warding them. Evaluation results show that the for-warding performance after redundancy eliminationis improved by 20% with 40% less cost.
โ Exploitation. The exploitation of forwarding redun-dancy is based on the relaysโ utilities after redun-dancy elimination, which reflect the actual contribu-tion of relays for forwarding messages. We designadaptive forwarding strategy to intentionally con-trol the amount of forwarding redundancy in thenetwork, and achieve the delivery ratio required byspecific mobile applications with the minimum cost.This is achieved by adaptively adjusting a messageforwarding threshold at individual relays based onthe up-to-date network condition.
The rest of this paper is organized as follows. Section2 describes our network model and motivation of elimi-nating forwarding redundancy. Based on investigationresults in Section 3, our schemes for eliminating andexploiting forwarding redundancy are described in Sec-tions 4 and 5. The performance of our proposed schemesare evaluated by trace-driven simulations in Section 6.Section 7 reviews related work and Section 8 concludesthe paper.
2 OVERVIEW
2.1 Network Model and Assumptions
Opportunistic contacts among mobile devices are de-scribed by network contact graph (NCG) ๐บ(๐,๐ธ), wherecontact process between nodes ๐, ๐ โ ๐ is modeled as anedge ๐๐๐ โ ๐ธ, and ๐๐๐ only exists if ๐ and ๐ have contactedbefore.We focus on effectively forwarding messages to des-
tinations with minimum cost, measured by the averagenumber of replicas created per message1. We considerthat each relay has only limited resources of channelbandwidth and local buffer. When replicas of multiplemessages are forwarded to the same relay, their prioritiesare determined to maximize the effectiveness of utilizingthe relayโs resources. We assume a well-defined commu-nication mechanism at and below the link layer, and theconsideration of link quality or channel interference isbeyond the scope of this paper.We assume that each message has a finite lifetime ๐ .
Letting the forwarding delay be a random variable ๐ โ1. Each relay only carries one replica of a message, and hence the
number of replicas created for a message is equal to the number ofrelays used for forwarding the message.
3
(a) Network contact graph
S A
S B
A C
(b) Forwarding decisions
Fig. 1. Illustration of forwarding redundancy. Utility ๐ข๐indicates the number of nodes that ๐ contacts, and thevalue within brackets is the value of ๐ข๐ after redundancyelimination. Message is replicated from ๐ to ๐ if ๐ข๐ < ๐ข๐ .
(0,+โ], the expected delay is measured as ๐ผ{๐ โฃ๐ โค ๐ }and the delivery ratio is โ(๐ โค ๐ ). Since the deliveryratio and expected delay are correlated and increasesimultaneously when ๐ increases, in this paper we mea-sure forwarding performance using delivery ratio andwill not evaluate delay separately.
2.2 Motivation
Forwarding redundancy in opportunistic mobile net-works is illustrated by the example in Figure 1. Figure1(a) only shows part of NCG near the data source ๐,and none of the nodes in Figure 1(a) has contacted thedestination, which is far away and not shown in thefigure. In this case, the nodeโs capability of contactingother nodes is used as its utility for forwarding decision2,and forwarding redundancy occurs when the relays ๐ด,๐ต and ๐ถ contact many nodes in common. In particular,when ๐ต receives message replica at time ๐ก2 from ๐ andbecomes a relay, node ๐บ contacted by ๐ต is also contactedby another existing relay ๐ด. Hence, the contact of ๐ต to๐บ is redundant. ๐ตโs utility without such redundancy,measured in number of nodes that ๐ต has contacted,should be 2 instead of 3. Similarly, contacts of relay ๐ถ tonodes ๐ฝ and ๐พ are redundant because of the existenceof ๐ต, and this redundancy reduces ๐ถโs utility from 3 to1.This redundancy, if being unconsciously ignored and
grows inappropriately, may impair the forwarding effec-tiveness. For example, with the existence of ๐ต, replicat-ing message from ๐ด to ๐ถ at time ๐ก3 is ineffective becauseit only increases the cumulative number of nodes thatthe relays contact by (6 โ 5)/5 = 20%, but increases thenumber of message replicas by 33%. ๐ถ may also preventnode ๐น with higher utility from being used as relaywhen forwarding strategy like Delegation [15] is used,due to the โfakeโ high utility of ๐ถ.Elimination of this redundancy is challenging due to
the lack of global network information. When ๐ repli-cates message to ๐ต at time ๐ก2, ๐ด may not know theexistence of relay ๐ต if ๐ด has disconnected with ๐. Hence,
2. Note that nodes ๐ and ๐ are not included in calculating theirutilities when ๐ determines whether to replicate message to ๐. Existingrelays are not included in such calculation either.
when ๐ด determines whether to replicate message to ๐ถat time ๐ก3, the redundancy between ๐ต and ๐ถ on nodes๐ฝ and ๐พ is hard to be eliminated.
2.3 MetricsWe measure forwarding redundancy as follows:
Definition 1: Redundancy percentage ๐๐(๐ก1, ๐ก2) of ๐ ex-isting relays during time period [๐ก1, ๐ก2] is defined as
๐๐(๐ก1, ๐ก2) = 1โ โฃโช๐
๐=1โ๐(๐ก1, ๐ก2)โฃ
/โ๐
๐=1โฃโ๐(๐ก1, ๐ก2)โฃ, (1)
where node ๐ โ โ๐(๐ก1, ๐ก2) if it is contacted by the ๐-th relayduring time period [๐ก1, ๐ก2]. The ๐-th relay belongs to โ๐(๐ก1, ๐ก2).
Forwarding redundancy varies when different utilityfunctions are used for forwarding decision. In general,the utility of node ๐ is calculated as ๐๐ =
โ๐๐=1 ๐๐๐ , where
๐ is number of nodes in the network and ๐๐๐ is thecapability of node ๐ contacting ๐. Utility functions areclassified into two categories according to the networkinformation used to measure ๐๐๐ .The first category is observational utilities, in which ๐๐๐
is measured by direct network observations in the past.These observations include pairwise contact frequency(Freq) [14] and elapsed time since last contact (Elapsed-Time) [11]. Betweenness [17] is also used in social-awareforwarding schemes [25], and defines ๐๐๐ =
โ๐โ1๐=1
๐๐๐(๐)๐๐๐
,where ๐๐๐ is the number of shortest paths between node๐ and ๐ on the NCG and ๐๐๐(๐) is the number of suchpaths passing node ๐. Betweenness hence indicates therelative importance of node ๐ in facilitating communica-tion among other nodes.The second category is probabilistic utilities, where
๐๐๐ indicates pairwise contact probability derived fromnode contact process. PROPHET [30] increases ๐๐๐ by(1โ ๐๐๐) โ ๐๐๐๐๐ก each time when ๐ and ๐ contact3, and CCP[22] defines ๐๐๐ = 1 โ ๐โ๐๐๐๐ where ๐๐๐ is the pairwisecontact rate.These utilities apply to various forwarding strategies.
In Compare-and-Forward [11], [14], a relay replicates mes-sages to nodes with higher utility than itself. Delegation[15] reduces the number of replicas, such that a relayonly replicates message to nodes with higher utility thanany existing relay that it is aware of. In Spray-and-Focus[36], the maximum number of message replicas is fixedand a relay forwards message to another node withoutretaining a local copy.In this paper, we study forwarding redundancy over
various combinations of forwarding strategies and utilityfunctions. Note that there are more forwarding strate-gies and utility functions having been developed thanthe ones mentioned above. Our goal is not to addressforwarding redundancy for each of them, but to demon-strate the general impact of this redundancy on forward-ing performance, as well as the universal methodologyfor practical redundancy elimination.
3. PROPHET proposed in [30] was only used between a relay andthe destination. In this paper we extend it to an arbitrary pair of nodes.
4
(a) Comparing ๐ผ{๐ท๐} and ๐ผ{ ห๐ท๐} (b) Redundancy percentage
Fig. 2. Theoretical variation of delivery ratio and redun-dancy percentage
2.4 Traces
Four sets of opportunistic mobile network traces areused in this paper. They record contacts among mobiledevices with Bluetooth or WiFi interfaces moving insuburban areas (DieselNet [3]), conference site (Infocom[25]) and university campus (MIT Reality [12], UCSD[32]). Bluetooth-enabled devices periodically detect theirpeers nearby, and a contact is recorded when two devicesmove close. WiFi-enabled devices search for nearby WiFiAccess Points (APs) and associate themselves to theAPs with the best signal strength. A contact is recordedwhen two devices are associated to the same AP. Assummarized in Table 1, the four traces differ in theircontact type, network scale and node contact frequency.
3 INVESTIGATION
In this section, we investigate the characteristics of for-warding redundancy from both theoretical and experi-mental aspects. We first provide theoretical insights onvariations of delivery ratio and redundancy percentagewhen the message is being replicated, and then investi-gate these variations on real-world traces listed in Table1. Our findings are summarized as follows, and gen-erally highlight the necessity of eliminating forwardingredundancy in opportunistic mobile networks.
โ Forwarding redundancy widely exists in currentforwarding schemes, and seriously impairs the for-warding effectiveness if not being appropriatelyeliminated.
โ Message delivery ratio and redundancy percentageare closely correlated. Hence, forwarding redun-dancy can be intentionally controlled for satisfyingthe required delivery ratio.
โ The practical variations of delivery ratio and redun-dancy percentage accurately match our theoreticalexpectations.
3.1 Theoretical Framework
3.1.1 Delivery RatioWe assume that a message is generated at time ๐ก0 andexpires at time ๐ก๐, with lifetime ๐ = ๐ก๐ โ ๐ก0. As a result,
the message delivery ratio4 with ๐ relays is
๐ท๐(๐ก0, ๐ก๐) = 1โโ๐
๐=1(1โ ๐๐
๐), (2)
where ๐ is the number of nodes in the network, ๐๐ =โฃโ๐(๐ก๐, ๐ก๐)โฃ and ๐ก๐ is the time when the message is repli-cated to the ๐-th relay. When message is replicated to an-other relay๐ ๐+1,๐ท๐ increases byฮ๐ท๐ = (1โ๐ท๐)โ ๐๐+1
๐ . If๐๐ are i.i.d. stationary random variables with ๐ผ{๐๐} = ๐๐,we have
๐ผ{๐ท๐} = 1โ (1โ ๐๐/๐)๐. (3)
In Eq. (2), both the destination and the nodes in โ๐ areassumed to be uniformly distributed in the network.In social computing applications with community struc-tures, such distribution may be highly skewed. Relayswithin the same community may contact the same nodesand lead to lower delivery ratio. In contrast, โ๐ of relayswithin different communities may not overlap at all.Comparatively, delivery ratio without considering for-
warding redundancy is ๏ฟฝ๏ฟฝ๐ = 1๐ โ โ๐
๐=1 ๐๐ withโ๐
๐=1 ๐๐ โค๐ , and ๐ผ{๏ฟฝ๏ฟฝ๐} = ๐๐๐/๐ . Figure 2(a) illustrates thedifference between ๐ผ{๐ท๐} and ๐ผ{๏ฟฝ๏ฟฝ๐} when ๐ increases.While ๐ผ{๏ฟฝ๏ฟฝ๐} linearly increases with ๐, ๐ผ{๐ท๐} increasesslower. This difference is larger when ๐ increases or ๐๐ issmaller. Since the distribution of node contact capabilityis highly skewed in reality [25], value of ๐๐ is low and theactual delivery ratio is much lower than that indicatedby relaysโ utilities.
TABLE 1Trace summary
Trace DieselNet Infocom MIT Reality UCSDNetwork type WiFi Bluetooth Bluetooth WiFiContact type Direct Direct Direct AP-basedNo. devices 40 78 97 275
Duration (days) 20 4 246 77No. contacts 3,268 182,951 114,046 123,225
No. contacts per 0.102 7.52 0.049 0.021pair per day
3.1.2 Redundancy PercentageThe redundancy percentage of ๐ relays is
๐๐ = 1โ๐ โ ๐ท๐/๐๐,
where ๐ท๐ is defined in Eq. (2) and ๐๐ =โ๐
๐=1 ๐๐. Since๐ผ{ 1
๐๐} โฅ 1
๐๐๐, we have
๐ผ{๐๐} โค 1โ๐ โ ๐ผ{๐ท๐}/(๐๐๐), (4)
and this upper bound is asymptotically tight because๐ผ{๐๐} = 1 โ ๐ โ ๐ผ{๐ท๐}/(๐๐๐) when ๐ is sufficientlylarge. When message is replicated to another relay ๐ ๐+1,๐๐ increases by
ฮ๐๐ = ๐๐+1 โ ๐๐ =๐ โ ๐ท๐
๐๐โ ๐ โ ๐ท๐+1
๐๐ + ๐๐+1
=๐ โ ๐๐+1
๐๐(๐๐ + ๐๐+1)โ (๐ท๐ โ ๐๐
๐(1โ๐ท๐)).
(5)
4. The delivery ratio of a single message equals to its probability tobe delivered to the destination before expiration.
5
Lemma 1: For โ๐ โฅ 1, ฮ๐๐ โฅ 0.
Proof: Consider functions ๐(๐1, ..., ๐๐) =1๐
โ๐๐=1 ๐๐ = ๐๐/๐ and ๐(๐1, ..., ๐๐) =
1โโ๐๐=1(1โ๐๐
๐ )โ๐๐=1(1โ
๐๐๐ )
= ๐ท๐
1โ๐ท๐. For โ๐ โ [1, ๐] we have
โ๐โ๐๐
= 1๐ and โ๐
โ๐๐= 1
๐(1โ๐๐๐ )
โ (1 + ๐(๐1, ..., ๐๐)).Since ๐(0, ..., 0) = ๐(0, ..., 0) = 0, we have๐(๐1, ..., ๐๐) โค ๐(๐1, ..., ๐๐) for โ๐1, ..., ๐๐ โ (0, ๐ ]and the lemma follows.
Lemma 1 shows that forwarding redundancy does notdecrease each time when message is replicated, and thisis also illustrated in Figure 2(b) by using its upper boundin Eq. (4). When ๐๐ increases, a node can be contactedby more relays and hence leads to higher redundancypercentage.We also notice that replicating message to more relays
increases the relay coverage and redundancy percentagesimultaneously. The relationship between the two per-spectives is described by the following theorem.
Theorem 1: When 1 โค ๐๐ < ๐/2 for โ๐ โ [1, ๐], thereexists ๐0 โ [1, ๐ ], such that for โ๐ โค ๐0, ฮ๐๐ โค ฮ๐ท๐, andfor โ๐ > ๐0, ฮ๐๐ > ฮ๐ท๐.
Proof: From Eqs. (2) and (5), we have
ฮ๐๐ โฮ๐ท๐ =๐๐+1(๐ท๐(๐(๐) +๐)โ ๐(๐)))
๐๐(๐๐ + ๐๐+1), (6)
where ๐(๐) = ๐ โ ๐๐+๐2๐+๐๐๐๐+1
๐ and ๐๐ =โ๐
๐=1 ๐๐.Eq. (6) shows that the proof of Theorem 1 is equivalent
to prove that there exactly exists one ๐0 โ (0,โ) suchthat ๐(๐0) โ ๐ท๐0
โ ๐1โ๐ท๐0
= 0. This is proved in the followingsteps.Step 1: Let ๐(๐) = ๐ท๐โ ๐
1โ๐ท๐, and we immediately have
๐(0) = ๐(0) = 0. ๐(1) = ๐ โ ๐1+๐21+๐1๐2
๐ , and ๐(1) = ๐ โ ๐1
๐โ๐1.
Since ๐๐ โ [1, ๐/2) for โ๐ โ [1, ๐], we also have ๐(1) >๐(1).Step 2: It is easy to have โ๐(๐)
โ๐ > 0 and โ๐(๐)โ๐ > 0 for
โ๐.Step 3: Since ๐๐+1 โ [1, ๐/2) and ๐(๐+1)โ ๐(๐) โฅ ๐๐
๐ ,we have โ2๐(๐)
โ๐2 > 0. We also see that โ2๐(๐)โ๐2 โฅ โ2๐(๐)
โ๐2 > 0in the similar way from Eq. (2).The theorem is proved by combining the three steps
above.
Theorem 1 shows that, when the number of messagereplicas is small, each replica has limited forwardingredundancy but considerably increases delivery ratio.However, when message is replicated to more relays, thenewly created replicas gradually become redundant andonly contribute little to the forwarding performance.
3.2 Trace Studies
We investigate the characteristics of forwarding redun-dancy in the traces listed in Table 1. In each experiment,a message is generated with random source and destina-tion over 100 simulation runs for statistical convergence.
(a) Delivery ratio (b) Redundancy percentage
Fig. 3. Delivery ratio and redundancy percentage in dif-ferent traces when message is replicated to more relays
(a) Delivery ratio (b) Redundancy percentage
Fig. 4. Delivery ratio and redundancy percentage in theInfocom trace with different utility functions
A warm-up period is reserved before message is gener-ated, for nodes to collect necessary network informationand calculate their utilities.
3.2.1 Impact of forwarding redundancyWe first vary the number of message replicas using theSpray-and-Focus strategy [36] and the utility function ofCCP [22]. Message lifetime ๐ is adaptively determinedin different traces to ensure that the designated numberof message replicas is created.As shown in Figure 3, both delivery ratio and redun-
dancy percentage increase when more message replicasare created. This increase is determined by the contactpatterns and frequencies of mobile nodes, which aretrace-dependent. In the MIT Reality trace, when thenumber of relays is smaller than 3, redundancy percent-age is lower than 40%, and each message replica notica-bly improves delivery ratio by 10%. However, the other
TABLE 2Curve fitting on delivery ratio
Trace ๐ทmax ๐ fitting errorDieselNet 0.5233 0.2728 1.65ร 10โ3
Infocom 0.5021 0.4182 1.307 ร 10โ3
MIT Reality 0.5402 0.4549 1.077 ร 10โ3
UCSD 0.4893 0.1206 2.48ร 10โ4
6
(a) Correlation in different traces (b) Correlation with different forwardingstrategies
(c) Correlation with different utilities
Fig. 5. Correlation between delivery ratio and redundancy percentage. An inflection point is found in all cases.
6 message replicas being created later only improvedelivery ratio by another 10%, but increase redundancypercentage to 70%. Similar cases are also found in othertraces. These results show that inappropriate growthof forwarding redundancy has only little contributionon forwarding performance but impairs the forwardingeffectiveness.When more message replicas are created, increase of
delivery ratio shown in Figure 3(a) is consistent withour theoretical expectations in Section 3.1. To validatethis consistency, we perform least-square curve fittingon Figure 3(a) using formula ๐ผ{๐ท๐} = ๐ทmax โ (1 โ (1 โ๐)๐) where ๐ = ๐๐/๐ , and results in Table 2 show thatfitting error is lower than 2 ร 10โ3 in all cases. Similarconsistency is also found for redundancy percentage bycomparing Figure 3(b) with Figure 2(b).In Figure 4 we also investigate the impact of dif-
ferent utility functions. Freq and PROPHET lead tolower delivery ratio and higher redundancy becausethey inaccurately measure nodesโ contact capability. CCPand Betweenness perform better, especially when moremessage replicas are created.
3.2.2 Correlation Analysis
We are also interested in the correlation between deliv-ery ratio and redundancy percentage. Figure 5 showsthat the two metrics are closely correlated and increasesimultaneously when message replicas are being created.We notice that there is an inflection point in each curve inFigure 5. Delivery ratio increases faster than redundancypercentage before the inflection point and vice versa.This result also validates our expectation in Theorem 1.As shown in Figure 5(a), the position of inflection pointis mainly determined by node contact frequency and istrace-dependent.The position of inflection point also depends on the
forwarding strategy and utility function being used.Figure 5(b) shows that Compare-and-Forward is lesseffective and Spray-and-Focus performs better, whenCCP is used as the utility function. Similarly, Figure5(c) shows that PROPHET and CCP produce more re-
dundancy than Betweenness does, with the Delegationforwarding strategy.
4 ELIMINATION
In this section, we will eliminate forwarding redundancyfrom the utilities evaluating relaysโ contact capability, soas to prevent this redundancy from affecting forwardingdecision and ensure efficient network resource utiliza-tion.Our basic idea is to keep track of Cumulative Relay
Information (CRI) for each message, which records thecumulative contact capability of relays used for forward-ing the message. The definition of CRI depends on theamount of network information available at individualnodes, and will be described later. When a relay ๐ determines whether to replicate the message to node ๐ด,๐ compares the contact capability of ๐ด with the currentCRI of the message, and checks whether nodes contactedby ๐ด have also been contacted by other relays. If so, thisredundancy is eliminated from ๐ดโs utility, so that ๐ดโsutility reflects its actual contribution on forwarding themessage. Moreover, when replicas of multiple messagesare forwarded to ๐ด with limited resources, their priori-ties are also determined by ๐ดโs utility after redundancyelimination.We first focus on eliminating forwarding redundancy
with complete CRI at the global scope, and then extendthis scheme to be distributed with incomplete CRI main-tained at individual relays. Impact of this incompletenessto redundancy elimination is analyzed and addressedfrom various perspectives.
4.1 Redundancy Elimination with Global CRI
We first assume that each node knows the global CRI. Inpractice, this information can be provided via a specificbackend server, which maintains CRI and connects tonodes via 3G or satellite links5. The global CRI maintains
5. These communication links are generally expensive and haveonly limited bandwidth. Hence, they cannot be used for forwardingmessages.
7
a quantity ๐ถ(๐)๐ for each node ๐, which indicates the
cumulative capability of the current ๐ relays contactingnode ๐. ๐ถ(0)
๐ = 0 for โ๐. Each time when the message isreplicated to another relay ๐ ๐+1, ๐ถ
(๐)๐ for each non-relay
node ๐ is updated as
๐ถ(๐+1)๐ = ๐(๐ถ
(๐)๐ , ๐
(๐+1)๐ ), (7)
where ๐(๐+1)๐ is the capability of ๐ ๐+1 contacting ๐, and
is evaluated when the message is replicated to ๐ ๐+1
without being changed in the future. ๐(โ ) is a utility-dependent function with the following properties:
โ Monotonicity. For โ๐ โ [1, ๐ ], ๐ถ(๐+1)๐ โฅ ๐ถ(๐)
๐ .โ Convexity. For โ๐ โ [1, ๐ ], ๐ถ(๐+1)
๐ โค ๐ถ(๐)๐ + ๐
(๐+1)๐ .
Forwarding redundancy caused by ๐ ๐+1 on node ๐ isidentified as the difference between ๐ถ(๐+1)
๐ and ๐ถ(๐)๐ +
๐(๐+1)๐ . Hence, after redundancy elimination, the utilityof ๐ ๐+1 for forwarding this message is calculated as
๐๐+1 =โ๐
๐=1(๐ถ
(๐+1)๐ โ ๐ถ(๐)
๐ ), (8)
which indicates the actual contribution of ๐ ๐+1 on for-warding the message instead of
โ๐๐=1 ๐
(๐+1)๐ . We design
๐(โ ) for observational and probabilistic utility functions,respectively.
4.1.1 Observational Utilities
For observational utilites including Freq, ElapsedTimeand Betweenness, the contribution of ๐(๐+1)
๐ to ๐ถ(๐+1)๐ is
reduced by the ratio between ๐(๐+1)๐ and ๐ถ(๐)
๐ + ๐(๐+1)๐ ,
i.e.,
๐ถ(๐+1)๐ = ๐ถ
(๐)๐ +
๐(๐+1)๐
๐ถ(๐)๐ + ๐
(๐+1)๐
โ ๐(๐+1)๐ . (9)
Eq. (9) can be interpreted in various ways when beingapplied to different utility functions. For Freq, the chancefor ๐ ๐+1 to provide useful contact capability to node ๐ isproportionally reduced due to the existing contact capa-bility ๐ถ(๐)
๐ . This reduction also applies to ElapsedTime,because the reciprocal of elapsed time since last contactequivalently measures contact frequency by assumingstationary contact process. For example, if two relays๐ด and ๐ต contact node ๐ with the frequency 2 and 8respectively, the cumulative ๐ถ
(2)๐ = 2 + 8ร8
2+8 = 8.4according to Eq. (9). For the third relay ๐ถ contacting ๐with the frequency 6, ๐ถ(3)
๐ = 8.4 + 6ร68.4+6 = 10.9.
For Betweenness, ๐(๐+1)๐ measures the number of nodes
which can communicate with node ๐ via ๐ ๐+1. Be-tweenness in opportunistic mobile networks is usuallycalculated in an ego-centric manner [17]. Forwardingredundancy exists when the neighborhood of ๐ ๐+1 onNCG overlap with that of other relays, and hence canbe calculated similarly using Eq. (9).
(a) Network contact graph.Numbers on the edges are thepairwise contact probabilities.
(b) Message replication. Numbersin the brackets indicate nodesโprobabilistic utilities
Fig. 6. The impact of redundancy elimination in Eq. (10)to forwarding decision with Delegation strategy.
4.1.2 Probabilistic Utilities
For probabilistic utilities including PROPHET and CCP,๐(๐+1)๐ is the probability for ๐ ๐+1 to contact ๐. We assumethat the contact process of each relay is independent, and๐ถ
(๐+1)๐ = 1โโ๐+1
๐=1 (1โ ๐(๐)๐ ). Hence,
๐ถ(๐+1)๐ = 1โ (1 โ ๐ถ(๐)
๐ ) โ (1โ ๐(๐+1)๐ ). (10)
The impact of redundancy elimination on forwardingdecision is illustrated in Figure 6. The utilities of ๐ต and๐ถ are reduced by nearly 50% after their redundancy ofcontacting ๐บ, ๐ฝ and ๐พ has been eliminated, and hencewill not be used as relays due to their low utilities.Instead, ๐ด replicates message to ๐น which is effective tocontact more distinct nodes and has more contributionon forwarding the message.
4.2 Distributed Elimination
When the global CRI is unavailable, each relay maintainsCRI in a distributed manner6, only based on its localinformation about its neighbors on NCG. Due to the lackof end-to-end network connectivity, the CRI maintainedat relays may be incomplete and partially overlap witheach other. For example, in the network shown in Figure6, node ๐ฝ is contacted by three relays ๐ด, ๐ต and ๐ถ. TheCRI about node ๐ฝ maintained at ๐ต includes capabilityof ๐ด and ๐ต contacting ๐ฝ , but the CRI maintained at ๐ถonly includes that of ๐ด and ๐ถ.Due to this possible overlapping, relays need to merge
their maintained CRI when they contact, and the quan-tity ๐ถ
(๐)๐ is insufficient for maintaining CRI in a dis-
tributed manner. In the above example, it is difficult forrelays ๐ต and ๐ถ to correctly identify this overlapping andmerge their CRI to calculate the cumulative capability of๐ด, ๐ต and ๐ถ contacting ๐ฝ .In this case, CRI is maintained in a more fine-grained
level. A relay maintains a list for each non-relay node ๐,and the list records the capability ๐(๐)๐ of each relay ๐ ๐
contacting ๐. When relays ๐ต and ๐ถ in Figure 6 contacteach other, their lists are merged to correctly calculate
6. A relay initializes its CRI as its own contact capability.
8
Fig. 7. Distributed maintenance of CRI based on thenetwork in Figure 6
CRI of node ๐ฝ based on Eqs. (9) or (10), and this processis illustrated in Figure 7.The amount of storage space for maintaining CRI is
related to the number of relays, which is much smallerthan the number (๐ ) of nodes in the network. Forexample, the required space is ๐(๐ โ (log๐)2) whenDelegation strategy is used.
4.3 Accuracy Analysis and Improvement
When CRI is maintained in a distributed manner, accu-racy of redundancy elimination may be impaired dueto incompleteness of CRI. This incompleteness appearswhen a relay is unaware of some other existing relays,and is illustrated in Figure 8(a) which describes forward-ing process as a Message Replication Tree (MRT). With-out loss of generality, we assume that communicationlinks among ๐ 1, ..., ๐ ๐โ1 have broken when messageis replicated to relay ๐ ๐. In Figure 8(a) when messageis replicated from ๐ 3 to ๐ 7, ๐ 7 knows ๐ 2 because ๐ 2
receives message replica earlier from ๐ 1 which is also theparent of ๐ 3 on MRT, but ๐ 7 is unaware of the existenceof ๐ 4 and ๐ 5 because the link between ๐ 1 and ๐ 2 hasbroken. Similarly, neither ๐ 4 nor ๐ 5 knows ๐ 3, ๐ 6 and๐ 7.
Definition 2: The Blind Zone (BZ) ๐น๐ ๐(๐ก) of a relay ๐ ๐
at time ๐ก is defined as a set of relays which receive messagereplica before time ๐ก, such that a relay ๐ ๐ โ ๐น๐ ๐(๐ก) if ๐ ๐ isunaware of the existence of ๐ ๐ at time ๐ก.
The BZs of relay ๐ 5 and ๐ 7 are indicated by dashedcircles in Figure 8(a). Based on this definition, incom-pleteness of CRI at time ๐ก is measured by average sizeof relaysโ BZ as ๐ผ๐ = 1
๐ โ โ๐๐=1 โฃ๐น๐ ๐(๐ก)โฃ, where ๐ is the
number of relays.This incompleteness of CRI may cause false positive
and false negative errors to forwarding decision. First,๐ 5 and ๐ 7 in Figure 8(b) contact node ๐ดwith probability0.5 and 0.6, and the actual utility of ๐ 7 should be 2.2instead of 2.5 according to Eq. (10). When Delegationstrategy is used, ๐ 7 should not receive message replicafrom ๐ 3 because ๐ 6 becomes relay earlier and 2.3 > 2.2.Hence, ๐ 7 is a false positive error. Second, ๐ 3 incorrectlyconsiders that ๐ 7 has the highest utility of 2.5 among
(a) Incomplete CRI at relays. Relaysreceive message replicas from theirparents, and are indexed by theirtime receiving message replica.
(b) ๐ 7: false positive error, ๐ 8:false negative error. Numbers atthe nodes indicate relaysโ proba-bilistic utilities.
Fig. 8. Incompleteness of CRI and its impact on forward-ing decision. Delegation strategy is used.
1
2
3
5
4
1
2 3
4 5
1
2 3
4 5
6 6
6
R R R R R R
1
2 3 4
5 6
R R
Fig. 9. MRTs with 6 relays and different combinations of(๐๐ ,๐พ๐ )
existing relays. This prevents ๐ 8 from becoming a relayand leads to a false negative error.We propose two alternative schemes to address these
errors and improve the accuracy of redundancy elim-ination. First, we pre-regulate the forwarding processbefore message is actually replicated to relays, so asto reduce the chance for errors to occur. Second, weopportunistically adjust relays after they receive messagereplicas, when the errors are detected.
4.3.1 Pre-regulation of Forwarding Process
A relay ๐ ๐ is inevitably blind to relays which receivemessage replica later and not from ๐ ๐ itself. Hence,we focus on ensuring that ๐ ๐ knows all the relays๐ 1, ..., ๐ ๐โ1, i.e., โฃ๏ฟฝ๏ฟฝ๐ ๐
(๐ก)โฃ = โฃ๐น๐ ๐(๐ก) โฉ {๐ 1, ..., ๐ ๐โ1}โฃ = 0
for โ๐ก โฅ ๐๐, where ๐๐ is the time ๐ ๐ receives messagereplica. This is achieved by regulating forwarding pro-cess represented by MRT.โฃ๏ฟฝ๏ฟฝ๐ ๐
(๐ก)โฃ is controlled by two parameters ๐๐ and ๐พ๐ .๐๐ is the maximum number of non-leaf relays at eachlevel of MRT. We let the non-leaf relays at a level of MRThave larger indices than any leaf relay at the same level,and only allow the non-leaf relays to replicate messageand produce new relays. ๐พ๐ is the maximum numberof new relays that a non-leaf relay can produce, and welimit that ๐พ๐ โฅ ๐๐ . MRTs with (๐๐ ,๐พ๐ ) from (1, 1) to(2, 2) are illustrated in Figure 9.
Lemma 2: โฃ๏ฟฝ๏ฟฝ๐ ๐(๐ก)โฃ = 0 for โ๐ โฅ 1 when ๐๐ = 1.
Proof:We prove this lemma by induction over levelsof MRT.
9
Step 1: if ๐ ๐ is at the first level, ๐ = 1 and ๐ 1 is thesource node. The lemma simply holds.Step 2: we suppose that the lemma holds for all the
relays at the ๐-th level. Since ๐๐ = 1, all the relays atthe (๐+1)-th level receive message replica from the sameparent ๐ (๐) at the ๐-th level. For ๐ ๐ at the (๐ + 1)-thlevel, i) it knows all the relays at the upper levels from๐ (๐) because โฃ๏ฟฝ๏ฟฝ๐ (๐)(๐ก)โฃ = 0, ii) it knows all the relays atthe (๐ +1)-th level with smaller index because they alsoreceive message replica from by ๐ (๐). The lemma hencealso holds for ๐ ๐ at the (๐ + 1)-th level.This lemma is proved by combining Steps 1 and 2.
From Lemma 2, we immediately have the followingtheorem considering that โฃ๐น๐ ๐โ1
(๐ก)โฃ = โฃ๐น๐ ๐(๐ก)โฃ = 0.
Theorem 2: When ๐๐ = 1, ๐ผ๐ = (๐โ1)(๐โ2)2๐2 for any
๐พ๐ โฅ 1.
๐ผ๐ increases with ๐พ๐ when ๐๐ > 1. Non-leaf relaysusually have the best capability contacting other nodesand determine which node to be the next non-leaf relay,so to ensure that a sufficient number of message replicasare created.
4.3.2 Posterior Adjustment of Relays
The aforementioned pre-regulation may prevent somerelays from receiving message replica and affect forward-ing performance. Another way is to adjust the relays ina posterior manner, when the false positive and falsenegative errors are detected. These errors are detectedopportunistically when relays contact each other andupdate their maintained CRI.A relay ๐ ๐ autonomously revokes itself by removing
its message replica, when it detects itself as false positive.For this detection, ๐ ๐ memorizes the situation at time๐๐ when it received message replica. Each time when ๐ ๐
contacts another relay and updates its CRI, it recalculatesits utility at time ๐๐. The false positive error is detectedwhen ๐ ๐ realizes that it should not be a relay withthe new utility. In Figure 8(b), ๐ 7 finds that its utilityshould be 2.2 instead of 2.5 when it contacts ๐ 5, andrealizes itself as false positive. After ๐ 7 revoked itself,๐ 5 is responsible for notifying other relays to remove๐ 7โs information from their maintained CRI.Figure 8(b) shows that a false negative error only hap-
pens after a false positive error. After relay ๐ 7 revokesitself, the false negative error on ๐ 8 is detected until ๐ 3
or ๐ 8 is notified about the revocation of ๐ 7. Since ๐ 3
may not be in contact with ๐ 8 by then, ๐ 3 spreads theinformation about this error among existing relays, sothat ๐ 8 receives message replica if it contacts any relaybeing aware of this false negative error.In general, the delay for the errors to be corrected is
determined by both the network scale and node contactpattern. Since the selected relays have good capabilitycontacting other nodes, this delay is expected to be muchshorter than the inter-contact time among mobile nodes.
4.4 Local Allocation of Relay Resources
A relay has only limited local resources. When replicas ofmultiple messages are forwarded to a relay, its resourcesshould be allocated to the appropriate message replicas.Such problem of local resource allocation has been stud-ied in [2], but with the assumption that each message hasequal size. Instead, we propose a generalized solutionbased on the relaysโ utilities after redundancy elimina-tion.When replicas of ๐ messages with sizes ๐ 1, ..., ๐ ๐ are
forwarded from relay ๐ 1 to relay ๐ 2 with buffer size ๐ต,the problem of resource allocation at ๐ 2 is formulatedas
maxโ๐
๐=1๐
(๐)2 ๐ฅ๐ s.t.
โ๐
๐=1๐ ๐๐ฅ๐ โค ๐ต, (11)
where ๐ฅ๐ โ {0, 1} indicate whether the ๐-th messagereplica is forwarded to ๐ 2, and ๐
(๐)2 is utility of ๐ 2
defined in Eq. (8) for forwarding the ๐-th message. Notethat the forwarding redundancy between the existingrelays (including ๐ 1) and ๐ 2 for forwarding the ๐-thmessage has been eliminated from ๐
(๐)2 . Eq. (11) ensures
that ๐ 2โs resources are allocated to the appropriate mes-sage replicas, such that ๐ 2 has the most contributions onforwarding these messages. In practice, since ๐ต and ๐ ๐in Eq. (11) are usually integers in numbers of bytes, Eq.(11) can be solved in pseudo-polynomial time ๐(๐ โ ๐ต)using a dynamic programming approach [31].Due to the limited channel bandwidth and contact
duration, ๐ 1 may not be able to transmit all the messagereplicas selected by Eq. (11) to ๐ 2 before the contact ends.The order for message replicas to be transmitted followstheir order being selected when solving Eq. (11) usingdynamic programming, due to the property of optimalsubstructure of Eq. (11).
5 EXPLOITATION
Elimination of forwarding redundancy improves the ef-fectiveness of network resource utilization and enhancesthe cumulative forwarding performance, but the spe-cific performance requirements for forwarding individ-ual messages may not be satisfied due to the reducednumber of message replicas being created. The exam-ples of such applications include emergency notification,which require reliable and timely message delivery andhave strict requirement on delivery ratio.In this section, based on the capability of eliminating
forwarding redundancy, we develop adaptive forwardingstrategy to exploit such redundancy and satisfy the de-livery ratio required by each message with the minimumnumber of message replicas. We replicates messagesbased on relaysโ utilities after redundancy elimination,and adaptively controls the amount of forwarding re-dundancy according to the required delivery ratio andup-to-date network condition.
10
ยฎยฎ
QRQR UAUA
QR < UAQR < UA
(a) Comparison-based for-warding strategy
(b) Dynamic values of ๐ผ with required de-livery ratio ๐ท = 80%
Fig. 10. Exploitation of forwarding redundancy
5.1 Basic Methodology
When a relay ๐ determines whether to replicate a mes-sage to another node ๐ด, most of current forwardingstrategies can be summarized as a uniform comparison-based framework shown in Figure 10(a). ๐ compares alocal quantity ๐๐ which is called โforwarding thresholdโwith ๐ดโs utility ๐๐ด for forwarding the message, andonly replicates the message to ๐ด if ๐๐ < ๐๐ด. Differentstrategies vary in ๐๐ they use. Compare-and-Forwardmaintains ๐๐ as utility of ๐ , and in Delegation ๐๐ isthe highest utility among all the relays that ๐ is awareof. In all the strategies, the method of calculating andupdating ๐๐ is fixed during forwarding process.Our basic idea for controlling the amount of forward-
ing redundancy is to adaptively adjust ๐๐ at each relay๐ by multiplying ๐๐ with a parameter ๐ผ, as illustratedin Figure 10(a). We assume that message is generated attime 0 and expires at time ๐ . As a result, ๐ผ at time ๐ก๐ โค ๐is determined by the estimated delivery ratio ๏ฟฝ๏ฟฝ(๐ก๐) thatrelays at ๐ก๐ can achieve at ๐ , and the remaining time๐ โ ๐ก๐ for forwarding the message.This exploitation is illustrated in Figure 10(b). Ideally,
more relays receive message replicas when ๐ก๐ elapsesand gradually improve ๏ฟฝ๏ฟฝ(๐ก๐) to the required deliveryratio ๐ท before ๐ , so that ๐ผ โก 1. However, in practicethe increase of ๏ฟฝ๏ฟฝ(๐ก๐) may be different due to the specificnetwork contact pattern, and we adjust ๐ผ accordingly toapproximate ๏ฟฝ๏ฟฝ(๐ก๐) to the ideal case. In Case 1 shown inFigure 10(b) where ๏ฟฝ๏ฟฝ(๐ก๐) at time ๐ก๐ < ๐/2 is already closeto ๐ท, ๐ผ increases to avoid redundant relays. In Case 2where ๏ฟฝ๏ฟฝ(๐ก๐) is too low, ๐ผ decreases to ensure that thereis a sufficient number of relays to achieve ๐ท.Note that we minimize the number of relays used to
achieve ๐ท based on relaysโ utilities after redundancyelimination. Otherwise, without redundancy eliminationin Section 4, ๐ท can still be achieved by reducing ๐ผ butthe number of relays increases due to forwarding redun-dancy among relays. Moreover, increasing ๐ผ or usingfewer relays does not necessarily reduce the amount offorwarding redundancy in the network.The value of ๐ผ is calculated based on the CRI main-
tained at time ๐ก๐ and is used to estimate ๏ฟฝ๏ฟฝ(๐ก๐). Wecalculate ๐ผ as ๐๐ /๐๐ , where ๐๐ is additional number
of relays needed at time ๐ก๐ for achieving ๐ท and ๐๐ isthe estimated number of relays that can receive messagereplica during time period (๐ก๐, ๐ ]. We propose effectiveheuristics to estimate both ๐๐ and ๐๐ at individualrelays, and also exploit periodicity of relaysโ contactcapability for more accurate control of ๐ผ.
5.2 Heuristics
5.2.1 Estimating ๐๐
๐๐ is determined by CRI maintained at time ๐ก๐. Supposethere are ๐ relays a time ๐ก๐, ๏ฟฝ๏ฟฝ(๐ก๐) = 1
๐ โ โ๐๐=1 ๐ถ
(๐)๐
where ๐ถ(๐)๐ is the cumulative capability of the ๐ relays
contacting node ๐. From Section 3 we know that theincrease of actual delivery ratio over ๐ can be modeledas ๐ผ๐ท๐ = ๐ทmax โ (1โ (1โ๐)๐). Each time when we havea new relay ๐ ๐, we update the parameters ๐ทmax and ๐by least-square curve fitting over the estimated ๏ฟฝ๏ฟฝ(๐ก๐),and ๐๐ is calculated as
๐๐ =ln(1 โ ๐ท
๐ทmax)
ln(1โ๐)โ ๐.
5.2.2 Estimating ๐๐
We estimate ๐๐ based on the intervals ๐๐ between thetimes that the ๐-th and (๐ + 1)-th relays receive messagereplica, and we propose two alternatives of heuristics forsuch estimation.The first heuristic is based on the observation in Figure
13(b) that ๐๐ generally increases with ๐. We estimatethe next time interval ๐๐+1 = max
1โค๐โค๐๐๐, and ๐๐ =
(๐ โ ๐ก๐)/๐๐+1.Another alternative is to model the variation of ๐๐ as
an Auto-Regressive (AR) process with the order of ๐ (๐ <๐). A ๐-order AR process is defined as
๐๐ =
๐โ๐=1
๐๐๐๐โ๐ + ๐๐, (12)
where ๐1, ..., ๐๐ are the parameters and ๐๐ is whitenoise. Based on ๐๐ in the past, these parameters canbe estimated either via least-square regression or usingYule-Walker equations [4]. ๐๐ can be estimated by re-cursively calculating these time intervals in the future,until
โ๐๐
๐=๐+1 ๐๐ โฅ ๐ โ ๐ก๐.๐๐ estimated by AR process is generally more accu-
rate, but also requires more information of ๐๐ to estimateparameters in Eq. (12). In practice, the first alternative isused for estimating ๐๐ during initial stage of forward-ing, and is switched to AR process after there are at least๐+ 1 relays.
5.3 Exploitation of Periodicity
The contact patterns among mobile devices are related tohuman behaviors, and lead to periodicity of forwardingperformance and redundancy at various time scales. We
11
(a) DieselNet (b) Infocom (c) MIT Reality (d) UCSD
Fig. 11. Periodicity of delivery ratio and redundancy percentage. The periodicity in the DieselNet and Infocom tracesis at daily scale, and that in the MIT Reality and UCSD traces is at weekly scale.
TABLE 3Parameters of periodicity of delivery ratio
Trace ๐๐ ๐ด ๐ ๐ errorDieselNet 1.117 0.390 0.663 0.248 0.0082Infocom 1.064 0.574 0.6398 0.552 0.0359
MIT Reality 7.036 0.498 4.106 2.891 0.0031UCSD 6.894 0.2696 3.211 1.597 0.0229
exploit such periodicity for more accurate control offorwarding redundancy.We first investigate such periodicity in real-world
traces. We divide each trace into 100 pieces with equaltime length, generate message at the beginning of eachpiece, and investigate delivery ratio and redundancypercentage at the end of piece. This periodicity is shownin Figure 11, with Delegation and Betweenness usedfor forwarding decision. Periodicity of delivery ratio isapproximated by periodic function ๏ฟฝ๏ฟฝ(๐ก) = ๐บ(๐ก mod ๐๐),
where ๐๐ is its period and ๐บ(๐ก) = ๐ดโ ๐โ (๐กโ๐)2
๐2 is Gaussianfunction. Parameters of ๏ฟฝ๏ฟฝ(๐ก) are listed in Table 3, where๐๐ and ๐ are in number of days.Table 3 exhibits periodicity of relaysโ contact capability
and motivates us to adjust ๐๐ according to transientcontact capability of relays during time period [๐ก๐, ๐ ].For example, in the DieselNet and Infocom traces, nodescontact each other more often during daytime and havehigher chances to be used as relays. ๐๐ should beincreased accordingly to reduce the amount of forward-ing redundancy. In contrast, ๐๐ should decrease duringnighttime when node contact capability is low.Our basic idea is to apply an additional coefficient
๐ฝ being multiplied to parameter ๐ผ, and ๐ฝ is calculatedby comparing the transient contact capability of relaysduring [๐ก๐, ๐ ] with their cumulative contact capability.Based on the Gaussian formulation of periodicity de-scribed above, ๐ฝ is calculated as
๐ฝ =2๐๐๐ด๐
โ๐โ 1
๐ โ ๐ก๐
โซ ๐
๐ก๐
๏ฟฝ๏ฟฝ(๐ก)๐๐ก, (13)
where ๐ด๐โ๐/(2๐๐) indicates cumulative contact capa-
bility of relays, becauseโซ ๐๐
0๏ฟฝ๏ฟฝ(๐ก)๐๐ก
.= ๐ด๐
โ๐/2 when
๏ฟฝ๏ฟฝ(๐ โ ๐๐) .= 0 for โ๐ โฅ 0. In practice, parameters of ๏ฟฝ๏ฟฝ(๐ก)are estimated based on ๏ฟฝ๏ฟฝ(๐ก๐), which is calculated fromthe maintained CRI.
6 PERFORMANCE EVALUATION
In this section, we evaluate the performance of ourredundancy elimination schemes, using the realistic mo-bile network traces listed in Table 1. The first half of eachtrace is used for nodes to collect network informationand all the messages are generated at randomized timesafterwards. We assume that the channel bandwidth is 1Mbps (Bluetooth v1.2), and the message size is uniformlydistributed in [10๐๐, 50๐๐]. As reported in [18], most ofcontacts in the traces we use last long enough to transmitat least one message replica. The buffer size of nodesis uniformly distributed in [50๐๐, 500๐๐] so that eachnode can carry at least one message replica.
6.1 Performance of Redundancy Elimination
We first evaluate the performance of redundancy elim-ination with global and distributed CRI. We generate amessage every hour with random source and destina-tion, and the evaluation results over all the messagesare shown in Figure 12, where Betweenness and CCP areused to represent observational and probabilistic utilityfunctions, respectively.Figure 12(b) shows that our schemes effectively elim-
inate forwarding redundancy by more than 50%. Thiselimination enables effective utilization of the relaysโresources, and hence leads to 20% improvement of thecumulative delivery ratio and 40% reduction on theforwarding cost7. Note that the contact capabilities ofselected relays after redundancy elimination may stilloverlap, but this remaining redundancy is very limitedcompared to the useful contact capability provided byrelays. Figure 12 also shows the impact of CRI incom-pleteness to redundancy elimination and forwardingperformance. When CRI is maintained in a distributed
7. We consider the overhead of maintaining CRI as negligible be-cause it only happens when relays contact and the size of CRI metadatais very small compared with the messages being forwarded.
12
(a) Delivery ratio (b) Redundancy Percentage (c) Number of replicas created per message
Fig. 12. Performance of redundancy elimination with global and distributed CRI. Compare-and-Forward strategy isused in the MIT Reality trace. Our schemes eliminate forwarding redundancy by more than 50%, and improve thecumulative delivery ratio by 20% with 40% less cost in number of replicas created per message.
(a) Change of relaysโ utilities (b) Intervals of message replication
Fig. 13. Detailed effects of redundancy elimination
manner at individual relays, the CRI incompletenessincreases redundancy percentage by 10%, and leads to20% increase of forwarding cost.We also evaluated values of relaysโ utilities and in-
tervals of message replication after redundancy elimi-nation, as shown in Figure 13. For each message, weuse the utility and replication interval of the first relayfor normalization. We observe that relaysโ utilities afterredundancy elimination are reduced by up to 40%, andthis is the major reason for reduction of forwarding costshown in Figure 12(c). It also takes longer time for eachmessage to be replicated.
6.2 Effectiveness of Accuracy Improvement
As discussed in Section 4.3, the accuracy of redundancyelimination may be impaired due to CRI incompletenessat individual relays. Various techniques have been pro-posed in Section 4.3 to detect and correct the possibleerrors during redundancy elimination. Such CRI incom-pleteness, which is measured by average size of relaysโBZ, is shown in Figure 14 with Compare-and-Forwardand CCP used for forwarding decision. Figure 14(a)shows that the average BZ size can be up to 35%. Wealso evaluate the effects of pre-regulation of forwarding
(a) BZ sizes in different traces (b) BZ sizes in MIT Reality trace
Fig. 14. Average BZ size of relays
process on reducing the average BZ size, and the resultsare shown in Figure 14(b). As expected by Lemma 2, theaverage BZ size is reduced by up to 50% when ๐๐ = 1,but increases when ๐๐ or ๐พ๐ increases.The performance of error detection and correction
schemes proposed in Section 4.3 are evaluated in Figure15. Figure 15(a) shows that the majority of errors is falsepositive, and false negative errors are only noticeablewhen many message replicas are created. Our schemescan effectively detect both types of errors, and limitthe cumulative error percentage lower than 10%. Figure15(b) also evaluates the delay of error detection. Ob-viously this delay is closely related with data lifetime.When data lifetime is set as 1 week for the MIT Realitytrace, Figure 15(b) shows that both types of errors can bedetected and corrected within 20% of the data lifetime.Using the same strategy and utility function, the per-
formance of schemes proposed in Section 4.3 for improv-ing the accuracy of distributed redundancy eliminationis evaluated in Figure 16. First, by comparing Figure 12and Figure 16, we see that posterior adjustment of relayseffectively corrects errors during distributed redundancyelimination, and improves forwarding performance tothe level of global elimination. Second, Figure 16(b)
13
(a) Delivery ratio (b) Redundancy Percentage (c) Number of replicas created per message
Fig. 16. Performance of improving the accuracy of distributed redundancy elimination in the MIT Reality trace
(a) Performance of error detection (b) Error detection delay
Fig. 15. Performance of error detection in MIT Realitytrace. Data lifetime is set as 1 week (168 hours).
shows that pre-regulation of forwarding process further-more reduces forwarding redundancy over 10%, but italso prevents some relays from receiving message replicaand reduces delivery ratio by 3%. Figure 16 indicatesthat the two schemes have different tradeoff betweenforwarding performance and redundancy, and should beused according to the specific application scenario andrequirements.
6.3 Performance of Redundancy Exploitation
We first evaluate values of ๐ผ in practice, and the resultsin Figure 17 show that values of ๐ผ are proportional to๐ . When ๐ increases to 48 hours, the average value of๐ผ increases over 100%. We notice that values of ๐ผ aregenerally lower than 1 when ๐ โค 12 hours, which meansthat more relays are needed to achieve ๐ท during theshort message lifetime. In contrast, when ๐ = 48 hours,๐ผ quickly increases to avoid redundant relays. Similarly,Figure 17(b) shows that higher ๐ท reduces ๐ผ so that morerelays can be used for forwarding the message.For evaluating the performance of our proposed for-
warding strategy, we use the same experiment settingsas in Section 6.1. The required delivery ratio for eachmessage is uniformly distributed in [0.5๐ท๐๐ฃ๐, 1.5๐ท๐๐ฃ๐],and ๐ท๐๐ฃ๐ varies in our experiments. The evaluation
(a) Different ๐ with ๐ท = 50% (b) Different ๐ท with ๐ = 24 hours
Fig. 17. Values of ๐ผ for achieving the required deliveryratio ๐ท in Infocom trace. Delegation and CCP are usedfor forwarding decision.
results are shown in Figure 18 where Delegation andCCP are used for forwarding decision. When ๐ท๐๐ฃ๐=40%and ๐ โค 12 hours, our strategy creates more messagereplicas to ensure that the required ๐ท can be achieved.When ๐ increases, our strategy avoids redundant relaysand achieves ๐ท with 40% less relays.Comparatively, when ๐ท๐๐ฃ๐=70%, redundancy percent-
age increases to create more message replicas. Figure18(a) shows that the actual delivery ratio only achieves65% due to limited node contact capability. In this case,our strategy ensures that best-effort forwarding perfor-mance is provided.
7 RELATED WORK
The research on data forwarding in DTNs originatesfrom Epidemic routing [38] which floods the entire net-work. Later studies develop data forwarding strategiesto approach the performance of Epidemic routing withlower forwarding cost, which is measured by the numberof data copies created in the network. While the mostconservative approach always keeps a single data copyand Spray-and-Wait [35] holds a fixed number of datacopies, most schemes leave such numbers as dynamicand make data forwarding decision by comparing the
14
(a) Delivery ratio (b) Redundancy Percentage (c) Number of replicas created per message
Fig. 18. Performance of exploiting forwarding redundancy in the Infocom trace. When ๐ท๐๐ฃ๐ = 40%, we furthermorereduce the amount of forwarding redundancy as well as the forwarding cost. When ๐ท๐๐ฃ๐ = 70%, the amount offorwarding redundancy increases to create more message replicas and provides best-effort forwarding performance.
nodesโ utility functions. Representative strategies in-clude Compare-and-Forward [11], [14], Delegation [15]and Spray-and-Focus [36], which were exploited whenstudying forwarding redundancy in this paper. Otherforwarding strategies [37], [39], [8], [29] also aim toachieve various tradeoffs between the data forwardingperformance and cost.The utility functions of mobile nodes, which measure
the nodesโ contact capabilities, are generally indepen-dent from the data forwarding strategies mentionedabove [20]. Various utility functions can be applied tothe same forwarding strategy for different performancerequirements. Some schemes predict node contact ca-pability by estimating their co-location probabilities indifferent ways, such as the Kalman filter [9] and semi-Markov chains [40]. In some other schemes, node contactpattern is exploited as abstraction of node mobilitypattern for better prediction accuracy, based on theexperimental [7], [27] and theoretical [6] analysis onthe node contact characteristics. Such node contacts aredetected via energy-efficient periodic probing methods[1], [21], [24], and the detected contact history is thenused to predict the nodesโ capability of contacting othersin the future. MaxProp [5] estimates the node contactlikelihood based on the contact counts in the past, andPodNet [28] forwards data to nodes based on theirreceived data queries in the past.Social properties of human mobility including cen-
trality and community structures are also exploited forforwarding messages [25], [22]. SimBet [10] uses ego-centric betweenness as relay selection metric, and BUB-BLE Rap [25] considers node centrality hierarchically insocial community structures. [22] exploited both central-ity and social communities for multicasting, and pro-posed Cumulative Contact Probability (CCP) as the util-ity function for data forwarding based on the cumulativenode contact rates and the assumption of exponentialdistribution of pairwise node inter-contact time. SuchCCP metric was also used in this paper. [19] furthermoreextends CCP to the multi-hop network scope.
Social community structure in opportunistic mobilenetworks, on the other hand, is usually used to deter-mine the network scope for evaluating node centrality,and can be detected in a fully distributed manner in var-ious ways [26]. ๐-clique-based [34] method enables thedetection of overlapping communities, and modularity-based method [33] works on weighted network contactgraph. Based on such community detection techniques,BUBBLE Rap [25] exploited social community structuresfor data forwarding in opportunistic mobile networksbased on the cumulative node contact characteristics.Node centrality is evaluated at various network scopesaccording to the community boundary of the destination,and data is hence forwarded in a hierarchical manner.
8 CONCLUSIONS
In this paper, we study forwarding redundancy in op-portunistic mobile networks, which may seriously im-pair the forwarding performance. We investigate itscharacteristics from both theoretical and experimentalperspectives, and propose effective schemes to elimi-nate this redundancy with limited network informa-tion. We furthermore exploit this redundancy adaptivelyto satisfy specific performance requirements of mobileapplications. Extensive trace-driven simulations showthat our schemes effectively improve forwarding perfor-mance with much lower cost.
REFERENCES
[1] M. Bakht, M. Trower, and R. H. Kravets. Searchlight: Wonโt yoube my neighbor? In Proceedings of the 18th annual internationalconference on Mobile Computing and Networking (MobiCom), pages185โ196. ACM, 2012.
[2] A. Balasubramanian, B. Levine, and A. Venkataramani. DTNRouting As a Resource Allocation Problem. In Proceedings ofSIGCOMM, 2007.
[3] A. Balasubramanian, R. Mahajan, A. Venkataramani, B. Levine,and J. Zahorjan. Interactive wifi connectivity for moving vehicles.In Proceedings of ACM SIGCOMM, pages 427โ438, 2008.
[4] G. Box, G. M. Jenkins, and G. C. Reinsel. Time Series Analysis:Forecasting and Control. Prentice-Hall, 3rd edition, 1994.
15
[5] J. Burgess, B. Gallagher, D. Jensen, and B. Levine. Maxprop:Routing for vehicle-based disruption-tolerant networks. Proc.INFOCOM, 2006.
