Interplay of contact times, fragmentation and coding in DTNs

Models describing DTNs proposed in the last few years have been focusing on message replication policies able to achieve high delivery probability at the cost of network resources, e.g., message copies. To this respect, the duration of contact events is the physical constraint that dictates how fine a large message should be fragmented into packets in order to match finite contacts duration. The price to pay, indeed, is that the source has to deliver a larger number of packets per message. In this paper we model the combined effect of message fragmentation and buffering and describe the structure of the forwarding process in closed form when the message is split into K packets and delivered to the destination. We consider the specific case of sequential forwarding, where the source delivers fragmented message packets in order to relays. In this case the interplay of forwarding and message fragmentation can be expressed in closed form by coupling the combinatorial structure for packet forwarding and fluid models for the replication of packets in the network. By deriving the closed form expression for the delivery probability, we are able to derive the optimal fragmentation K* as a function of the contact time distribution. Finally, results on sequential forwarding are applied to derive performance figures for the case when fountain coding is applied: redundancy is added to the original information with the aim to increase the message delivery probability. The paper is completed by numerical results.

[1]  John J. Metzner,et al.  An Improved Broadcast Retransmission Protocol , 1984, IEEE Trans. Commun..

[2]  Antoine Zoghbiu,et al.  Fast Algorithms for Generating Integer Partitions , 1994 .

[3]  Christian Huitema,et al.  The case for packet level FEC , 1996, Protocols for High-Speed Networks.

[4]  Donald F. Towsley,et al.  Parity-based loss recovery for reliable multicast transmission , 1997, TNET.

[5]  Ivan Stojmenovic,et al.  Fast algorithms for genegrating integer partitions , 1998, Int. J. Comput. Math..

[6]  Don Towsley,et al.  Real-Time Reliable Multicast Using Proactive Forward Error Correction TITLE2: , 1998 .

[7]  Michael Luby,et al.  LT codes , 2002, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..

[8]  David Tse,et al.  Mobility increases the capacity of ad hoc wireless networks , 2002, TNET.

[9]  David J. C. MacKay,et al.  Information Theory, Inference, and Learning Algorithms , 2004, IEEE Transactions on Information Theory.

[10]  Rabin K. Patra,et al.  Using redundancy to cope with failures in a delay tolerant network , 2005, SIGCOMM '05.

[11]  Jörg Widmer,et al.  Network coding for efficient communication in extreme networks , 2005, WDTN '05.

[12]  Margaret Martonosi,et al.  Erasure-coding based routing for opportunistic networks , 2005, WDTN '05.

[13]  Yunfeng Lin,et al.  Performance modeling of network coding in epidemic routing , 2007, MobiOpp '07.

[14]  Baochun Li,et al.  Stochastic analysis of network coding in epidemic routing , 2008, IEEE Journal on Selected Areas in Communications.

[15]  Baochun Li,et al.  Efficient Network Coded Data Transmissions in Disruption Tolerant Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[16]  Francesco De Pellegrini,et al.  Dynamic control of Coding in Delay Tolerant Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[17]  Jie Wu,et al.  CFP: Integration of Fountain Codes and Optimal Probabilistic Forwarding in DTNs , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[18]  Eitan Altman,et al.  Forward Correction and Fountain Codes in Delay-Tolerant Networks , 2008, IEEE/ACM Transactions on Networking.

[19]  Muriel Médard,et al.  Inter-session network coding in delay-tolerant networks under Spray-and-Wait routing , 2012, 2012 10th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt).