skip to main content
10.1145/1582379.1582479acmconferencesArticle/Chapter ViewAbstractPublication PagesiwcmcConference Proceedingsconference-collections
research-article

N-Drop: congestion control strategy under epidemic routing in DTN

Authors Info & Claims
Published:21 June 2009Publication History

ABSTRACT

Delay-Tolerant Networks are wireless networks where disconnections may occur frequently due to node mobility, power outages and propagation phenomena. In order to achieve date delivery, store-and-forward protocols are used in DTN and routing protocols based on epidemic message dissemination has been proposed, such as Epidemic routing. Under Epidemic routing, packets can be delivered completely between every tow nodes if every node buffer is big enough and the communication time is long enough after one node contacts another one. But congestion will occur easily at a node if the buffer of this node is limited under Epidemic routing in DTN. In order to solve this problem, a congestion control strategy was introduced. If a node buffer is full and it needs to store a new packet, every packet in the node buffer will be checked, in order to find out the packets whose numbers of forwarding are over N and then erase them. If there is no packet whose number of forwarding is over N, the last packet will be erased. The strategy is called N-Drop. Using simulations based on a random waypoint model, the simulation results proved the improvement of our strategy.

References

  1. Vinton Cerf, Scott Burleigh, Adrian Hooke, Leigh Torgerson, Robert Durst, Keith Scott, Kevin Fall, and Howard Weiss. 2003 Delay-tolerant network architecture.DTN Research Group Internet Draft, March.Google ScholarGoogle Scholar
  2. S. Burleigh, A. Hooke, L. Torgerson, K, fall, V. Cerf, B. Durst, K. Scott, and H. Weiss. 2003. Delay-tolerant networking: An approach to interplanetary internet. IEEE Communications. (June 2003), 128--137. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Kevin Fall, Wei Hong, and Samuel Madden. 2003. Custody transfer for reliable delivery in delay tolerant networks. Intel Research, Berkeley, California.Google ScholarGoogle Scholar
  4. K. Fall. 2003. A Delay-Tolerant Network Architecture for Challenged Internets. Proceedings of the 2003 conference on Applications. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Amin Vahdat, and David Becker. 2000. Epidemic routing for partially-connected ad hoc networks. Technical Report CS-200006, Duke University.Google ScholarGoogle Scholar
  6. Ahmad, S., Awan, I., Waqqas, A., and Ahmad, B. Performance analysis of DSR & extended DSR protocols. 2008. Modeling & Simulation 2008. AICMS 08.Second Asia International Conference on 13--15 May 2008, 191--196. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Hong-Peng Wang, and Lin Cui. 2008. An enhanced AODV for mobile ad hoc network. Machine Learning and Cybernetics, 2008 International Conference on Volume 2, 12--15 July 2008, 1135--1140.Google ScholarGoogle Scholar
  8. JA. Davis, AH. Fagg, and BN. Levine. 2001. Wearable computers as packet transport mechanisms in highly-partitioned ad-hoc networks. International Symposium on Wearable Computing. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. A. Lindgren and K. S. Phanse. 2006. Evaluation of queuing policies and forwarding stratiogies for routing in intermittently connected networks. In Proc. of IEEE COMSWARE.Google ScholarGoogle Scholar
  10. The network simulator ns-2. http://www.isi.edu./nsnam/ns/.Google ScholarGoogle Scholar

Index Terms

  1. N-Drop: congestion control strategy under epidemic routing in DTN

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      IWCMC '09: Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
      June 2009
      1561 pages
      ISBN:9781605585697
      DOI:10.1145/1582379

      Copyright © 2009 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 21 June 2009

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader