Priority Based Buffer Management Technique for Opportunistic Networks

Opportunistic Networks are composed of wireless nodes opportunistically communicating with each other following the store, carry and forward mechanism. These networks are designed to operate in an environment characterized by high delay, intermittent connectivity and non-guarantee of the end-to-end path between the sender and the destination. The messages are transmitted on the basis of best-effort procedure. If the nodes are not able to forward the message for reasons like missing connectivity, insufficient buffer space or low-confidence among nodes, the messages are temporarily buffered according to the waiting-list policy and it is resumed when the connection is established again. The nodes drop the message on the basis of delete policy in a congested network environment. While there are multiple policies for effective buffer utilization in Opportunistic Networks such as FIFO, LIFO, and Random, none allow message transmission on the basis of message- type. In this paper, a Priority based Buffer Management Technique (PBMT) has been introduced that considers the priority of a message to address the aforementioned problems. This policy allows solving the underlying problem of transmitting messages in a random fashion, by transmitting them in a systematic and orderly method. The proposed PBMT shows considerable difference in routing processes. Simulation results that are provided, confirm that the proposed PBMT is more secure and efficient than traditional buffer management policies for opportunistic networks by using the Haggle INFOCOM 2006 real mobility data trace.

[1]  Kun-Chan Lan,et al.  A Survey of Opportunistic Networks , 2008, 22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008).

[2]  Injong Rhee,et al.  On the levy-walk nature of human mobility , 2011, TNET.

[3]  Jörg Ott,et al.  The ONE simulator for DTN protocol evaluation , 2009, SimuTools.

[4]  Thrasyvoulos Spyropoulos,et al.  Message Drop and Scheduling in DTNs: Theory and Practice , 2012, IEEE Transactions on Mobile Computing.

[5]  Daru Pan,et al.  A comprehensive-integrated buffer management strategy for opportunistic networks , 2013, EURASIP J. Wirel. Commun. Netw..

[6]  Pan Hui,et al.  CRAWDAD dataset cambridge/haggle (v.2009-05-29) , 2009 .

[7]  Juan-Carlos Cano,et al.  Friendly-drop: A social-based buffer management algorithm for opportunistic networks , 2018, 2018 Wireless Days (WD).

[8]  Thrasyvoulos Spyropoulos,et al.  Optimal Buffer Management Policies for Delay Tolerant Networks , 2008, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[9]  Marco Conti,et al.  Human mobility models for opportunistic networks , 2011, IEEE Communications Magazine.

[10]  Arun Venkataramani,et al.  DTN routing as a resource allocation problem , 2007, SIGCOMM '07.

[11]  Sasikala,et al.  A SURVEY ON POSITION – BASED ROUTING IN MOBILE AD HOC NETWORKS , 2013 .

[12]  I. Yeom,et al.  Minimizing the Impact of Buffer Overflow in DTN , 2008 .

[13]  Harminder Singh Bindra,et al.  PERFORMANCE EVALUATION OF MOFO BUFFER MANAGEMENT TECHNIQUE WITH DIFFERENT ROUTING PROTOCOLS IN DTN UNDER VARIABLE MESSAGE BUFFER SIZE , 2014 .

[14]  Kalman Graffi,et al.  Analysis of Buffer Management Policies for Opportunistic Networks , 2016, 2016 25th International Conference on Computer Communication and Networks (ICCCN).

[15]  Donald F. Towsley,et al.  Performance modeling of epidemic routing , 2006, Comput. Networks.

[16]  Martin Mauve,et al.  A survey on position-based routing in mobile ad hoc networks , 2001, IEEE Netw..