An Effective Buffer Management Policy for Opportunistic Networks | SpringerLink
Skip to main content

An Effective Buffer Management Policy for Opportunistic Networks

  • Conference paper
  • First Online:
Collaborate Computing: Networking, Applications and Worksharing (CollaborateCom 2016)

Abstract

Opportunistic networks are wireless networks where disruptions may occur frequently due to the challenging environments. Multiple message replicas have to be propagated to improve delivery probability; combining long-term storage with replication gives rise to a high storage overhead. Many forward/drop policies have been proposed to achieve high delivery ratio, low latencies and low overheads. These policies have improved the performance of opportunistic networks to some extent. However, they all have their own disadvantages. Therefore, an efficient buffer management policy based on the average encounter frequency and the average encounter duration of nodes is proposed in this paper. Simulation results show that our buffer management policy has better performance than the existing DO, DF, MDC-SR and the ACF-based policy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Xiong, Y.P., Sun, L.M., Niu, J.W., et al.: Opportunistic networks. J. Softw. 20, 124–137 (2009)

    Article  Google Scholar 

  2. Tekdas, O., Bhadauria, D., Isler, V.: Efficient data collection from wireless nodes under the two-ring communication model. Int. J. Robot. Res. 31, 774–784 (2012)

    Article  Google Scholar 

  3. Wang C., Wang W., Sohraby K., et al.: QoS optimized and energy efficient power control for deep space multimedia communications in InterPlaNetary networks. In: International Conference on Wireless for Space and Extreme Environments, pp. 1–3. IEEE (2013)

    Google Scholar 

  4. Burgess, J., Gallagher, B., Jensen, D., et al.: MaxProp: Routing for vehicle-based disruption-tolerant networks. In: Proceedings - IEEE INFOCOM, pp. 1–11 (2006)

    Google Scholar 

  5. Krishnan, R., Basu, P., Mikkelson, J.M., et al.: The SPINDLE disruption-tolerant networking system. In: Military Communications Conference, pp. 1017–1023. IEEE (2007)

    Google Scholar 

  6. Rashid, S., Ayub, Q., Zahid, M.S.M., et al.: Impact of mobility models on DLA (Drop Largest) optimized DTN epidemic routing protocol. Int. J. Comput. Appl. 18, 35–39 (2011)

    Google Scholar 

  7. Jain, S., Chawla, M.: Survey of buffer management policies for delay tolerant networks. J. Eng. (2014)

    Google Scholar 

  8. Zhang, X., Neglia, G., Kurose, J., et al.: Performance modeling of epidemic routing. Comput. Netw. 51, 827–839 (2006)

    MATH  Google Scholar 

  9. Krifa, A., Barakat, C., Spyropoulos, T.: An optimal joint scheduling and drop policy for delay tolerant networks. In: World of Wireless, Mobile and Multimedia Networks, pp. 1–6. IEEE, California (2008)

    Google Scholar 

  10. Lindgren, A., Phanse, K.S.: Evaluation of queueing policies and forwarding strategies for routing in intermittently connected networks. In: International Conference on Communication System Software and Middleware, pp. 1–10. IEEE (2006)

    Google Scholar 

  11. Rashid, S., Ayub, Q., Zahid, M.S.M., et al.: Message drop control buffer management policy for DTN routing protocols. Wireless Pers. Commun. 72, 653–669 (2013)

    Article  Google Scholar 

  12. Rashid, S., Ayub, Q., Soperi, M.Z.M., et al.: E DROP an effective drop buffer management policy for DTN routing protocols. Int. J. Comput. Appl. 13, 8–13 (2010)

    Google Scholar 

  13. Rashid, S., Abdullah, A.H., Soperi, M., et al.: Mean drop an effectual buffer management policy for delay tolerant network (2012)

    Google Scholar 

  14. Ayub, Q., Rashid, S., Zahid, M.S.M.: Buffer scheduling policy for opportunitic networks (2013)

    Google Scholar 

  15. Ayub, Q., Rashid, S.: T-Drop: An optimal buffer management policy to improve QOS in DTN routing protocols. J. Comput. 2, 46–50 (2010)

    Google Scholar 

  16. Tang, L., Chai, Y., Li, Y., et al.: Buffer management policies in opportunistic networks. J. Comput. Inf. Syst. 8, 5149–5159 (2012)

    Google Scholar 

  17. Keränen, A., Ott, J., et al.: The ONE simulator for DTN protocol evaluation. In: International Conference on Simulation TOOLS and Techniques for Communications, Networks and Systems, Simutools, Rome, Italy (2009)

    Google Scholar 

Download references

Acknowledgments

This work was partly supported by the NSFC-Guangdong Joint Found(U1501254) and the Co-construction Program with the Beijing Municipal Commission of Education and the Ministry of Science and Technology of China(2012BAH45B01) and the Fundamental Research Funds for the Central Universities (BUPT2011RCZJ16, 2014ZD03-03) and China Information Security Special Fund (NDRC).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wenbin Yao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Chen, Y., Yao, W., Zong, M., Wang, D. (2017). An Effective Buffer Management Policy for Opportunistic Networks. In: Wang, S., Zhou, A. (eds) Collaborate Computing: Networking, Applications and Worksharing. CollaborateCom 2016. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 201. Springer, Cham. https://doi.org/10.1007/978-3-319-59288-6_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-59288-6_22

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-59287-9

  • Online ISBN: 978-3-319-59288-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics