You are on page 1of 4

118 (IJCNS) International Journal of Computer and Network Security,

Vol. 2, No. 9, September 2010

Efficient Buffer management Policy DLA for DTN


Routing Protocols under Congestion
Sulma Rashid1, Qaisar Ayub2
Universiti Teknologi Malaysia (UTM)
, Faculty of Computer Science & Information System,
Department of Computer System & Communication
Skudai - Johor, 81310, Malaysia
1
sulmaqaiser@gmail.com
2
sheikhqaisar@gmail.com

Abstract: In DTN networks end-to-end path may not be exist buffer management issues, but an efficient [13] buffer
and disconnections may occur frequently due to propagation management scheme is still required to overcome
delay, node mobility, power outage and operational environment congestion.
(deep space underwater). Thus transmission in such
In this work we propose an efficient buffer management
environments follow store-carry-forward strategy in which a
node store the message in buffer, carries it while moving and
policy (DLA) to improve message delivery, message drop,
transmit when connection becomes available. In addition overhead ratio and buffer time average under highly
multiple copies of message may be forwarded to increase the congested network. To evaluate the performance of our
delivery probability. In such case the node buffer becomes the proposed buffer management policy we use ONE simulator
critical recourse and need to be managed effectively to overcome [5]. We have performed the simulations with spray&wait,
congestion and message drop ratio. The efficient buffer direct contact, First contact and Epidemic routing protocols.
management policy deals which message to drop when
The proposed scheme performs well only delivery ratio in
congestion arises. In this paper we propose a new buffer
management policy for DTN in which when the node buffer is case of epidemic routing is minimized.
congested and it needs to store a new message, the large size The rest of paper is organized follows Section 2 discuss
message from the buffer will be dropped. The strategy is called existing buffer management policies. Section 3 summarizes
drop largest (DLA). We prove through the simulation that our performance metrics. Section 4 describes evaluation our
buffer management policy (DLA) outperforms well as compared buffer management policy under routing protocols. Section
to existing Drop Oldest. 5 is about proposed algorithm (DLA). Section 6-7 is for
Keywords: Delay Tolerance Network DTN, DLA (Drop
simulation results and conclusion.
largest), DO (Drop oldest), Algorithm

1. Introduction 2. Existing buffer management policies


The traditional network (Ad-hoc, TCP/IP) required end-to- 2.1 Drop Random(DR)
The selection of message to be dropped is random.
end path and can not be implemented in rebellion wireless
applications e.g. Military networks, vehicle ad hoc network,
2.2 Drop –Least-Recently-Received (DLR)
wild life tracking sensor networks where the connectivity is
The message with the long stay time in buffer will be
not stable due to node mobility, low power nodes dropped. The idea is that the packet with in buffer for long
periodically shutting down. In order to cope with time has less probability to be passed to other nodes.
disconnections researcher have proposed a new protocol
Delay Tolerance Network DTN [1], [2], [7] and [14]. DTN 2.3 Drop-Oldest (DOA)
routing protocols have adopted a “store-carry forward” The message with the shorted remaining life time (TTL) in
paradigm, where each node in the network stores a packet network is dropped. The idea of dropping such packet is that
that has been forwarded to it by other nodes, carries the if packet TTL is small, it is in the network for long time and
packet while it moves around, and forwards or duplicates it thus has high probability to be already delivered.
to other nodes (or the destination node) when they come
within transmission range. 2.4 DL-Drop last(DL)
Nodes under DTN protocol may not have complete It drops the newly received message.
information about network; therefore message is replicated
to increase the delivery probability like Epidemic [6]. Due to 2.5 Drop front(DF)
low data rates and short duration of node encounters The message that enters first in the queue is dropped first.
epidemic was modified by spray-and-wait [2-4], K-hop
2.6 N-Drop
probabilistic forwarding [12].
In N-Dropt [17], the message that does N number of
It is evicted that storage of message for long time and its
forwarding will be selected to drop.
replication [6], [14], [3] make buffer run out of capacity and
effect the performance of router. Some recent work [8]-[11],
[17] and [18] addressed few transmission scheduling and
(IJCNS) International Journal of Computer and Network Security, 119
Vol. 2, No. 9, September 2010

3. Performance metrics probability of reaching their destination.

3.1 Message delivery


5. Algorithm (DLA)
It is a function of measuring messages that are correctly
received by the final destination within a given time period. In normal scenario there are two possibilities where a
message will be dropped, after expiration of TTL, when
delivered to destination. When node buffer is fully occupied
3.2 Buffer time average and a new message turns up, the problem is which message
The buffer time average is the function of measuring the from buffer will be chosen to drop (Congestion drop).
average time spends by all messages in node buffer. Assume M messages are propagated in the network using
replication. We consider a time instant where NODE-A is
3.3 Message drop
packed full and a new message copy M6 of size 300kb
It is a function to count number of messages dropped during arrives from NODE-B.
transmission.
Node-A Node-B
3.4 Overhead ratio
It is negation of number of message relayed to message
delivered.

4. Routing protocol under evaluation Figure 1. Congested buffer


4.1 Spray&wait (SW) DOA algorithm drop oldest messages from buffer until room
of 300kb becomes available, NODE-A will drop M1, M2,
Spray & wait [3] is a routing protocol that attempts to gain M3, and M4 to free enough space (300kb) for new message.
the delivery ratio benefits of replication-based routing as DOA algorithm drop oldest messages from buffer until room
well as the low resource utilization benefits of forwarding- of 300kb becomes available, NODE-A will drop M1, M2,
based routing like direct transmission. M3, and M4 to free enough space (300kb) for new message.
The Spray and Wait protocol is composed of two phases: DLA policy drop large size message which is M5. Hence the
the spray phase and the wait phase. When a new message is drop and overhead is considerably reduced while message
created in the system, a number L is attached to that (M1, M2, M3, and M4) stay in network which increase the
message indicating the maximum allowable copies of the delivery of messages.
message in the network. During the spray phase, the source
Table 1: Variables
of the message is responsible for "spraying", or delivery, to
Variable Description
one copy to L distinct "relays". When a relay receives the Ni Number of i node i={1,2,3….n}
copy, it enters the wait phase, where the relay simply holds SM Size of message
that particular message until the destination is encountered BN Buffer size at each node
directly. In other words, Spray and Wait could be viewed as BNA Buffer available at each node
a tradeoff between single and multi-copy schemes. Nc Node holding the connection counter
MN New message
4.2 First contact (FC) MR Messages currently help by router
In first contact [15] and [16] routing, the router transmits Bu Buffer in use
the message randomly as other nodes come under its
Check available buffer space
communication range. Under congested networks the for each message in MR
messages can not route. Bu = getsize (MRi) + Bu;
4.3 Direct delivery (DD) end loop;
BNA = BN-Bu
The source node [16] transmits the message to other node if SM (Node or Relay) < BNA THEN
only when other node is its destination. ADD (MRiàBN, MN)
end if;
Direct delivery can be considered a hybrid technique as one if SM(Source or Relay) > BNA THEN
can include it in flooding where Direct Delivery always /* drop some message to make room for new message*/
select the direct path between source and destination. Greatest = 0;
/* Find the message with large size */
while (SM >BNA)
4.4 Epidemic routing For each message M in MR
begin
Epidemic Routing [6] spread application messages to nodes, If Size (MRi ) > Greatest Then
called carriers, within connected areas of ad hoc networks. Greatest= Sizeof (MRi)
end if
In Epidemic Routing when carriers coming into contact end loop; //for loop
with another connected portion of the network through node end loop; //while loop
Remove (MRàBNA, Greatest);
mobility it spread the message to nodes. Through such end;
iterative transmission of data, messages have a high Algorithm DLA
120 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 9, September 2010

space as described in algorithm (section 4). In Epidemic


6. Simulation and results routing the message delivery was affected but message drop
is almost half then then existing DOA, DLA have optimized
In the following section we have examined routing protocols the message drop metric.
(Section 4), with exiting (DOA) and proposed (DLA).
All the experiments were performed using ONE Simulator.
The ONE [5] Simulator is a discrete event simulator written
in Java. The main objective of simulator is to implement
DTN (store-carry-forward) of message for long time, where
the probability of disconnections and failures increased.

Table 2: Simulation setup


Number of Nodes 126
Movement model 1 Shortest path map based movement
Movement model 2 Map rout movement
Number of groups 06
Buffer size 5MB
Transmission range 10M
Transmission speed 250 K
Figure 4. Overhead ratio (DLA, DO)
Message creation interval 24-35 (seconds)
Figure 4 represents the influence of DLA and DOA with
respect to overhead. We can see clearly that overhead ratio
with DLA is decrease in all routers. In DD due to direct
transmission overhead is zero for both algorithms, while
Epidemic overhead is reduced to considerable extent.

Figure 2. Message delivery (DLA, DOA)


First we consider message delivery of routing protocols with
DOA and DLA, which is shown in figure 2. It is easy to see
that different routers have varying impact on message
delivery, but higher delivery in case of spray&wait and
direct delivery router. First contact with DLA lies between
spary&waits and Direct delivery, but gain high message
delivery then DOA. However in all the configuration of Figure 5. Buffer time average
routers, message delivery of DLA is improved then DOA Fig 5 observes buffer time average with DLA and DOA. It
only effected in Epidemic router but improves other metrics can be clearly seen that DLA has high value of buffer time
discussed later and is trade off. average with all router.
7. Conclusion & future work
In this paper we propose an efficient buffer management
policy DLA which drop large size messages when the node
buffer is congested.
Its also optimize the routers performance metrics like
message delivery , message drop, overhead ratio and buffer
time average compared to DOA. Future work is to
investigate the DLA (Drop Largest) technique with all
existing buffer management policies.

Figure 3. Message dropped (DLA, DOA) References


[1] S. Jain, K. Fall, and R. Patra, “Routing in a delay
Figure 3 plot the impact of message drop with DLA and Tolerant network,” in Proceedings of ACM SIGCOMM,
DOA. In all router configurations DLA reduce the message pp.145-158, 2004.
drops to a significant quantity. We can observe the strength [2] T. Small and Z. J. Haas.” Resource and performance
of DLA, which drop large size message and free more buffer
(IJCNS) International Journal of Computer and Network Security, 121
Vol. 2, No. 9, September 2010

Trade offs in delay-tolerant wireless networks,” in [17] Yun Li, Ling Zhao ,Zhanjun Liu,Qilie Liu.” N-Drop
SIGCOMM Workshop on Delay Tolerant Networking Congestion Control strategy under Epidemic Routing in
(WDTN), pp.260-267, 2005. DTN.” Research center for wireless information
[3] T. Spyropoulos, K. Psounis, and C. S. Ranghavendra networks,chongqing university of posts &
“Spray and wait: an efficient routing scheme for Telecommunications ,chongqing 400065,china, pp. 457-
intemitteltly connected mobile networks,” in Proceedings 460, 2009.
of the ACM SIGCOMM workshop on Delay-tolerant [18] indgren and K. S. Phanse, “Evaluation of queuing
networking.pp. 252-259, 2005. policies and forwarding strategies for routing in
[4] T. Spyropoulos, K. Psounis, and C. Raghavendra. intermittently connected networks,”in Proc. of IEEE
“Efficient Routing in Intermittently Connected Mobile COMSWARE, pp. 1-10, Jan. 2006.
Networks: The Multi-copy Case,”IEEE/ACM
Transactions on Networking (TON), vol. 16 , pp. 77-
90,Feb. 2008 Sulma Rashid She has received her MS
[5] Homepage of Opportunistic Network Environment Degree in computer science in 2007 from
(ONE). http://www.netlab.tkk._/%7Ejo/dtn/#one, Version IQRA University Islamabad Pakistan and MCS
1, Accessed July 2010. degree in 2001 from UAAR Pakistan. She has
10 years of teaching experience. Her areas of
[6] A. Vahdat and D. Becker, “Epidemic routing for
interest are DTN, Adhoc, security, Network
partially connected ad hoc networks,” Duke University, programming, Operating system, wireless networks and MANETS.
Tech. Rep. CS-200006, Apr. 2000. As a part of this paper she is working on Optimizing and
[7] K. Scott and S. Burleigh, “Bundle protocol forwarding research issues in DTN routing.
Specification.” RFC 5050, November 2007.
[8] J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine. Qaisar Ayub He has obtained his MCS
“MaxProp: Routing for Vehicle-Based Disruption- Computer Science degree in 2005 from
Tolerant Networks”. In IEEE International Conference on Comsat Institute of Information Technology
Computer Communications (INFOCOM),pp. 1-1, 2006. Pakistan. And BCS (Hons.) computer science
from Allama Iqbal Open University Pakistan
[9] A. Balasubramanian, B. N. Levine, and A.
in 2003.
Venkataramani. “DTN Routing as a Resource Allocation He has 5 years of experience in conducting
Problem,”. In ACM Conference on Applications, professional trainings (Oracle, Java,) and software development.
Technologies, and Protocols for Computer As a part of this paper he is working on QOS in DTN routing.
Communication (SIGCOMM), pp. 373 – 384, 2007.
[10] D. Aldous and J. Fill, “Reversible markov chains and
random walks on graphs. (monograph in preparation.),”
http://statwww.berkeley.edu/users/aldous/RWG/book.html
.
[11] A. Krifa, C. Barakat, and T. Spyropoulos.” Optimal
buffer management policies for delay tolerant
networks”.In IEEE Communications Society Conference
on Sensor, Mesh and Ad Hoc Communications and
Networks (SECON), pp. 260-268, 2008.
[12] A. Lindgren, A. Doria, and O. Schelen, “Probabilistic
routing in intermittently connected networks,”
SIGMOBILE Mobile Computing and Communication
Review, vol. 7, no. 3, 2003.
[13] Ms. E. Jenefa JebaJothi , Dr. V. Kavitha , Ms. T.
Kavitha “Contention Based Routing in Mobile Ad Hoc
Networks with Multiple Copies” JOURNAL OF
COMPUTING, VOLUME 2, ISSUE 5, pp.14-19, MAY
2010.
[14] J.-Y. L BOUDEC, AND M. VOJNOVIC, “Perfect
Simulation and Stationary of a Class of Mobility Models”.
In Proc. Of IEEE Infocom, pp.2743 - 2754, 2005.
[15] A. KERÄNEN AND J. OTT, Increasing Reality for
DTN Protocol Simulations. Tech. rep., Helsinki
University of Technology, Networking Laboratory, July
2007.
[16] T. Spyropoulos, K. Psounis, and C. Raghavendra A,
C. S. “Single-copy routing in intermittently connected
mobile networks,” IEEE/ACM Transactions on
Networking (TON), vol. 16, pp. 63-76, Feb. 2008.

You might also like