[6] H. Cai and D. Y. Eun. Crossing over the bounded domain: fromexponential to power-law inter-meeting time in manet. Proc.MobiCom, pages 159โ170, 2007.
[7] A. Chaintreau, P. Hui, J. Crowcroft, C. Diot, R. Gass, and J. Scott.Impact of Human Mobility on Opportunistic Forwarding Algo-rithms. IEEE Trans. on Mobile Computing, 6(6):606โ620, 2007.
[8] S. Chen, Y. Li, M. Huang, Y. Zhu, and Y. Wang. Energy-balancedcooperative routing in multihop wireless networks. Wirelessnetworks, 19(6):1087โ1099, 2013.
[9] P. Costa, C. Mascolo, M. Musolesi, and G. Picco. Socially AwareRouting for Publish-Subscribe in Delay-Tolerant Mobile Ad HocNetworks. IEEE Journal on Selected Areas in Communications,26(5):748โ760, 2008.
[10] E. Daly and M. Haahr. Social network analysis for routing indisconnected delay-tolerant MANETs. Proc. MobiHoc, 2007.
[11] H. Dubois-Ferriere, M. Grossglauser, and M. Vetterli. Age mat-ters: efficient route discovery in mobile ad hoc networks usingencounter ages. Proc. MobiHoc, pages 257โ266, 2003.
[12] N. Eagle and A. Pentland. Reality mining: sensing complex socialsystems. Personal and Ubiquitous Computing, 10(4):255โ268, 2006.
[13] J. Eriksson, L. Girod, B. Hull, R. Newton, S. Madden, and H. Bal-akrishnan. The Pothole Patrol: Using a Mobile Sensor Network forRoad Surface Monitoring. In Proceeding of MobiSys. ACM, 2008.
[14] V. Erramilli, A. Chaintreau, M. Crovella, and C. Diot. Diversityof Forwarding Paths in Pocket Switched Networks. In Proceedingsof IMC, pages 161โ174. ACM, 2007.
[15] V. Erramilli, A. Chaintreau, M. Crovella, and C. Diot. DelegationForwarding. Proc. MobiHoc, 2008.
[16] K. Fall. A Delay-Tolerant Network Architecture for ChallengedInternets. Proc. SIGCOMM, pages 27โ34, 2003.
[17] L. Freeman. A set of measures of centrality based on betweenness.Sociometry, 40(1):35โ41, 1977.
[18] W. Gao and G. Cao. On Exploiting Transient Contact Patterns forData Forwarding in Delay Tolerant Networks. In Proceedings ofICNP, 2010.
[19] W. Gao and G. Cao. User-centric data dissemination in disruptiontolerant networks. In Proceedings of INFOCOM, 2011.
[20] W. Gao, G. Cao, T. La Porta, and J. Han. On exploiting tran-sient social contact patterns for data forwarding in delay-tolerantnetworks. IEEE Transactions on Mobile Computing, 12(1):151โ165,2013.
[21] W. Gao and Q. Li. Wakeup scheduling for energy-efficientcommunication in opportunistic mobile networks. In Proceedingsof IEEE INFOCOM, pages 2058โ2066. IEEE, 2013.
[22] W. Gao, Q. Li, B. Zhao, and G. Cao. Multicasting in delay tolerantnetworks: a social network perspective. In Proceedings of MobiHoc,pages 299โ308, 2009.
[23] W. Gao, Q. Li, B. Zhao, and G. Cao. Social-aware multicast indisruption-tolerant networks. IEEE/ACM Transactions on Network-ing, 20(5):1553โ1566, 2012.
[24] W. Hu, G. Cao, S. V. Krishanamurthy, and P. Mohapatra. Mobility-assisted energy-aware user contact detection in mobile socialnetworks. In Proceedings of the IEEE 33rd International Conferenceon Distributed Computing Systems (ICDCS), pages 155โ164, 2013.
[25] P. Hui, J. Crowcroft, and E. Yoneki. Bubble rap: social-basedforwarding in delay tolerant networks. Proc. MobiHoc, 2008.
[26] P. Hui, E. Yoneki, S. Chan, and J. Crowcroft. Distributed commu-nity detection in delay tolerant networks. Proc. MobiArch, 2007.
[27] T. Karagiannis, J.-Y. Boudec, and M. Vojnovic. Power law andexponential decay of inter contact times between mobile devices.Proc. MobiCom, pages 183โ194, 2007.
[28] V. Lenders, G. Karlsson, and M. May. Wireless Ad hoc Podcasting.In Proceedings of SECON, pages 273โ283, 2007.
[29] F. Li, L. Zhao, C. Zhang, Z. Gao, and Y. Wang. Routing withmulti-level cross-community social groups in mobile opportunis-tic networks. Personal and Ubiquitous Computing, 18(2):385โ396,2014.
[30] A. Lindgren, A. Doria, and O. Schelen. Probabilistic routingin intermittently connected networks. ACM SIGMOBILE CCR,7(3):19โ20, 2003.
[31] S. Martello and P. Toth. Knapsack problems: algorithms and computerimplementations. John Wiley & Sons, 1990.
[32] M. McNett and G. Voelker. Access and mobility of wireless PDAusers. ACM SIGMOBILE CCR, 9(2):40โ55, 2005.
[33] M. Newman. Analysis of weighted networks. Physical Review E,70(5), 2004.
[34] G. Palla, I. Derenyi, I. Farkas, and T. Vicsek. Uncovering theoverlapping community structure of complex networks in natureand society. Nature, 435(7043):814โ818, 2005.
[35] T. Spyropoulos, K. Psounis, and C. Raghavendra. Spray and wait:an efficient routing scheme for intermittently connected mobilenetworks. In Proceedings of 2005 ACM SIGCOMM workshop onDelay-tolerant networking, pages 252โ259, 2005.
[36] T. Spyropoulos, K. Psounis, and C. Raghavendra. Efficient routingin intermittently connected mobile networks: The multiple-copycase. IEEE/ACM Transactions on Networking, 16(1):77โ90, 2008.
[37] X. Tie, A. Venkataramani, and A. Balasubramanian. R3: Robustreplication routing in wireless networks with diverse connectivitycharacteristics. In Proceedings of the 17th annual internationalconference on Mobile computing and networking (MobiCom), pages181โ192. ACM, 2011.
[38] A. Vahdat and D. Becker. Epidemic routing for partially connectedad hoc networks. Technical Report CS-200006, Duke University,2000.
[39] S. Wang, M. Liu, X. Cheng, Z. Li, J. Huang, and B. Chen. Hero:A home based routing in pocket switched networks. In WirelessAlgorithms, Systems, and Applications (WASA), pages 20โ30. 2012.
[40] Q. Yuan, I. Cardei, and J. Wu. Predict and relay: an efficientrouting in disruption-tolerant networks. In Proc. MobiHoc, pages95โ104, 2009.
Wei Gao received the BE degree in electricalengineering from the University of Science andTechnology of China in 2005 and the PhD de-gree in computer science from the Pennsylva-nia State University in 2012. He is currently anassistant professor in the Department of Elec-trical Engineering and Computer Science at theUniversity of Tennessee, Knoxville. His researchinterests include wireless and mobile networksystems, mobile social networks, mobile cloudcomputing, and cyber-physical systems. He is a
member of the IEEE.
Qinghua Li received the BE degree from XianJiaotong University, the MS degree from Ts-inghua University, and the PhD degree from ThePennsylvania State University. In 2013, he joinedthe University of Arkansas, where he is currentlyan Assistant Professor in the Department ofComputer Science and Computer Engineering.His research interests are security and privacyin networking and computing systems includingmobile sensing, smart grid, mobile cloud com-puting, and healthcare systems. He is a member
of the IEEE.
Guohong Cao received the BS degree in com-puter science from Xian Jiaotong University andreceived the PhD degree in computer sciencefrom the Ohio State University in 1999. Sincethen, he has been with the Department of Com-puter Science and Engineering at the Pennsyl-vania State University, where he is currently aProfessor. His research interests include wire-less networks, wireless security, vehicular net-works, wireless sensor networks, cache man-agement, and distributed fault tolerant comput-
ing. He has served on the editorial board of IEEE Transactions onMobile Computing, IEEE Transactions on Wireless Communications,IEEE Transactions on Vehicular Technology, and has served on theorganizing and technical program committees of many conferences,including the TPC Chair/Co-Chair of IEEE SRDSโ2009, MASSโ2010,and INFOCOMโ2013. He was a recipient of the NSF CAREER awardin 2001. He is a Fellow of the IEEE.