forwarding redundancy in opportunistic mobile...

15
1 Forwarding Redundancy in Opportunistic Mobile Networks: Investigation, Elimination and Exploitation Wei Gao, Member, IEEE, Qinghua Li, Member, IEEE, and Guohong Cao, Fellow, IEEE Abstractโ€”Opportunistic mobile networks consist of mobile devices which are intermittently connected via short-range radios. Forwarding in such networks relies on selecting relays to carry and deliver data to destinations upon opportunistic contacts. Due to the intermittent network connectivity, relays in current forwarding schemes are selected separately in a distributed manner. The contact capabilities of relays hence may overlap when they contact the same nodes and cause forwarding redundancy. This redundancy reduces the ef๏ฌciency of resource utilization in the network, and may impair the forwarding performance if being unconsciously ignored. In this paper, based on investigation results on the characteristics of forwarding redundancy in realistic mobile networks, we propose methods to eliminate unnecessary forwarding redundancy and ensure ef๏ฌcient utilization of network resources. We ๏ฌrst develop techniques to eliminate forwarding redundancy with global network information, and then improve these techniques to be operable in a fully distributed manner with limited network information. We furthermore propose adaptive forwarding strategy to intentionally control the amount of forwarding redundancy and satisfy the required forwarding performance with minimum cost. Extensive trace- driven evaluations show that our schemes effectively enhance forwarding performance with much lower cost. Index Termsโ€”Data Forwarding, Opportunistic Mobile Networks, Redundancy, Relay Selection, Adaptability. โœฆ 1 I NTRODUCTION Opportunistic Mobile Networks, also known as De- lay/ Disruption Tolerant Networks (DTNs) [16], consist of hand-held mobile devices such as PDAs, laptops and smartphones. These devices are connected only intermit- tently when they opportunistically contact each other, i.e., move into the communication range of their short- range radios (e.g., Bluetooth, WiFi). Such intermittent network connectivity can be a result of mobility, device sparsity or power outage. Examples of such networks include groups of individuals moving in disaster re- covery areas, urban sensing [13] and Vehicular Ad-hoc Networks (VANETs) [5]. The intermittent network connectivity among mobile devices makes it dif๏ฌcult to maintain end-to-end com- munication links or global network information. To facil- itate communication in opportunistic mobile networks, node mobility is exploited to let nodes physically carry messages as relays, which forward messages when they opportunistically contact other nodes. The key problem is hence how to make effective forwarding decisions, to ensure that the messages are carried by relays with the This work was supported in part by the DOD Grant W911NF-14-1-0262. โˆ™ Wei Gao is with the Department of Electrical Engineering and Com- puter Science, University of Tennessee at Knoxville, 1520 Middle Drive, Knoxville, TN 37996. E-mail: [email protected]. โˆ™ Qinghua Li is with the Department of Computer Science and Computer Engineering, University of Arkansas, Fayetteville, AR 72701. E-mail: [email protected] โˆ™ Guohong Cao is with the Department of Computer Science and Engineer- ing, Pennsylvania State University, Information Science and Technology Building, University Park, PA 16802. E-mail: [email protected]. best chance to contact their destinations. Forwarding decision in opportunistic mobile networks consists of two stages. First, the utility of a node for forwarding a message is determined. Due to the lack of global information about how to reach the destination, nodeโ€™s utility is evaluated by predicting the nodeโ€™s capa- bility of contacting others in the future. Various utility functions evaluating such nodes contact capability have been proposed based on node mobility pattern [9], [40], stochastic node contact process [30], [2] or social network concepts [10], [25], [23]. Second, node utilities are applied to various forwarding strategies for different tradeoffs between forwarding performance and cost. Epidemic [38] and RAPID [2] optimize forwarding performance by utilizing all the nodes and contact opportunities for repli- cating messages. Most strategies only replicate messages to relays with high utilities and improve forwarding performance with lower cost. In this paper, we envision that conventional wisdom has been focusing on developing various relay utility functions or forwarding strategies for opportunistic mo- bile networks, but generally ignore the large amount of forwarding redundancy produced by the current for- warding schemes, i.e., the calculated utility of a relay may not re๏ฌ‚ect its actual contribution on forwarding a message. The major reason for such redundancy is that the utility of a relay, in current forwarding schemes, is evaluated separately without considering the existence of other relays carrying replicas of the same message, and the contact capabilities of relays hence may overlap with each other. The relays may contact the same node at different times in the future, but only the ๏ฌrst relay

Upload: others

Post on 05-Jul-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Forwarding Redundancy in Opportunistic Mobile โ€ฆcsce.uark.edu/~qinghual/papers/tmc-redundancy-weigao.pdf1 Forwarding Redundancy in Opportunistic Mobile Networks: Investigation, Elimination

1

Forwarding Redundancy in Opportunistic MobileNetworks: Investigation, Elimination and

ExploitationWei Gao, Member, IEEE, Qinghua Li, Member, IEEE, and Guohong Cao, Fellow, IEEE

Abstractโ€”Opportunistic mobile networks consist of mobile devices which are intermittently connected via short-range radios.Forwarding in such networks relies on selecting relays to carry and deliver data to destinations upon opportunistic contacts. Dueto the intermittent network connectivity, relays in current forwarding schemes are selected separately in a distributed manner. Thecontact capabilities of relays hence may overlap when they contact the same nodes and cause forwarding redundancy. This redundancyreduces the efficiency of resource utilization in the network, and may impair the forwarding performance if being unconsciously ignored.In this paper, based on investigation results on the characteristics of forwarding redundancy in realistic mobile networks, we proposemethods to eliminate unnecessary forwarding redundancy and ensure efficient utilization of network resources. We first developtechniques to eliminate forwarding redundancy with global network information, and then improve these techniques to be operablein a fully distributed manner with limited network information. We furthermore propose adaptive forwarding strategy to intentionallycontrol the amount of forwarding redundancy and satisfy the required forwarding performance with minimum cost. Extensive trace-driven evaluations show that our schemes effectively enhance forwarding performance with much lower cost.

Index Termsโ€”Data Forwarding, Opportunistic Mobile Networks, Redundancy, Relay Selection, Adaptability.

โœฆ

1 INTRODUCTION

Opportunistic Mobile Networks, also known as De-lay/ Disruption Tolerant Networks (DTNs) [16], consistof hand-held mobile devices such as PDAs, laptops andsmartphones. These devices are connected only intermit-tently when they opportunistically contact each other,i.e., move into the communication range of their short-range radios (e.g., Bluetooth, WiFi). Such intermittentnetwork connectivity can be a result of mobility, devicesparsity or power outage. Examples of such networksinclude groups of individuals moving in disaster re-covery areas, urban sensing [13] and Vehicular Ad-hocNetworks (VANETs) [5].The intermittent network connectivity among mobile

devices makes it difficult to maintain end-to-end com-munication links or global network information. To facil-itate communication in opportunistic mobile networks,node mobility is exploited to let nodes physically carrymessages as relays, which forward messages when theyopportunistically contact other nodes. The key problemis hence how to make effective forwarding decisions, toensure that the messages are carried by relays with the

This work was supported in part by the DOD Grant W911NF-14-1-0262.

โˆ™ Wei Gao is with the Department of Electrical Engineering and Com-puter Science, University of Tennessee at Knoxville, 1520 Middle Drive,Knoxville, TN 37996. E-mail: [email protected].

โˆ™ Qinghua Li is with the Department of Computer Science and ComputerEngineering, University of Arkansas, Fayetteville, AR 72701. E-mail:[email protected]

โˆ™ Guohong Cao is with the Department of Computer Science and Engineer-ing, Pennsylvania State University, Information Science and TechnologyBuilding, University Park, PA 16802. E-mail: [email protected].

best chance to contact their destinations.Forwarding decision in opportunistic mobile networks

consists of two stages. First, the utility of a node forforwarding a message is determined. Due to the lack ofglobal information about how to reach the destination,nodeโ€™s utility is evaluated by predicting the nodeโ€™s capa-bility of contacting others in the future. Various utilityfunctions evaluating such nodes contact capability havebeen proposed based on node mobility pattern [9], [40],stochastic node contact process [30], [2] or social networkconcepts [10], [25], [23]. Second, node utilities are appliedto various forwarding strategies for different tradeoffsbetween forwarding performance and cost. Epidemic[38] and RAPID [2] optimize forwarding performance byutilizing all the nodes and contact opportunities for repli-cating messages. Most strategies only replicate messagesto relays with high utilities and improve forwardingperformance with lower cost.In this paper, we envision that conventional wisdom

has been focusing on developing various relay utilityfunctions or forwarding strategies for opportunistic mo-bile networks, but generally ignore the large amountof forwarding redundancy produced by the current for-warding schemes, i.e., the calculated utility of a relaymay not reflect its actual contribution on forwarding amessage. The major reason for such redundancy is thatthe utility of a relay, in current forwarding schemes, isevaluated separately without considering the existenceof other relays carrying replicas of the same message,and the contact capabilities of relays hence may overlapwith each other. The relays may contact the same nodeat different times in the future, but only the first relay

Page 2: Forwarding Redundancy in Opportunistic Mobile โ€ฆcsce.uark.edu/~qinghual/papers/tmc-redundancy-weigao.pdf1 Forwarding Redundancy in Opportunistic Mobile Networks: Investigation, Elimination

2

having contacted the destination delivers the message.The capabilities of all other relays contacting this nodeare redundant and wasted.The existence of forwarding redundancy generally

reduces the efficiency of resource utilization in oppor-tunistic mobile networks, because some relays may haveonly little contribution on forwarding the message ifthe forwarding redundancy is unconsciously neglectedand inappropriately grows. Message replicas carried bythese relays ineffectively consume the limited networkresources including channel bandwidth and local storagebuffer, and further impair the performance of forwardingother messages. On the other hand, in application scenar-ios with strict performance requirements such as disasterrecovery or emergency notification, intentionally main-taining and exploiting such redundancy with specificforwarding strategies helps create a sufficient number ofmessage replicas and satisfy the required performancefor forwarding the message.The major focus of this paper, therefore, is to appro-

priately address the impact of forwarding redundancyin opportunistic mobile networks, and make forwardingschemes i) being able to correctly identify and eliminateunnecessary forwarding redundancy from relaysโ€™ utili-ties, so as to improve the efficiency of resource utilizationand forwarding performance in opportunistic mobilenetworks, and ii) being able to adaptively maintain theamount of forwarding redundancy in the network, so asto exploit such forwarding redundancy for satisfying thespecific performance requirements of different mobileapplications. Our basic idea is to develop cost-effectivemethods which identify the nodes that existing relaysare likely to contact in the future, so that forwardingredundancy can be eliminated by avoiding these nodesfrom being contacted again, when the contact capabilitiesof other relays are later evaluated. Such redundancyhence can be further exploited by adaptively adjustingthe criteria of relay selection with respect to the requiredcontact capabilities of relays. More specifically, we madethe following contributions:

โˆ™ Investigation. We investigate characteristics of for-warding redundancy from both theoretical and ex-perimental perspectives. We first formulate a the-oretical framework about variations of forwardingperformance and redundancy when message repli-cas are created, and then conduct experimental stud-ies using existing forwarding schemes over real-world mobile network traces. We observe that somemessage replicas contribute little on improving thedelivery ratio, and up to 70% of relaysโ€™ utilities incurrent forwarding schemes are redundant. This re-sult seriously impairs forwarding effectiveness andhighlights the necessity of redundancy elimination.

โˆ™ Elimination. The major challenge of eliminating for-warding redundancy is the lack of global networkinformation. This makes it hard to estimate thecumulative contact capability of existing relays anddetermine forwarding redundancy. To address this

challenge, we first propose a scheme to eliminateforwarding redundancy with global network infor-mation, and then make it distributed. We provideformal analysis on the accuracy of distributed re-dundancy elimination, and propose two alternativemethods to correct the possible errors during redun-dancy elimination due to incompleteness of networkinformation. After redundancy elimination, limitedresources at each relay is effectively allocated tomessages according to the relayโ€™s utilities for for-warding them. Evaluation results show that the for-warding performance after redundancy eliminationis improved by 20% with 40% less cost.

โˆ™ Exploitation. The exploitation of forwarding redun-dancy is based on the relaysโ€™ utilities after redun-dancy elimination, which reflect the actual contribu-tion of relays for forwarding messages. We designadaptive forwarding strategy to intentionally con-trol the amount of forwarding redundancy in thenetwork, and achieve the delivery ratio required byspecific mobile applications with the minimum cost.This is achieved by adaptively adjusting a messageforwarding threshold at individual relays based onthe up-to-date network condition.

The rest of this paper is organized as follows. Section2 describes our network model and motivation of elimi-nating forwarding redundancy. Based on investigationresults in Section 3, our schemes for eliminating andexploiting forwarding redundancy are described in Sec-tions 4 and 5. The performance of our proposed schemesare evaluated by trace-driven simulations in Section 6.Section 7 reviews related work and Section 8 concludesthe paper.

2 OVERVIEW

2.1 Network Model and Assumptions

Opportunistic contacts among mobile devices are de-scribed by network contact graph (NCG) ๐บ(๐‘‰,๐ธ), wherecontact process between nodes ๐‘–, ๐‘— โˆˆ ๐‘‰ is modeled as anedge ๐‘’๐‘–๐‘— โˆˆ ๐ธ, and ๐‘’๐‘–๐‘— only exists if ๐‘– and ๐‘— have contactedbefore.We focus on effectively forwarding messages to des-

tinations with minimum cost, measured by the averagenumber of replicas created per message1. We considerthat each relay has only limited resources of channelbandwidth and local buffer. When replicas of multiplemessages are forwarded to the same relay, their prioritiesare determined to maximize the effectiveness of utilizingthe relayโ€™s resources. We assume a well-defined commu-nication mechanism at and below the link layer, and theconsideration of link quality or channel interference isbeyond the scope of this paper.We assume that each message has a finite lifetime ๐‘‡ .

Letting the forwarding delay be a random variable ๐‘‹ โˆˆ1. Each relay only carries one replica of a message, and hence the

number of replicas created for a message is equal to the number ofrelays used for forwarding the message.

Page 3: Forwarding Redundancy in Opportunistic Mobile โ€ฆcsce.uark.edu/~qinghual/papers/tmc-redundancy-weigao.pdf1 Forwarding Redundancy in Opportunistic Mobile Networks: Investigation, Elimination

3

(a) Network contact graph

S A

S B

A C

(b) Forwarding decisions

Fig. 1. Illustration of forwarding redundancy. Utility ๐‘ข๐‘–indicates the number of nodes that ๐‘– contacts, and thevalue within brackets is the value of ๐‘ข๐‘– after redundancyelimination. Message is replicated from ๐‘– to ๐‘— if ๐‘ข๐‘– < ๐‘ข๐‘— .

(0,+โˆž], the expected delay is measured as ๐”ผ{๐‘‹ โˆฃ๐‘‹ โ‰ค ๐‘‡ }and the delivery ratio is โ„™(๐‘‹ โ‰ค ๐‘‡ ). Since the deliveryratio and expected delay are correlated and increasesimultaneously when ๐‘‡ increases, in this paper we mea-sure forwarding performance using delivery ratio andwill not evaluate delay separately.

2.2 Motivation

Forwarding redundancy in opportunistic mobile net-works is illustrated by the example in Figure 1. Figure1(a) only shows part of NCG near the data source ๐‘†,and none of the nodes in Figure 1(a) has contacted thedestination, which is far away and not shown in thefigure. In this case, the nodeโ€™s capability of contactingother nodes is used as its utility for forwarding decision2,and forwarding redundancy occurs when the relays ๐ด,๐ต and ๐ถ contact many nodes in common. In particular,when ๐ต receives message replica at time ๐‘ก2 from ๐‘† andbecomes a relay, node ๐บ contacted by ๐ต is also contactedby another existing relay ๐ด. Hence, the contact of ๐ต to๐บ is redundant. ๐ตโ€™s utility without such redundancy,measured in number of nodes that ๐ต has contacted,should be 2 instead of 3. Similarly, contacts of relay ๐ถ tonodes ๐ฝ and ๐พ are redundant because of the existenceof ๐ต, and this redundancy reduces ๐ถโ€™s utility from 3 to1.This redundancy, if being unconsciously ignored and

grows inappropriately, may impair the forwarding effec-tiveness. For example, with the existence of ๐ต, replicat-ing message from ๐ด to ๐ถ at time ๐‘ก3 is ineffective becauseit only increases the cumulative number of nodes thatthe relays contact by (6 โˆ’ 5)/5 = 20%, but increases thenumber of message replicas by 33%. ๐ถ may also preventnode ๐น with higher utility from being used as relaywhen forwarding strategy like Delegation [15] is used,due to the โ€œfakeโ€ high utility of ๐ถ.Elimination of this redundancy is challenging due to

the lack of global network information. When ๐‘† repli-cates message to ๐ต at time ๐‘ก2, ๐ด may not know theexistence of relay ๐ต if ๐ด has disconnected with ๐‘†. Hence,

2. Note that nodes ๐‘– and ๐‘— are not included in calculating theirutilities when ๐‘– determines whether to replicate message to ๐‘—. Existingrelays are not included in such calculation either.

when ๐ด determines whether to replicate message to ๐ถat time ๐‘ก3, the redundancy between ๐ต and ๐ถ on nodes๐ฝ and ๐พ is hard to be eliminated.

2.3 MetricsWe measure forwarding redundancy as follows:

Definition 1: Redundancy percentage ๐‘ƒ๐‘˜(๐‘ก1, ๐‘ก2) of ๐‘˜ ex-isting relays during time period [๐‘ก1, ๐‘ก2] is defined as

๐‘ƒ๐‘˜(๐‘ก1, ๐‘ก2) = 1โˆ’ โˆฃโˆช๐‘˜

๐‘–=1โ„•๐‘–(๐‘ก1, ๐‘ก2)โˆฃ

/โˆ‘๐‘˜

๐‘–=1โˆฃโ„•๐‘–(๐‘ก1, ๐‘ก2)โˆฃ, (1)

where node ๐‘— โˆˆ โ„•๐‘–(๐‘ก1, ๐‘ก2) if it is contacted by the ๐‘–-th relayduring time period [๐‘ก1, ๐‘ก2]. The ๐‘–-th relay belongs to โ„•๐‘–(๐‘ก1, ๐‘ก2).

Forwarding redundancy varies when different utilityfunctions are used for forwarding decision. In general,the utility of node ๐‘– is calculated as ๐‘ˆ๐‘– =

โˆ‘๐‘๐‘—=1 ๐‘๐‘–๐‘— , where

๐‘ is number of nodes in the network and ๐‘๐‘–๐‘— is thecapability of node ๐‘– contacting ๐‘—. Utility functions areclassified into two categories according to the networkinformation used to measure ๐‘๐‘–๐‘— .The first category is observational utilities, in which ๐‘๐‘–๐‘—

is measured by direct network observations in the past.These observations include pairwise contact frequency(Freq) [14] and elapsed time since last contact (Elapsed-Time) [11]. Betweenness [17] is also used in social-awareforwarding schemes [25], and defines ๐‘๐‘–๐‘— =

โˆ‘๐‘—โˆ’1๐‘˜=1

๐‘”๐‘—๐‘˜(๐‘–)๐‘”๐‘—๐‘˜

,where ๐‘”๐‘—๐‘˜ is the number of shortest paths between node๐‘— and ๐‘˜ on the NCG and ๐‘”๐‘—๐‘˜(๐‘–) is the number of suchpaths passing node ๐‘–. Betweenness hence indicates therelative importance of node ๐‘– in facilitating communica-tion among other nodes.The second category is probabilistic utilities, where

๐‘๐‘–๐‘— indicates pairwise contact probability derived fromnode contact process. PROPHET [30] increases ๐‘๐‘–๐‘— by(1โˆ’ ๐‘๐‘–๐‘—) โ‹…๐‘๐‘–๐‘›๐‘–๐‘ก each time when ๐‘– and ๐‘— contact3, and CCP[22] defines ๐‘๐‘–๐‘— = 1 โˆ’ ๐‘’โˆ’๐œ†๐‘–๐‘—๐‘‡ where ๐œ†๐‘–๐‘— is the pairwisecontact rate.These utilities apply to various forwarding strategies.

In Compare-and-Forward [11], [14], a relay replicates mes-sages to nodes with higher utility than itself. Delegation[15] reduces the number of replicas, such that a relayonly replicates message to nodes with higher utility thanany existing relay that it is aware of. In Spray-and-Focus[36], the maximum number of message replicas is fixedand a relay forwards message to another node withoutretaining a local copy.In this paper, we study forwarding redundancy over

various combinations of forwarding strategies and utilityfunctions. Note that there are more forwarding strate-gies and utility functions having been developed thanthe ones mentioned above. Our goal is not to addressforwarding redundancy for each of them, but to demon-strate the general impact of this redundancy on forward-ing performance, as well as the universal methodologyfor practical redundancy elimination.

3. PROPHET proposed in [30] was only used between a relay andthe destination. In this paper we extend it to an arbitrary pair of nodes.

Page 4: Forwarding Redundancy in Opportunistic Mobile โ€ฆcsce.uark.edu/~qinghual/papers/tmc-redundancy-weigao.pdf1 Forwarding Redundancy in Opportunistic Mobile Networks: Investigation, Elimination

4

(a) Comparing ๐”ผ{๐ท๐‘˜} and ๐”ผ{ หœ๐ท๐‘˜} (b) Redundancy percentage

Fig. 2. Theoretical variation of delivery ratio and redun-dancy percentage

2.4 Traces

Four sets of opportunistic mobile network traces areused in this paper. They record contacts among mobiledevices with Bluetooth or WiFi interfaces moving insuburban areas (DieselNet [3]), conference site (Infocom[25]) and university campus (MIT Reality [12], UCSD[32]). Bluetooth-enabled devices periodically detect theirpeers nearby, and a contact is recorded when two devicesmove close. WiFi-enabled devices search for nearby WiFiAccess Points (APs) and associate themselves to theAPs with the best signal strength. A contact is recordedwhen two devices are associated to the same AP. Assummarized in Table 1, the four traces differ in theircontact type, network scale and node contact frequency.

3 INVESTIGATION

In this section, we investigate the characteristics of for-warding redundancy from both theoretical and experi-mental aspects. We first provide theoretical insights onvariations of delivery ratio and redundancy percentagewhen the message is being replicated, and then investi-gate these variations on real-world traces listed in Table1. Our findings are summarized as follows, and gen-erally highlight the necessity of eliminating forwardingredundancy in opportunistic mobile networks.

โˆ™ Forwarding redundancy widely exists in currentforwarding schemes, and seriously impairs the for-warding effectiveness if not being appropriatelyeliminated.

โˆ™ Message delivery ratio and redundancy percentageare closely correlated. Hence, forwarding redun-dancy can be intentionally controlled for satisfyingthe required delivery ratio.

โˆ™ The practical variations of delivery ratio and redun-dancy percentage accurately match our theoreticalexpectations.

3.1 Theoretical Framework

3.1.1 Delivery RatioWe assume that a message is generated at time ๐‘ก0 andexpires at time ๐‘ก๐‘’, with lifetime ๐‘‡ = ๐‘ก๐‘’ โˆ’ ๐‘ก0. As a result,

the message delivery ratio4 with ๐‘˜ relays is

๐ท๐‘˜(๐‘ก0, ๐‘ก๐‘’) = 1โˆ’โˆ๐‘˜

๐‘–=1(1โˆ’ ๐‘›๐‘–

๐‘), (2)

where ๐‘ is the number of nodes in the network, ๐‘›๐‘– =โˆฃโ„•๐‘–(๐‘ก๐‘–, ๐‘ก๐‘’)โˆฃ and ๐‘ก๐‘– is the time when the message is repli-cated to the ๐‘–-th relay. When message is replicated to an-other relay๐‘…๐‘˜+1,๐ท๐‘˜ increases byฮ”๐ท๐‘˜ = (1โˆ’๐ท๐‘˜)โ‹…๐‘›๐‘˜+1

๐‘ . If๐‘›๐‘– are i.i.d. stationary random variables with ๐”ผ{๐‘›๐‘–} = ๐œ‡๐‘,we have

๐”ผ{๐ท๐‘˜} = 1โˆ’ (1โˆ’ ๐œ‡๐‘/๐‘)๐‘˜. (3)

In Eq. (2), both the destination and the nodes in โ„•๐‘– areassumed to be uniformly distributed in the network.In social computing applications with community struc-tures, such distribution may be highly skewed. Relayswithin the same community may contact the same nodesand lead to lower delivery ratio. In contrast, โ„•๐‘– of relayswithin different communities may not overlap at all.Comparatively, delivery ratio without considering for-

warding redundancy is ๏ฟฝ๏ฟฝ๐‘˜ = 1๐‘ โ‹…โˆ‘๐‘˜

๐‘–=1 ๐‘›๐‘– withโˆ‘๐‘˜

๐‘–=1 ๐‘›๐‘– โ‰ค๐‘ , and ๐”ผ{๏ฟฝ๏ฟฝ๐‘˜} = ๐‘˜๐œ‡๐‘/๐‘ . Figure 2(a) illustrates thedifference between ๐”ผ{๐ท๐‘˜} and ๐”ผ{๏ฟฝ๏ฟฝ๐‘˜} when ๐‘˜ increases.While ๐”ผ{๏ฟฝ๏ฟฝ๐‘˜} linearly increases with ๐‘˜, ๐”ผ{๐ท๐‘˜} increasesslower. This difference is larger when ๐‘˜ increases or ๐œ‡๐‘ issmaller. Since the distribution of node contact capabilityis highly skewed in reality [25], value of ๐œ‡๐‘ is low and theactual delivery ratio is much lower than that indicatedby relaysโ€™ utilities.

TABLE 1Trace summary

Trace DieselNet Infocom MIT Reality UCSDNetwork type WiFi Bluetooth Bluetooth WiFiContact type Direct Direct Direct AP-basedNo. devices 40 78 97 275

Duration (days) 20 4 246 77No. contacts 3,268 182,951 114,046 123,225

No. contacts per 0.102 7.52 0.049 0.021pair per day

3.1.2 Redundancy PercentageThe redundancy percentage of ๐‘˜ relays is

๐‘ƒ๐‘˜ = 1โˆ’๐‘ โ‹…๐ท๐‘˜/๐‘๐‘˜,

where ๐ท๐‘˜ is defined in Eq. (2) and ๐‘๐‘˜ =โˆ‘๐‘˜

๐‘–=1 ๐‘›๐‘–. Since๐”ผ{ 1

๐‘๐‘˜} โ‰ฅ 1

๐‘˜๐œ‡๐‘, we have

๐”ผ{๐‘ƒ๐‘˜} โ‰ค 1โˆ’๐‘ โ‹… ๐”ผ{๐ท๐‘˜}/(๐‘˜๐œ‡๐‘), (4)

and this upper bound is asymptotically tight because๐”ผ{๐‘ƒ๐‘} = 1 โˆ’ ๐‘ โ‹… ๐”ผ{๐ท๐‘}/(๐‘๐œ‡๐‘) when ๐‘ is sufficientlylarge. When message is replicated to another relay ๐‘…๐‘˜+1,๐‘ƒ๐‘˜ increases by

ฮ”๐‘ƒ๐‘˜ = ๐‘ƒ๐‘˜+1 โˆ’ ๐‘ƒ๐‘˜ =๐‘ โ‹…๐ท๐‘˜

๐‘๐‘˜โˆ’ ๐‘ โ‹…๐ท๐‘˜+1

๐‘๐‘˜ + ๐‘›๐‘˜+1

=๐‘ โ‹… ๐‘›๐‘˜+1

๐‘๐‘˜(๐‘๐‘˜ + ๐‘›๐‘˜+1)โ‹… (๐ท๐‘˜ โˆ’ ๐‘๐‘˜

๐‘(1โˆ’๐ท๐‘˜)).

(5)

4. The delivery ratio of a single message equals to its probability tobe delivered to the destination before expiration.

Page 5: Forwarding Redundancy in Opportunistic Mobile โ€ฆcsce.uark.edu/~qinghual/papers/tmc-redundancy-weigao.pdf1 Forwarding Redundancy in Opportunistic Mobile Networks: Investigation, Elimination

5

Lemma 1: For โˆ€๐‘˜ โ‰ฅ 1, ฮ”๐‘ƒ๐‘˜ โ‰ฅ 0.

Proof: Consider functions ๐‘“(๐‘›1, ..., ๐‘›๐‘˜) =1๐‘

โˆ‘๐‘˜๐‘–=1 ๐‘›๐‘– = ๐‘๐‘˜/๐‘ and ๐‘”(๐‘›1, ..., ๐‘›๐‘˜) =

1โˆ’โˆ๐‘˜๐‘–=1(1โˆ’๐‘›๐‘–

๐‘ )โˆ๐‘˜๐‘–=1(1โˆ’

๐‘›๐‘–๐‘ )

= ๐ท๐‘˜

1โˆ’๐ท๐‘˜. For โˆ€๐‘– โˆˆ [1, ๐‘˜] we have

โˆ‚๐‘“โˆ‚๐‘›๐‘–

= 1๐‘ and โˆ‚๐‘”

โˆ‚๐‘›๐‘–= 1

๐‘(1โˆ’๐‘›๐‘–๐‘ )

โ‹… (1 + ๐‘”(๐‘›1, ..., ๐‘›๐‘˜)).Since ๐‘“(0, ..., 0) = ๐‘”(0, ..., 0) = 0, we have๐‘“(๐‘›1, ..., ๐‘›๐‘˜) โ‰ค ๐‘”(๐‘›1, ..., ๐‘›๐‘˜) for โˆ€๐‘›1, ..., ๐‘›๐‘˜ โˆˆ (0, ๐‘ ]and the lemma follows.

Lemma 1 shows that forwarding redundancy does notdecrease each time when message is replicated, and thisis also illustrated in Figure 2(b) by using its upper boundin Eq. (4). When ๐œ‡๐‘ increases, a node can be contactedby more relays and hence leads to higher redundancypercentage.We also notice that replicating message to more relays

increases the relay coverage and redundancy percentagesimultaneously. The relationship between the two per-spectives is described by the following theorem.

Theorem 1: When 1 โ‰ค ๐‘›๐‘– < ๐‘/2 for โˆ€๐‘– โˆˆ [1, ๐‘˜], thereexists ๐‘˜0 โˆˆ [1, ๐‘ ], such that for โˆ€๐‘˜ โ‰ค ๐‘˜0, ฮ”๐‘ƒ๐‘˜ โ‰ค ฮ”๐ท๐‘˜, andfor โˆ€๐‘˜ > ๐‘˜0, ฮ”๐‘ƒ๐‘˜ > ฮ”๐ท๐‘˜.

Proof: From Eqs. (2) and (5), we have

ฮ”๐‘ƒ๐‘˜ โˆ’ฮ”๐ท๐‘˜ =๐‘›๐‘˜+1(๐ท๐‘˜(๐‘“(๐‘˜) +๐‘)โˆ’ ๐‘“(๐‘˜)))

๐‘๐‘˜(๐‘๐‘˜ + ๐‘›๐‘˜+1), (6)

where ๐‘“(๐‘˜) = ๐‘ โ‹…๐‘๐‘˜+๐‘2๐‘˜+๐‘๐‘˜๐‘›๐‘˜+1

๐‘ and ๐‘๐‘˜ =โˆ‘๐‘˜

๐‘–=1 ๐‘›๐‘–.Eq. (6) shows that the proof of Theorem 1 is equivalent

to prove that there exactly exists one ๐‘˜0 โˆˆ (0,โˆž) suchthat ๐‘“(๐‘˜0) โˆ’ ๐ท๐‘˜0

โ‹…๐‘1โˆ’๐ท๐‘˜0

= 0. This is proved in the followingsteps.Step 1: Let ๐‘”(๐‘˜) = ๐ท๐‘˜โ‹…๐‘

1โˆ’๐ท๐‘˜, and we immediately have

๐‘“(0) = ๐‘”(0) = 0. ๐‘“(1) = ๐‘ โ‹…๐‘›1+๐‘›21+๐‘›1๐‘›2

๐‘ , and ๐‘”(1) = ๐‘ โ‹…๐‘›1

๐‘โˆ’๐‘›1.

Since ๐‘›๐‘– โˆˆ [1, ๐‘/2) for โˆ€๐‘– โˆˆ [1, ๐‘˜], we also have ๐‘“(1) >๐‘”(1).Step 2: It is easy to have โˆ‚๐‘“(๐‘˜)

โˆ‚๐‘˜ > 0 and โˆ‚๐‘”(๐‘˜)โˆ‚๐‘˜ > 0 for

โˆ€๐‘˜.Step 3: Since ๐‘›๐‘˜+1 โˆˆ [1, ๐‘/2) and ๐‘“(๐‘˜+1)โˆ’ ๐‘“(๐‘˜) โ‰ฅ ๐‘๐‘˜

๐‘ ,we have โˆ‚2๐‘“(๐‘˜)

โˆ‚๐‘˜2 > 0. We also see that โˆ‚2๐‘”(๐‘˜)โˆ‚๐‘˜2 โ‰ฅ โˆ‚2๐‘“(๐‘˜)

โˆ‚๐‘˜2 > 0in the similar way from Eq. (2).The theorem is proved by combining the three steps

above.

Theorem 1 shows that, when the number of messagereplicas is small, each replica has limited forwardingredundancy but considerably increases delivery ratio.However, when message is replicated to more relays, thenewly created replicas gradually become redundant andonly contribute little to the forwarding performance.

3.2 Trace Studies

We investigate the characteristics of forwarding redun-dancy in the traces listed in Table 1. In each experiment,a message is generated with random source and destina-tion over 100 simulation runs for statistical convergence.

(a) Delivery ratio (b) Redundancy percentage

Fig. 3. Delivery ratio and redundancy percentage in dif-ferent traces when message is replicated to more relays

(a) Delivery ratio (b) Redundancy percentage

Fig. 4. Delivery ratio and redundancy percentage in theInfocom trace with different utility functions

A warm-up period is reserved before message is gener-ated, for nodes to collect necessary network informationand calculate their utilities.

3.2.1 Impact of forwarding redundancyWe first vary the number of message replicas using theSpray-and-Focus strategy [36] and the utility function ofCCP [22]. Message lifetime ๐‘‡ is adaptively determinedin different traces to ensure that the designated numberof message replicas is created.As shown in Figure 3, both delivery ratio and redun-

dancy percentage increase when more message replicasare created. This increase is determined by the contactpatterns and frequencies of mobile nodes, which aretrace-dependent. In the MIT Reality trace, when thenumber of relays is smaller than 3, redundancy percent-age is lower than 40%, and each message replica notica-bly improves delivery ratio by 10%. However, the other

TABLE 2Curve fitting on delivery ratio

Trace ๐ทmax ๐‘š fitting errorDieselNet 0.5233 0.2728 1.65ร— 10โˆ’3

Infocom 0.5021 0.4182 1.307 ร— 10โˆ’3

MIT Reality 0.5402 0.4549 1.077 ร— 10โˆ’3

UCSD 0.4893 0.1206 2.48ร— 10โˆ’4

Page 6: Forwarding Redundancy in Opportunistic Mobile โ€ฆcsce.uark.edu/~qinghual/papers/tmc-redundancy-weigao.pdf1 Forwarding Redundancy in Opportunistic Mobile Networks: Investigation, Elimination

6

(a) Correlation in different traces (b) Correlation with different forwardingstrategies

(c) Correlation with different utilities

Fig. 5. Correlation between delivery ratio and redundancy percentage. An inflection point is found in all cases.

6 message replicas being created later only improvedelivery ratio by another 10%, but increase redundancypercentage to 70%. Similar cases are also found in othertraces. These results show that inappropriate growthof forwarding redundancy has only little contributionon forwarding performance but impairs the forwardingeffectiveness.When more message replicas are created, increase of

delivery ratio shown in Figure 3(a) is consistent withour theoretical expectations in Section 3.1. To validatethis consistency, we perform least-square curve fittingon Figure 3(a) using formula ๐”ผ{๐ท๐‘˜} = ๐ทmax โ‹… (1 โˆ’ (1 โˆ’๐‘š)๐‘˜) where ๐‘š = ๐œ‡๐‘/๐‘ , and results in Table 2 show thatfitting error is lower than 2 ร— 10โˆ’3 in all cases. Similarconsistency is also found for redundancy percentage bycomparing Figure 3(b) with Figure 2(b).In Figure 4 we also investigate the impact of dif-

ferent utility functions. Freq and PROPHET lead tolower delivery ratio and higher redundancy becausethey inaccurately measure nodesโ€™ contact capability. CCPand Betweenness perform better, especially when moremessage replicas are created.

3.2.2 Correlation Analysis

We are also interested in the correlation between deliv-ery ratio and redundancy percentage. Figure 5 showsthat the two metrics are closely correlated and increasesimultaneously when message replicas are being created.We notice that there is an inflection point in each curve inFigure 5. Delivery ratio increases faster than redundancypercentage before the inflection point and vice versa.This result also validates our expectation in Theorem 1.As shown in Figure 5(a), the position of inflection pointis mainly determined by node contact frequency and istrace-dependent.The position of inflection point also depends on the

forwarding strategy and utility function being used.Figure 5(b) shows that Compare-and-Forward is lesseffective and Spray-and-Focus performs better, whenCCP is used as the utility function. Similarly, Figure5(c) shows that PROPHET and CCP produce more re-

dundancy than Betweenness does, with the Delegationforwarding strategy.

4 ELIMINATION

In this section, we will eliminate forwarding redundancyfrom the utilities evaluating relaysโ€™ contact capability, soas to prevent this redundancy from affecting forwardingdecision and ensure efficient network resource utiliza-tion.Our basic idea is to keep track of Cumulative Relay

Information (CRI) for each message, which records thecumulative contact capability of relays used for forward-ing the message. The definition of CRI depends on theamount of network information available at individualnodes, and will be described later. When a relay ๐‘…determines whether to replicate the message to node ๐ด,๐‘… compares the contact capability of ๐ด with the currentCRI of the message, and checks whether nodes contactedby ๐ด have also been contacted by other relays. If so, thisredundancy is eliminated from ๐ดโ€™s utility, so that ๐ดโ€™sutility reflects its actual contribution on forwarding themessage. Moreover, when replicas of multiple messagesare forwarded to ๐ด with limited resources, their priori-ties are also determined by ๐ดโ€™s utility after redundancyelimination.We first focus on eliminating forwarding redundancy

with complete CRI at the global scope, and then extendthis scheme to be distributed with incomplete CRI main-tained at individual relays. Impact of this incompletenessto redundancy elimination is analyzed and addressedfrom various perspectives.

4.1 Redundancy Elimination with Global CRI

We first assume that each node knows the global CRI. Inpractice, this information can be provided via a specificbackend server, which maintains CRI and connects tonodes via 3G or satellite links5. The global CRI maintains

5. These communication links are generally expensive and haveonly limited bandwidth. Hence, they cannot be used for forwardingmessages.

Page 7: Forwarding Redundancy in Opportunistic Mobile โ€ฆcsce.uark.edu/~qinghual/papers/tmc-redundancy-weigao.pdf1 Forwarding Redundancy in Opportunistic Mobile Networks: Investigation, Elimination

7

a quantity ๐ถ(๐‘˜)๐‘– for each node ๐‘–, which indicates the

cumulative capability of the current ๐‘˜ relays contactingnode ๐‘–. ๐ถ(0)

๐‘– = 0 for โˆ€๐‘–. Each time when the message isreplicated to another relay ๐‘…๐‘˜+1, ๐ถ

(๐‘˜)๐‘– for each non-relay

node ๐‘– is updated as

๐ถ(๐‘˜+1)๐‘– = ๐‘“(๐ถ

(๐‘˜)๐‘– , ๐‘

(๐‘˜+1)๐‘– ), (7)

where ๐‘(๐‘˜+1)๐‘– is the capability of ๐‘…๐‘˜+1 contacting ๐‘–, and

is evaluated when the message is replicated to ๐‘…๐‘˜+1

without being changed in the future. ๐‘“(โ‹…) is a utility-dependent function with the following properties:

โˆ™ Monotonicity. For โˆ€๐‘˜ โˆˆ [1, ๐‘ ], ๐ถ(๐‘˜+1)๐‘– โ‰ฅ ๐ถ(๐‘˜)

๐‘– .โˆ™ Convexity. For โˆ€๐‘˜ โˆˆ [1, ๐‘ ], ๐ถ(๐‘˜+1)

๐‘– โ‰ค ๐ถ(๐‘˜)๐‘– + ๐‘

(๐‘˜+1)๐‘– .

Forwarding redundancy caused by ๐‘…๐‘˜+1 on node ๐‘– isidentified as the difference between ๐ถ(๐‘˜+1)

๐‘– and ๐ถ(๐‘˜)๐‘– +

๐‘(๐‘˜+1)๐‘– . Hence, after redundancy elimination, the utilityof ๐‘…๐‘˜+1 for forwarding this message is calculated as

๐‘ˆ๐‘˜+1 =โˆ‘๐‘

๐‘–=1(๐ถ

(๐‘˜+1)๐‘– โˆ’ ๐ถ(๐‘˜)

๐‘– ), (8)

which indicates the actual contribution of ๐‘…๐‘˜+1 on for-warding the message instead of

โˆ‘๐‘๐‘–=1 ๐‘

(๐‘˜+1)๐‘– . We design

๐‘“(โ‹…) for observational and probabilistic utility functions,respectively.

4.1.1 Observational Utilities

For observational utilites including Freq, ElapsedTimeand Betweenness, the contribution of ๐‘(๐‘˜+1)

๐‘– to ๐ถ(๐‘˜+1)๐‘– is

reduced by the ratio between ๐‘(๐‘˜+1)๐‘– and ๐ถ(๐‘˜)

๐‘– + ๐‘(๐‘˜+1)๐‘– ,

i.e.,

๐ถ(๐‘˜+1)๐‘– = ๐ถ

(๐‘˜)๐‘– +

๐‘(๐‘˜+1)๐‘–

๐ถ(๐‘˜)๐‘– + ๐‘

(๐‘˜+1)๐‘–

โ‹… ๐‘(๐‘˜+1)๐‘– . (9)

Eq. (9) can be interpreted in various ways when beingapplied to different utility functions. For Freq, the chancefor ๐‘…๐‘˜+1 to provide useful contact capability to node ๐‘– isproportionally reduced due to the existing contact capa-bility ๐ถ(๐‘˜)

๐‘– . This reduction also applies to ElapsedTime,because the reciprocal of elapsed time since last contactequivalently measures contact frequency by assumingstationary contact process. For example, if two relays๐ด and ๐ต contact node ๐‘– with the frequency 2 and 8respectively, the cumulative ๐ถ

(2)๐‘– = 2 + 8ร—8

2+8 = 8.4according to Eq. (9). For the third relay ๐ถ contacting ๐‘–with the frequency 6, ๐ถ(3)

๐‘– = 8.4 + 6ร—68.4+6 = 10.9.

For Betweenness, ๐‘(๐‘˜+1)๐‘– measures the number of nodes

which can communicate with node ๐‘– via ๐‘…๐‘˜+1. Be-tweenness in opportunistic mobile networks is usuallycalculated in an ego-centric manner [17]. Forwardingredundancy exists when the neighborhood of ๐‘…๐‘˜+1 onNCG overlap with that of other relays, and hence canbe calculated similarly using Eq. (9).

(a) Network contact graph.Numbers on the edges are thepairwise contact probabilities.

(b) Message replication. Numbersin the brackets indicate nodesโ€™probabilistic utilities

Fig. 6. The impact of redundancy elimination in Eq. (10)to forwarding decision with Delegation strategy.

4.1.2 Probabilistic Utilities

For probabilistic utilities including PROPHET and CCP,๐‘(๐‘˜+1)๐‘– is the probability for ๐‘…๐‘˜+1 to contact ๐‘–. We assumethat the contact process of each relay is independent, and๐ถ

(๐‘˜+1)๐‘– = 1โˆ’โˆ๐‘˜+1

๐‘—=1 (1โˆ’ ๐‘(๐‘—)๐‘– ). Hence,

๐ถ(๐‘˜+1)๐‘– = 1โˆ’ (1 โˆ’ ๐ถ(๐‘˜)

๐‘– ) โ‹… (1โˆ’ ๐‘(๐‘˜+1)๐‘– ). (10)

The impact of redundancy elimination on forwardingdecision is illustrated in Figure 6. The utilities of ๐ต and๐ถ are reduced by nearly 50% after their redundancy ofcontacting ๐บ, ๐ฝ and ๐พ has been eliminated, and hencewill not be used as relays due to their low utilities.Instead, ๐ด replicates message to ๐น which is effective tocontact more distinct nodes and has more contributionon forwarding the message.

4.2 Distributed Elimination

When the global CRI is unavailable, each relay maintainsCRI in a distributed manner6, only based on its localinformation about its neighbors on NCG. Due to the lackof end-to-end network connectivity, the CRI maintainedat relays may be incomplete and partially overlap witheach other. For example, in the network shown in Figure6, node ๐ฝ is contacted by three relays ๐ด, ๐ต and ๐ถ. TheCRI about node ๐ฝ maintained at ๐ต includes capabilityof ๐ด and ๐ต contacting ๐ฝ , but the CRI maintained at ๐ถonly includes that of ๐ด and ๐ถ.Due to this possible overlapping, relays need to merge

their maintained CRI when they contact, and the quan-tity ๐ถ

(๐‘˜)๐‘– is insufficient for maintaining CRI in a dis-

tributed manner. In the above example, it is difficult forrelays ๐ต and ๐ถ to correctly identify this overlapping andmerge their CRI to calculate the cumulative capability of๐ด, ๐ต and ๐ถ contacting ๐ฝ .In this case, CRI is maintained in a more fine-grained

level. A relay maintains a list for each non-relay node ๐‘–,and the list records the capability ๐‘(๐‘—)๐‘– of each relay ๐‘…๐‘—

contacting ๐‘–. When relays ๐ต and ๐ถ in Figure 6 contacteach other, their lists are merged to correctly calculate

6. A relay initializes its CRI as its own contact capability.

Page 8: Forwarding Redundancy in Opportunistic Mobile โ€ฆcsce.uark.edu/~qinghual/papers/tmc-redundancy-weigao.pdf1 Forwarding Redundancy in Opportunistic Mobile Networks: Investigation, Elimination

8

Fig. 7. Distributed maintenance of CRI based on thenetwork in Figure 6

CRI of node ๐ฝ based on Eqs. (9) or (10), and this processis illustrated in Figure 7.The amount of storage space for maintaining CRI is

related to the number of relays, which is much smallerthan the number (๐‘ ) of nodes in the network. Forexample, the required space is ๐‘‚(๐‘ โ‹… (log๐‘)2) whenDelegation strategy is used.

4.3 Accuracy Analysis and Improvement

When CRI is maintained in a distributed manner, accu-racy of redundancy elimination may be impaired dueto incompleteness of CRI. This incompleteness appearswhen a relay is unaware of some other existing relays,and is illustrated in Figure 8(a) which describes forward-ing process as a Message Replication Tree (MRT). With-out loss of generality, we assume that communicationlinks among ๐‘…1, ..., ๐‘…๐‘˜โˆ’1 have broken when messageis replicated to relay ๐‘…๐‘˜. In Figure 8(a) when messageis replicated from ๐‘…3 to ๐‘…7, ๐‘…7 knows ๐‘…2 because ๐‘…2

receives message replica earlier from ๐‘…1 which is also theparent of ๐‘…3 on MRT, but ๐‘…7 is unaware of the existenceof ๐‘…4 and ๐‘…5 because the link between ๐‘…1 and ๐‘…2 hasbroken. Similarly, neither ๐‘…4 nor ๐‘…5 knows ๐‘…3, ๐‘…6 and๐‘…7.

Definition 2: The Blind Zone (BZ) ๐”น๐‘…๐‘–(๐‘ก) of a relay ๐‘…๐‘–

at time ๐‘ก is defined as a set of relays which receive messagereplica before time ๐‘ก, such that a relay ๐‘…๐‘— โˆˆ ๐”น๐‘…๐‘–(๐‘ก) if ๐‘…๐‘– isunaware of the existence of ๐‘…๐‘— at time ๐‘ก.

The BZs of relay ๐‘…5 and ๐‘…7 are indicated by dashedcircles in Figure 8(a). Based on this definition, incom-pleteness of CRI at time ๐‘ก is measured by average sizeof relaysโ€™ BZ as ๐ผ๐‘˜ = 1

๐‘˜ โ‹… โˆ‘๐‘˜๐‘–=1 โˆฃ๐”น๐‘…๐‘–(๐‘ก)โˆฃ, where ๐‘˜ is the

number of relays.This incompleteness of CRI may cause false positive

and false negative errors to forwarding decision. First,๐‘…5 and ๐‘…7 in Figure 8(b) contact node ๐ดwith probability0.5 and 0.6, and the actual utility of ๐‘…7 should be 2.2instead of 2.5 according to Eq. (10). When Delegationstrategy is used, ๐‘…7 should not receive message replicafrom ๐‘…3 because ๐‘…6 becomes relay earlier and 2.3 > 2.2.Hence, ๐‘…7 is a false positive error. Second, ๐‘…3 incorrectlyconsiders that ๐‘…7 has the highest utility of 2.5 among

(a) Incomplete CRI at relays. Relaysreceive message replicas from theirparents, and are indexed by theirtime receiving message replica.

(b) ๐‘…7: false positive error, ๐‘…8:false negative error. Numbers atthe nodes indicate relaysโ€™ proba-bilistic utilities.

Fig. 8. Incompleteness of CRI and its impact on forward-ing decision. Delegation strategy is used.

1

2

3

5

4

1

2 3

4 5

1

2 3

4 5

6 6

6

R R R R R R

1

2 3 4

5 6

R R

Fig. 9. MRTs with 6 relays and different combinations of(๐‘๐‘…,๐พ๐‘…)

existing relays. This prevents ๐‘…8 from becoming a relayand leads to a false negative error.We propose two alternative schemes to address these

errors and improve the accuracy of redundancy elim-ination. First, we pre-regulate the forwarding processbefore message is actually replicated to relays, so asto reduce the chance for errors to occur. Second, weopportunistically adjust relays after they receive messagereplicas, when the errors are detected.

4.3.1 Pre-regulation of Forwarding Process

A relay ๐‘…๐‘˜ is inevitably blind to relays which receivemessage replica later and not from ๐‘…๐‘˜ itself. Hence,we focus on ensuring that ๐‘…๐‘˜ knows all the relays๐‘…1, ..., ๐‘…๐‘˜โˆ’1, i.e., โˆฃ๏ฟฝ๏ฟฝ๐‘…๐‘˜

(๐‘ก)โˆฃ = โˆฃ๐”น๐‘…๐‘˜(๐‘ก) โˆฉ {๐‘…1, ..., ๐‘…๐‘˜โˆ’1}โˆฃ = 0

for โˆ€๐‘ก โ‰ฅ ๐‘‡๐‘˜, where ๐‘‡๐‘˜ is the time ๐‘…๐‘˜ receives messagereplica. This is achieved by regulating forwarding pro-cess represented by MRT.โˆฃ๏ฟฝ๏ฟฝ๐‘…๐‘˜

(๐‘ก)โˆฃ is controlled by two parameters ๐‘๐‘… and ๐พ๐‘….๐‘๐‘… is the maximum number of non-leaf relays at eachlevel of MRT. We let the non-leaf relays at a level of MRThave larger indices than any leaf relay at the same level,and only allow the non-leaf relays to replicate messageand produce new relays. ๐พ๐‘… is the maximum numberof new relays that a non-leaf relay can produce, and welimit that ๐พ๐‘… โ‰ฅ ๐‘๐‘…. MRTs with (๐‘๐‘…,๐พ๐‘…) from (1, 1) to(2, 2) are illustrated in Figure 9.

Lemma 2: โˆฃ๏ฟฝ๏ฟฝ๐‘…๐‘˜(๐‘ก)โˆฃ = 0 for โˆ€๐‘˜ โ‰ฅ 1 when ๐‘๐‘… = 1.

Proof:We prove this lemma by induction over levelsof MRT.

Page 9: Forwarding Redundancy in Opportunistic Mobile โ€ฆcsce.uark.edu/~qinghual/papers/tmc-redundancy-weigao.pdf1 Forwarding Redundancy in Opportunistic Mobile Networks: Investigation, Elimination

9

Step 1: if ๐‘…๐‘˜ is at the first level, ๐‘˜ = 1 and ๐‘…1 is thesource node. The lemma simply holds.Step 2: we suppose that the lemma holds for all the

relays at the ๐‘—-th level. Since ๐‘๐‘… = 1, all the relays atthe (๐‘—+1)-th level receive message replica from the sameparent ๐‘…(๐‘—) at the ๐‘—-th level. For ๐‘…๐‘˜ at the (๐‘— + 1)-thlevel, i) it knows all the relays at the upper levels from๐‘…(๐‘—) because โˆฃ๏ฟฝ๏ฟฝ๐‘…(๐‘—)(๐‘ก)โˆฃ = 0, ii) it knows all the relays atthe (๐‘— +1)-th level with smaller index because they alsoreceive message replica from by ๐‘…(๐‘—). The lemma hencealso holds for ๐‘…๐‘˜ at the (๐‘— + 1)-th level.This lemma is proved by combining Steps 1 and 2.

From Lemma 2, we immediately have the followingtheorem considering that โˆฃ๐”น๐‘…๐‘˜โˆ’1

(๐‘ก)โˆฃ = โˆฃ๐”น๐‘…๐‘˜(๐‘ก)โˆฃ = 0.

Theorem 2: When ๐‘๐‘… = 1, ๐ผ๐‘˜ = (๐‘˜โˆ’1)(๐‘˜โˆ’2)2๐‘˜2 for any

๐พ๐‘… โ‰ฅ 1.

๐ผ๐‘˜ increases with ๐พ๐‘… when ๐‘๐‘… > 1. Non-leaf relaysusually have the best capability contacting other nodesand determine which node to be the next non-leaf relay,so to ensure that a sufficient number of message replicasare created.

4.3.2 Posterior Adjustment of Relays

The aforementioned pre-regulation may prevent somerelays from receiving message replica and affect forward-ing performance. Another way is to adjust the relays ina posterior manner, when the false positive and falsenegative errors are detected. These errors are detectedopportunistically when relays contact each other andupdate their maintained CRI.A relay ๐‘…๐‘˜ autonomously revokes itself by removing

its message replica, when it detects itself as false positive.For this detection, ๐‘…๐‘˜ memorizes the situation at time๐‘‡๐‘˜ when it received message replica. Each time when ๐‘…๐‘˜

contacts another relay and updates its CRI, it recalculatesits utility at time ๐‘‡๐‘˜. The false positive error is detectedwhen ๐‘…๐‘˜ realizes that it should not be a relay withthe new utility. In Figure 8(b), ๐‘…7 finds that its utilityshould be 2.2 instead of 2.5 when it contacts ๐‘…5, andrealizes itself as false positive. After ๐‘…7 revoked itself,๐‘…5 is responsible for notifying other relays to remove๐‘…7โ€™s information from their maintained CRI.Figure 8(b) shows that a false negative error only hap-

pens after a false positive error. After relay ๐‘…7 revokesitself, the false negative error on ๐‘…8 is detected until ๐‘…3

or ๐‘…8 is notified about the revocation of ๐‘…7. Since ๐‘…3

may not be in contact with ๐‘…8 by then, ๐‘…3 spreads theinformation about this error among existing relays, sothat ๐‘…8 receives message replica if it contacts any relaybeing aware of this false negative error.In general, the delay for the errors to be corrected is

determined by both the network scale and node contactpattern. Since the selected relays have good capabilitycontacting other nodes, this delay is expected to be muchshorter than the inter-contact time among mobile nodes.

4.4 Local Allocation of Relay Resources

A relay has only limited local resources. When replicas ofmultiple messages are forwarded to a relay, its resourcesshould be allocated to the appropriate message replicas.Such problem of local resource allocation has been stud-ied in [2], but with the assumption that each message hasequal size. Instead, we propose a generalized solutionbased on the relaysโ€™ utilities after redundancy elimina-tion.When replicas of ๐‘€ messages with sizes ๐‘ 1, ..., ๐‘ ๐‘€ are

forwarded from relay ๐‘…1 to relay ๐‘…2 with buffer size ๐ต,the problem of resource allocation at ๐‘…2 is formulatedas

maxโˆ‘๐‘€

๐‘˜=1๐‘ˆ

(๐‘˜)2 ๐‘ฅ๐‘˜ s.t.

โˆ‘๐‘€

๐‘˜=1๐‘ ๐‘˜๐‘ฅ๐‘˜ โ‰ค ๐ต, (11)

where ๐‘ฅ๐‘˜ โˆˆ {0, 1} indicate whether the ๐‘˜-th messagereplica is forwarded to ๐‘…2, and ๐‘ˆ

(๐‘˜)2 is utility of ๐‘…2

defined in Eq. (8) for forwarding the ๐‘˜-th message. Notethat the forwarding redundancy between the existingrelays (including ๐‘…1) and ๐‘…2 for forwarding the ๐‘˜-thmessage has been eliminated from ๐‘ˆ

(๐‘˜)2 . Eq. (11) ensures

that ๐‘…2โ€™s resources are allocated to the appropriate mes-sage replicas, such that ๐‘…2 has the most contributions onforwarding these messages. In practice, since ๐ต and ๐‘ ๐‘˜in Eq. (11) are usually integers in numbers of bytes, Eq.(11) can be solved in pseudo-polynomial time ๐‘‚(๐‘€ โ‹…๐ต)using a dynamic programming approach [31].Due to the limited channel bandwidth and contact

duration, ๐‘…1 may not be able to transmit all the messagereplicas selected by Eq. (11) to ๐‘…2 before the contact ends.The order for message replicas to be transmitted followstheir order being selected when solving Eq. (11) usingdynamic programming, due to the property of optimalsubstructure of Eq. (11).

5 EXPLOITATION

Elimination of forwarding redundancy improves the ef-fectiveness of network resource utilization and enhancesthe cumulative forwarding performance, but the spe-cific performance requirements for forwarding individ-ual messages may not be satisfied due to the reducednumber of message replicas being created. The exam-ples of such applications include emergency notification,which require reliable and timely message delivery andhave strict requirement on delivery ratio.In this section, based on the capability of eliminating

forwarding redundancy, we develop adaptive forwardingstrategy to exploit such redundancy and satisfy the de-livery ratio required by each message with the minimumnumber of message replicas. We replicates messagesbased on relaysโ€™ utilities after redundancy elimination,and adaptively controls the amount of forwarding re-dundancy according to the required delivery ratio andup-to-date network condition.

Page 10: Forwarding Redundancy in Opportunistic Mobile โ€ฆcsce.uark.edu/~qinghual/papers/tmc-redundancy-weigao.pdf1 Forwarding Redundancy in Opportunistic Mobile Networks: Investigation, Elimination

10

ยฎยฎ

QRQR UAUA

QR < UAQR < UA

(a) Comparison-based for-warding strategy

(b) Dynamic values of ๐›ผ with required de-livery ratio ๐ท = 80%

Fig. 10. Exploitation of forwarding redundancy

5.1 Basic Methodology

When a relay ๐‘… determines whether to replicate a mes-sage to another node ๐ด, most of current forwardingstrategies can be summarized as a uniform comparison-based framework shown in Figure 10(a). ๐‘… compares alocal quantity ๐‘„๐‘… which is called โ€œforwarding thresholdโ€with ๐ดโ€™s utility ๐‘ˆ๐ด for forwarding the message, andonly replicates the message to ๐ด if ๐‘„๐‘… < ๐‘ˆ๐ด. Differentstrategies vary in ๐‘„๐‘… they use. Compare-and-Forwardmaintains ๐‘„๐‘… as utility of ๐‘…, and in Delegation ๐‘„๐‘… isthe highest utility among all the relays that ๐‘… is awareof. In all the strategies, the method of calculating andupdating ๐‘„๐‘… is fixed during forwarding process.Our basic idea for controlling the amount of forward-

ing redundancy is to adaptively adjust ๐‘„๐‘… at each relay๐‘… by multiplying ๐‘„๐‘… with a parameter ๐›ผ, as illustratedin Figure 10(a). We assume that message is generated attime 0 and expires at time ๐‘‡ . As a result, ๐›ผ at time ๐‘ก๐‘ โ‰ค ๐‘‡is determined by the estimated delivery ratio ๏ฟฝ๏ฟฝ(๐‘ก๐‘) thatrelays at ๐‘ก๐‘ can achieve at ๐‘‡ , and the remaining time๐‘‡ โˆ’ ๐‘ก๐‘ for forwarding the message.This exploitation is illustrated in Figure 10(b). Ideally,

more relays receive message replicas when ๐‘ก๐‘ elapsesand gradually improve ๏ฟฝ๏ฟฝ(๐‘ก๐‘) to the required deliveryratio ๐ท before ๐‘‡ , so that ๐›ผ โ‰ก 1. However, in practicethe increase of ๏ฟฝ๏ฟฝ(๐‘ก๐‘) may be different due to the specificnetwork contact pattern, and we adjust ๐›ผ accordingly toapproximate ๏ฟฝ๏ฟฝ(๐‘ก๐‘) to the ideal case. In Case 1 shown inFigure 10(b) where ๏ฟฝ๏ฟฝ(๐‘ก๐‘) at time ๐‘ก๐‘ < ๐‘‡/2 is already closeto ๐ท, ๐›ผ increases to avoid redundant relays. In Case 2where ๏ฟฝ๏ฟฝ(๐‘ก๐‘) is too low, ๐›ผ decreases to ensure that thereis a sufficient number of relays to achieve ๐ท.Note that we minimize the number of relays used to

achieve ๐ท based on relaysโ€™ utilities after redundancyelimination. Otherwise, without redundancy eliminationin Section 4, ๐ท can still be achieved by reducing ๐›ผ butthe number of relays increases due to forwarding redun-dancy among relays. Moreover, increasing ๐›ผ or usingfewer relays does not necessarily reduce the amount offorwarding redundancy in the network.The value of ๐›ผ is calculated based on the CRI main-

tained at time ๐‘ก๐‘ and is used to estimate ๏ฟฝ๏ฟฝ(๐‘ก๐‘). Wecalculate ๐›ผ as ๐‘๐‘…/๐‘๐‘…, where ๐‘๐‘… is additional number

of relays needed at time ๐‘ก๐‘ for achieving ๐ท and ๐‘๐‘… isthe estimated number of relays that can receive messagereplica during time period (๐‘ก๐‘, ๐‘‡ ]. We propose effectiveheuristics to estimate both ๐‘๐‘… and ๐‘๐‘… at individualrelays, and also exploit periodicity of relaysโ€™ contactcapability for more accurate control of ๐›ผ.

5.2 Heuristics

5.2.1 Estimating ๐‘๐‘…

๐‘๐‘… is determined by CRI maintained at time ๐‘ก๐‘. Supposethere are ๐‘˜ relays a time ๐‘ก๐‘, ๏ฟฝ๏ฟฝ(๐‘ก๐‘) = 1

๐‘ โ‹… โˆ‘๐‘๐‘–=1 ๐ถ

(๐‘˜)๐‘–

where ๐ถ(๐‘˜)๐‘– is the cumulative capability of the ๐‘˜ relays

contacting node ๐‘–. From Section 3 we know that theincrease of actual delivery ratio over ๐‘˜ can be modeledas ๐”ผ๐ท๐‘˜ = ๐ทmax โ‹… (1โˆ’ (1โˆ’๐‘š)๐‘˜). Each time when we havea new relay ๐‘…๐‘˜, we update the parameters ๐ทmax and ๐‘šby least-square curve fitting over the estimated ๏ฟฝ๏ฟฝ(๐‘ก๐‘),and ๐‘๐‘… is calculated as

๐‘๐‘… =ln(1 โˆ’ ๐ท

๐ทmax)

ln(1โˆ’๐‘š)โˆ’ ๐‘˜.

5.2.2 Estimating ๐‘๐‘…

We estimate ๐‘๐‘… based on the intervals ๐‘‡๐‘– between thetimes that the ๐‘–-th and (๐‘– + 1)-th relays receive messagereplica, and we propose two alternatives of heuristics forsuch estimation.The first heuristic is based on the observation in Figure

13(b) that ๐‘‡๐‘– generally increases with ๐‘–. We estimatethe next time interval ๐‘‡๐‘˜+1 = max

1โ‰ค๐‘–โ‰ค๐‘˜๐‘‡๐‘–, and ๐‘๐‘… =

(๐‘‡ โˆ’ ๐‘ก๐‘)/๐‘‡๐‘˜+1.Another alternative is to model the variation of ๐‘‡๐‘– as

an Auto-Regressive (AR) process with the order of ๐‘ (๐‘ <๐‘˜). A ๐‘-order AR process is defined as

๐‘‡๐‘˜ =

๐‘โˆ‘๐‘–=1

๐œ™๐‘–๐‘‡๐‘˜โˆ’๐‘– + ๐œ–๐‘˜, (12)

where ๐œ™1, ..., ๐œ™๐‘ are the parameters and ๐œ–๐‘˜ is whitenoise. Based on ๐‘‡๐‘– in the past, these parameters canbe estimated either via least-square regression or usingYule-Walker equations [4]. ๐‘๐‘… can be estimated by re-cursively calculating these time intervals in the future,until

โˆ‘๐‘๐‘…

๐‘–=๐‘˜+1 ๐‘‡๐‘– โ‰ฅ ๐‘‡ โˆ’ ๐‘ก๐‘.๐‘๐‘… estimated by AR process is generally more accu-

rate, but also requires more information of ๐‘‡๐‘– to estimateparameters in Eq. (12). In practice, the first alternative isused for estimating ๐‘๐‘… during initial stage of forward-ing, and is switched to AR process after there are at least๐‘+ 1 relays.

5.3 Exploitation of Periodicity

The contact patterns among mobile devices are related tohuman behaviors, and lead to periodicity of forwardingperformance and redundancy at various time scales. We

Page 11: Forwarding Redundancy in Opportunistic Mobile โ€ฆcsce.uark.edu/~qinghual/papers/tmc-redundancy-weigao.pdf1 Forwarding Redundancy in Opportunistic Mobile Networks: Investigation, Elimination

11

(a) DieselNet (b) Infocom (c) MIT Reality (d) UCSD

Fig. 11. Periodicity of delivery ratio and redundancy percentage. The periodicity in the DieselNet and Infocom tracesis at daily scale, and that in the MIT Reality and UCSD traces is at weekly scale.

TABLE 3Parameters of periodicity of delivery ratio

Trace ๐‘‡๐‘ ๐ด ๐œ‡ ๐œŽ errorDieselNet 1.117 0.390 0.663 0.248 0.0082Infocom 1.064 0.574 0.6398 0.552 0.0359

MIT Reality 7.036 0.498 4.106 2.891 0.0031UCSD 6.894 0.2696 3.211 1.597 0.0229

exploit such periodicity for more accurate control offorwarding redundancy.We first investigate such periodicity in real-world

traces. We divide each trace into 100 pieces with equaltime length, generate message at the beginning of eachpiece, and investigate delivery ratio and redundancypercentage at the end of piece. This periodicity is shownin Figure 11, with Delegation and Betweenness usedfor forwarding decision. Periodicity of delivery ratio isapproximated by periodic function ๏ฟฝ๏ฟฝ(๐‘ก) = ๐บ(๐‘ก mod ๐‘‡๐‘),

where ๐‘‡๐‘ is its period and ๐บ(๐‘ก) = ๐ดโ‹…๐‘’โˆ’ (๐‘กโˆ’๐œ‡)2

๐œŽ2 is Gaussianfunction. Parameters of ๏ฟฝ๏ฟฝ(๐‘ก) are listed in Table 3, where๐‘‡๐‘ and ๐œ‡ are in number of days.Table 3 exhibits periodicity of relaysโ€™ contact capability

and motivates us to adjust ๐‘„๐‘… according to transientcontact capability of relays during time period [๐‘ก๐‘, ๐‘‡ ].For example, in the DieselNet and Infocom traces, nodescontact each other more often during daytime and havehigher chances to be used as relays. ๐‘„๐‘… should beincreased accordingly to reduce the amount of forward-ing redundancy. In contrast, ๐‘„๐‘… should decrease duringnighttime when node contact capability is low.Our basic idea is to apply an additional coefficient

๐›ฝ being multiplied to parameter ๐›ผ, and ๐›ฝ is calculatedby comparing the transient contact capability of relaysduring [๐‘ก๐‘, ๐‘‡ ] with their cumulative contact capability.Based on the Gaussian formulation of periodicity de-scribed above, ๐›ฝ is calculated as

๐›ฝ =2๐‘‡๐‘๐ด๐œŽ

โˆš๐œ‹โ‹… 1

๐‘‡ โˆ’ ๐‘ก๐‘

โˆซ ๐‘‡

๐‘ก๐‘

๏ฟฝ๏ฟฝ(๐‘ก)๐‘‘๐‘ก, (13)

where ๐ด๐œŽโˆš๐œ‹/(2๐‘‡๐‘) indicates cumulative contact capa-

bility of relays, becauseโˆซ ๐‘‡๐‘

0๏ฟฝ๏ฟฝ(๐‘ก)๐‘‘๐‘ก

.= ๐ด๐œŽ

โˆš๐œ‹/2 when

๏ฟฝ๏ฟฝ(๐‘˜ โ‹… ๐‘‡๐‘) .= 0 for โˆ€๐‘˜ โ‰ฅ 0. In practice, parameters of ๏ฟฝ๏ฟฝ(๐‘ก)are estimated based on ๏ฟฝ๏ฟฝ(๐‘ก๐‘), which is calculated fromthe maintained CRI.

6 PERFORMANCE EVALUATION

In this section, we evaluate the performance of ourredundancy elimination schemes, using the realistic mo-bile network traces listed in Table 1. The first half of eachtrace is used for nodes to collect network informationand all the messages are generated at randomized timesafterwards. We assume that the channel bandwidth is 1Mbps (Bluetooth v1.2), and the message size is uniformlydistributed in [10๐‘€๐‘, 50๐‘€๐‘]. As reported in [18], most ofcontacts in the traces we use last long enough to transmitat least one message replica. The buffer size of nodesis uniformly distributed in [50๐‘€๐‘, 500๐‘€๐‘] so that eachnode can carry at least one message replica.

6.1 Performance of Redundancy Elimination

We first evaluate the performance of redundancy elim-ination with global and distributed CRI. We generate amessage every hour with random source and destina-tion, and the evaluation results over all the messagesare shown in Figure 12, where Betweenness and CCP areused to represent observational and probabilistic utilityfunctions, respectively.Figure 12(b) shows that our schemes effectively elim-

inate forwarding redundancy by more than 50%. Thiselimination enables effective utilization of the relaysโ€™resources, and hence leads to 20% improvement of thecumulative delivery ratio and 40% reduction on theforwarding cost7. Note that the contact capabilities ofselected relays after redundancy elimination may stilloverlap, but this remaining redundancy is very limitedcompared to the useful contact capability provided byrelays. Figure 12 also shows the impact of CRI incom-pleteness to redundancy elimination and forwardingperformance. When CRI is maintained in a distributed

7. We consider the overhead of maintaining CRI as negligible be-cause it only happens when relays contact and the size of CRI metadatais very small compared with the messages being forwarded.

Page 12: Forwarding Redundancy in Opportunistic Mobile โ€ฆcsce.uark.edu/~qinghual/papers/tmc-redundancy-weigao.pdf1 Forwarding Redundancy in Opportunistic Mobile Networks: Investigation, Elimination

12

(a) Delivery ratio (b) Redundancy Percentage (c) Number of replicas created per message

Fig. 12. Performance of redundancy elimination with global and distributed CRI. Compare-and-Forward strategy isused in the MIT Reality trace. Our schemes eliminate forwarding redundancy by more than 50%, and improve thecumulative delivery ratio by 20% with 40% less cost in number of replicas created per message.

(a) Change of relaysโ€™ utilities (b) Intervals of message replication

Fig. 13. Detailed effects of redundancy elimination

manner at individual relays, the CRI incompletenessincreases redundancy percentage by 10%, and leads to20% increase of forwarding cost.We also evaluated values of relaysโ€™ utilities and in-

tervals of message replication after redundancy elimi-nation, as shown in Figure 13. For each message, weuse the utility and replication interval of the first relayfor normalization. We observe that relaysโ€™ utilities afterredundancy elimination are reduced by up to 40%, andthis is the major reason for reduction of forwarding costshown in Figure 12(c). It also takes longer time for eachmessage to be replicated.

6.2 Effectiveness of Accuracy Improvement

As discussed in Section 4.3, the accuracy of redundancyelimination may be impaired due to CRI incompletenessat individual relays. Various techniques have been pro-posed in Section 4.3 to detect and correct the possibleerrors during redundancy elimination. Such CRI incom-pleteness, which is measured by average size of relaysโ€™BZ, is shown in Figure 14 with Compare-and-Forwardand CCP used for forwarding decision. Figure 14(a)shows that the average BZ size can be up to 35%. Wealso evaluate the effects of pre-regulation of forwarding

(a) BZ sizes in different traces (b) BZ sizes in MIT Reality trace

Fig. 14. Average BZ size of relays

process on reducing the average BZ size, and the resultsare shown in Figure 14(b). As expected by Lemma 2, theaverage BZ size is reduced by up to 50% when ๐‘๐‘… = 1,but increases when ๐‘๐‘… or ๐พ๐‘… increases.The performance of error detection and correction

schemes proposed in Section 4.3 are evaluated in Figure15. Figure 15(a) shows that the majority of errors is falsepositive, and false negative errors are only noticeablewhen many message replicas are created. Our schemescan effectively detect both types of errors, and limitthe cumulative error percentage lower than 10%. Figure15(b) also evaluates the delay of error detection. Ob-viously this delay is closely related with data lifetime.When data lifetime is set as 1 week for the MIT Realitytrace, Figure 15(b) shows that both types of errors can bedetected and corrected within 20% of the data lifetime.Using the same strategy and utility function, the per-

formance of schemes proposed in Section 4.3 for improv-ing the accuracy of distributed redundancy eliminationis evaluated in Figure 16. First, by comparing Figure 12and Figure 16, we see that posterior adjustment of relayseffectively corrects errors during distributed redundancyelimination, and improves forwarding performance tothe level of global elimination. Second, Figure 16(b)

Page 13: Forwarding Redundancy in Opportunistic Mobile โ€ฆcsce.uark.edu/~qinghual/papers/tmc-redundancy-weigao.pdf1 Forwarding Redundancy in Opportunistic Mobile Networks: Investigation, Elimination

13

(a) Delivery ratio (b) Redundancy Percentage (c) Number of replicas created per message

Fig. 16. Performance of improving the accuracy of distributed redundancy elimination in the MIT Reality trace

(a) Performance of error detection (b) Error detection delay

Fig. 15. Performance of error detection in MIT Realitytrace. Data lifetime is set as 1 week (168 hours).

shows that pre-regulation of forwarding process further-more reduces forwarding redundancy over 10%, but italso prevents some relays from receiving message replicaand reduces delivery ratio by 3%. Figure 16 indicatesthat the two schemes have different tradeoff betweenforwarding performance and redundancy, and should beused according to the specific application scenario andrequirements.

6.3 Performance of Redundancy Exploitation

We first evaluate values of ๐›ผ in practice, and the resultsin Figure 17 show that values of ๐›ผ are proportional to๐‘‡ . When ๐‘‡ increases to 48 hours, the average value of๐›ผ increases over 100%. We notice that values of ๐›ผ aregenerally lower than 1 when ๐‘‡ โ‰ค 12 hours, which meansthat more relays are needed to achieve ๐ท during theshort message lifetime. In contrast, when ๐‘‡ = 48 hours,๐›ผ quickly increases to avoid redundant relays. Similarly,Figure 17(b) shows that higher ๐ท reduces ๐›ผ so that morerelays can be used for forwarding the message.For evaluating the performance of our proposed for-

warding strategy, we use the same experiment settingsas in Section 6.1. The required delivery ratio for eachmessage is uniformly distributed in [0.5๐ท๐‘Ž๐‘ฃ๐‘”, 1.5๐ท๐‘Ž๐‘ฃ๐‘”],and ๐ท๐‘Ž๐‘ฃ๐‘” varies in our experiments. The evaluation

(a) Different ๐‘‡ with ๐ท = 50% (b) Different ๐ท with ๐‘‡ = 24 hours

Fig. 17. Values of ๐›ผ for achieving the required deliveryratio ๐ท in Infocom trace. Delegation and CCP are usedfor forwarding decision.

results are shown in Figure 18 where Delegation andCCP are used for forwarding decision. When ๐ท๐‘Ž๐‘ฃ๐‘”=40%and ๐‘‡ โ‰ค 12 hours, our strategy creates more messagereplicas to ensure that the required ๐ท can be achieved.When ๐‘‡ increases, our strategy avoids redundant relaysand achieves ๐ท with 40% less relays.Comparatively, when ๐ท๐‘Ž๐‘ฃ๐‘”=70%, redundancy percent-

age increases to create more message replicas. Figure18(a) shows that the actual delivery ratio only achieves65% due to limited node contact capability. In this case,our strategy ensures that best-effort forwarding perfor-mance is provided.

7 RELATED WORK

The research on data forwarding in DTNs originatesfrom Epidemic routing [38] which floods the entire net-work. Later studies develop data forwarding strategiesto approach the performance of Epidemic routing withlower forwarding cost, which is measured by the numberof data copies created in the network. While the mostconservative approach always keeps a single data copyand Spray-and-Wait [35] holds a fixed number of datacopies, most schemes leave such numbers as dynamicand make data forwarding decision by comparing the

Page 14: Forwarding Redundancy in Opportunistic Mobile โ€ฆcsce.uark.edu/~qinghual/papers/tmc-redundancy-weigao.pdf1 Forwarding Redundancy in Opportunistic Mobile Networks: Investigation, Elimination

14

(a) Delivery ratio (b) Redundancy Percentage (c) Number of replicas created per message

Fig. 18. Performance of exploiting forwarding redundancy in the Infocom trace. When ๐ท๐‘Ž๐‘ฃ๐‘” = 40%, we furthermorereduce the amount of forwarding redundancy as well as the forwarding cost. When ๐ท๐‘Ž๐‘ฃ๐‘” = 70%, the amount offorwarding redundancy increases to create more message replicas and provides best-effort forwarding performance.

nodesโ€™ utility functions. Representative strategies in-clude Compare-and-Forward [11], [14], Delegation [15]and Spray-and-Focus [36], which were exploited whenstudying forwarding redundancy in this paper. Otherforwarding strategies [37], [39], [8], [29] also aim toachieve various tradeoffs between the data forwardingperformance and cost.The utility functions of mobile nodes, which measure

the nodesโ€™ contact capabilities, are generally indepen-dent from the data forwarding strategies mentionedabove [20]. Various utility functions can be applied tothe same forwarding strategy for different performancerequirements. Some schemes predict node contact ca-pability by estimating their co-location probabilities indifferent ways, such as the Kalman filter [9] and semi-Markov chains [40]. In some other schemes, node contactpattern is exploited as abstraction of node mobilitypattern for better prediction accuracy, based on theexperimental [7], [27] and theoretical [6] analysis onthe node contact characteristics. Such node contacts aredetected via energy-efficient periodic probing methods[1], [21], [24], and the detected contact history is thenused to predict the nodesโ€™ capability of contacting othersin the future. MaxProp [5] estimates the node contactlikelihood based on the contact counts in the past, andPodNet [28] forwards data to nodes based on theirreceived data queries in the past.Social properties of human mobility including cen-

trality and community structures are also exploited forforwarding messages [25], [22]. SimBet [10] uses ego-centric betweenness as relay selection metric, and BUB-BLE Rap [25] considers node centrality hierarchically insocial community structures. [22] exploited both central-ity and social communities for multicasting, and pro-posed Cumulative Contact Probability (CCP) as the util-ity function for data forwarding based on the cumulativenode contact rates and the assumption of exponentialdistribution of pairwise node inter-contact time. SuchCCP metric was also used in this paper. [19] furthermoreextends CCP to the multi-hop network scope.

Social community structure in opportunistic mobilenetworks, on the other hand, is usually used to deter-mine the network scope for evaluating node centrality,and can be detected in a fully distributed manner in var-ious ways [26]. ๐‘˜-clique-based [34] method enables thedetection of overlapping communities, and modularity-based method [33] works on weighted network contactgraph. Based on such community detection techniques,BUBBLE Rap [25] exploited social community structuresfor data forwarding in opportunistic mobile networksbased on the cumulative node contact characteristics.Node centrality is evaluated at various network scopesaccording to the community boundary of the destination,and data is hence forwarded in a hierarchical manner.

8 CONCLUSIONS

In this paper, we study forwarding redundancy in op-portunistic mobile networks, which may seriously im-pair the forwarding performance. We investigate itscharacteristics from both theoretical and experimentalperspectives, and propose effective schemes to elimi-nate this redundancy with limited network informa-tion. We furthermore exploit this redundancy adaptivelyto satisfy specific performance requirements of mobileapplications. Extensive trace-driven simulations showthat our schemes effectively improve forwarding perfor-mance with much lower cost.

REFERENCES

[1] M. Bakht, M. Trower, and R. H. Kravets. Searchlight: Wonโ€™t yoube my neighbor? In Proceedings of the 18th annual internationalconference on Mobile Computing and Networking (MobiCom), pages185โ€“196. ACM, 2012.

[2] A. Balasubramanian, B. Levine, and A. Venkataramani. DTNRouting As a Resource Allocation Problem. In Proceedings ofSIGCOMM, 2007.

[3] A. Balasubramanian, R. Mahajan, A. Venkataramani, B. Levine,and J. Zahorjan. Interactive wifi connectivity for moving vehicles.In Proceedings of ACM SIGCOMM, pages 427โ€“438, 2008.

[4] G. Box, G. M. Jenkins, and G. C. Reinsel. Time Series Analysis:Forecasting and Control. Prentice-Hall, 3rd edition, 1994.

Page 15: Forwarding Redundancy in Opportunistic Mobile โ€ฆcsce.uark.edu/~qinghual/papers/tmc-redundancy-weigao.pdf1 Forwarding Redundancy in Opportunistic Mobile Networks: Investigation, Elimination

15

[5] J. Burgess, B. Gallagher, D. Jensen, and B. Levine. Maxprop:Routing for vehicle-based disruption-tolerant networks. Proc.INFOCOM, 2006.

[6] H. Cai and D. Y. Eun. Crossing over the bounded domain: fromexponential to power-law inter-meeting time in manet. Proc.MobiCom, pages 159โ€“170, 2007.

[7] A. Chaintreau, P. Hui, J. Crowcroft, C. Diot, R. Gass, and J. Scott.Impact of Human Mobility on Opportunistic Forwarding Algo-rithms. IEEE Trans. on Mobile Computing, 6(6):606โ€“620, 2007.

[8] S. Chen, Y. Li, M. Huang, Y. Zhu, and Y. Wang. Energy-balancedcooperative routing in multihop wireless networks. Wirelessnetworks, 19(6):1087โ€“1099, 2013.

[9] P. Costa, C. Mascolo, M. Musolesi, and G. Picco. Socially AwareRouting for Publish-Subscribe in Delay-Tolerant Mobile Ad HocNetworks. IEEE Journal on Selected Areas in Communications,26(5):748โ€“760, 2008.

[10] E. Daly and M. Haahr. Social network analysis for routing indisconnected delay-tolerant MANETs. Proc. MobiHoc, 2007.

[11] H. Dubois-Ferriere, M. Grossglauser, and M. Vetterli. Age mat-ters: efficient route discovery in mobile ad hoc networks usingencounter ages. Proc. MobiHoc, pages 257โ€“266, 2003.

[12] N. Eagle and A. Pentland. Reality mining: sensing complex socialsystems. Personal and Ubiquitous Computing, 10(4):255โ€“268, 2006.

[13] J. Eriksson, L. Girod, B. Hull, R. Newton, S. Madden, and H. Bal-akrishnan. The Pothole Patrol: Using a Mobile Sensor Network forRoad Surface Monitoring. In Proceeding of MobiSys. ACM, 2008.

[14] V. Erramilli, A. Chaintreau, M. Crovella, and C. Diot. Diversityof Forwarding Paths in Pocket Switched Networks. In Proceedingsof IMC, pages 161โ€“174. ACM, 2007.

[15] V. Erramilli, A. Chaintreau, M. Crovella, and C. Diot. DelegationForwarding. Proc. MobiHoc, 2008.

[16] K. Fall. A Delay-Tolerant Network Architecture for ChallengedInternets. Proc. SIGCOMM, pages 27โ€“34, 2003.

[17] L. Freeman. A set of measures of centrality based on betweenness.Sociometry, 40(1):35โ€“41, 1977.

[18] W. Gao and G. Cao. On Exploiting Transient Contact Patterns forData Forwarding in Delay Tolerant Networks. In Proceedings ofICNP, 2010.

[19] W. Gao and G. Cao. User-centric data dissemination in disruptiontolerant networks. In Proceedings of INFOCOM, 2011.

[20] W. Gao, G. Cao, T. La Porta, and J. Han. On exploiting tran-sient social contact patterns for data forwarding in delay-tolerantnetworks. IEEE Transactions on Mobile Computing, 12(1):151โ€“165,2013.

[21] W. Gao and Q. Li. Wakeup scheduling for energy-efficientcommunication in opportunistic mobile networks. In Proceedingsof IEEE INFOCOM, pages 2058โ€“2066. IEEE, 2013.

[22] W. Gao, Q. Li, B. Zhao, and G. Cao. Multicasting in delay tolerantnetworks: a social network perspective. In Proceedings of MobiHoc,pages 299โ€“308, 2009.

[23] W. Gao, Q. Li, B. Zhao, and G. Cao. Social-aware multicast indisruption-tolerant networks. IEEE/ACM Transactions on Network-ing, 20(5):1553โ€“1566, 2012.

[24] W. Hu, G. Cao, S. V. Krishanamurthy, and P. Mohapatra. Mobility-assisted energy-aware user contact detection in mobile socialnetworks. In Proceedings of the IEEE 33rd International Conferenceon Distributed Computing Systems (ICDCS), pages 155โ€“164, 2013.

[25] P. Hui, J. Crowcroft, and E. Yoneki. Bubble rap: social-basedforwarding in delay tolerant networks. Proc. MobiHoc, 2008.

[26] P. Hui, E. Yoneki, S. Chan, and J. Crowcroft. Distributed commu-nity detection in delay tolerant networks. Proc. MobiArch, 2007.

[27] T. Karagiannis, J.-Y. Boudec, and M. Vojnovic. Power law andexponential decay of inter contact times between mobile devices.Proc. MobiCom, pages 183โ€“194, 2007.

[28] V. Lenders, G. Karlsson, and M. May. Wireless Ad hoc Podcasting.In Proceedings of SECON, pages 273โ€“283, 2007.

[29] F. Li, L. Zhao, C. Zhang, Z. Gao, and Y. Wang. Routing withmulti-level cross-community social groups in mobile opportunis-tic networks. Personal and Ubiquitous Computing, 18(2):385โ€“396,2014.

[30] A. Lindgren, A. Doria, and O. Schelen. Probabilistic routingin intermittently connected networks. ACM SIGMOBILE CCR,7(3):19โ€“20, 2003.

[31] S. Martello and P. Toth. Knapsack problems: algorithms and computerimplementations. John Wiley & Sons, 1990.

[32] M. McNett and G. Voelker. Access and mobility of wireless PDAusers. ACM SIGMOBILE CCR, 9(2):40โ€“55, 2005.

[33] M. Newman. Analysis of weighted networks. Physical Review E,70(5), 2004.

[34] G. Palla, I. Derenyi, I. Farkas, and T. Vicsek. Uncovering theoverlapping community structure of complex networks in natureand society. Nature, 435(7043):814โ€“818, 2005.

[35] T. Spyropoulos, K. Psounis, and C. Raghavendra. Spray and wait:an efficient routing scheme for intermittently connected mobilenetworks. In Proceedings of 2005 ACM SIGCOMM workshop onDelay-tolerant networking, pages 252โ€“259, 2005.

[36] T. Spyropoulos, K. Psounis, and C. Raghavendra. Efficient routingin intermittently connected mobile networks: The multiple-copycase. IEEE/ACM Transactions on Networking, 16(1):77โ€“90, 2008.

[37] X. Tie, A. Venkataramani, and A. Balasubramanian. R3: Robustreplication routing in wireless networks with diverse connectivitycharacteristics. In Proceedings of the 17th annual internationalconference on Mobile computing and networking (MobiCom), pages181โ€“192. ACM, 2011.

[38] A. Vahdat and D. Becker. Epidemic routing for partially connectedad hoc networks. Technical Report CS-200006, Duke University,2000.

[39] S. Wang, M. Liu, X. Cheng, Z. Li, J. Huang, and B. Chen. Hero:A home based routing in pocket switched networks. In WirelessAlgorithms, Systems, and Applications (WASA), pages 20โ€“30. 2012.

[40] Q. Yuan, I. Cardei, and J. Wu. Predict and relay: an efficientrouting in disruption-tolerant networks. In Proc. MobiHoc, pages95โ€“104, 2009.

Wei Gao received the BE degree in electricalengineering from the University of Science andTechnology of China in 2005 and the PhD de-gree in computer science from the Pennsylva-nia State University in 2012. He is currently anassistant professor in the Department of Elec-trical Engineering and Computer Science at theUniversity of Tennessee, Knoxville. His researchinterests include wireless and mobile networksystems, mobile social networks, mobile cloudcomputing, and cyber-physical systems. He is a

member of the IEEE.

Qinghua Li received the BE degree from XianJiaotong University, the MS degree from Ts-inghua University, and the PhD degree from ThePennsylvania State University. In 2013, he joinedthe University of Arkansas, where he is currentlyan Assistant Professor in the Department ofComputer Science and Computer Engineering.His research interests are security and privacyin networking and computing systems includingmobile sensing, smart grid, mobile cloud com-puting, and healthcare systems. He is a member

of the IEEE.

Guohong Cao received the BS degree in com-puter science from Xian Jiaotong University andreceived the PhD degree in computer sciencefrom the Ohio State University in 1999. Sincethen, he has been with the Department of Com-puter Science and Engineering at the Pennsyl-vania State University, where he is currently aProfessor. His research interests include wire-less networks, wireless security, vehicular net-works, wireless sensor networks, cache man-agement, and distributed fault tolerant comput-

ing. He has served on the editorial board of IEEE Transactions onMobile Computing, IEEE Transactions on Wireless Communications,IEEE Transactions on Vehicular Technology, and has served on theorganizing and technical program committees of many conferences,including the TPC Chair/Co-Chair of IEEE SRDSโ€™2009, MASSโ€™2010,and INFOCOMโ€™2013. He was a recipient of the NSF CAREER awardin 2001. He is a Fellow of the IEEE.