Skip to main content

A framework for performance analysis of geographic delay-tolerant routing

Abstract

A major tool used for evaluating routing protocols in ad hoc and delay-tolerant networks is simulation. Whereas the results from simulations give good insights, they are limited to the specific scenario set-up that is used. If the scenario changes, new and often time-consuming simulations have to be run. Moreover, the simulation time in packet-level simulators with fairly realistic physical layer implementation, such as ns-2, generally grows rapidly in the number of nodes. This practically limits the number of nodes in a simulation, even if the limit can be extended by the use of simulation federations. Larger scenarios can also be facilitated by the use of more abstraction in the physical layer; abstractions that may impact the validity of the results. In this article, we present the forward-wait framework--a mathematical model describing the packet movements for opportunistic geographic delay-tolerant routing protocols. By describing packet movements as a sequence of alternating forwarding and waiting phases, the framework can accurately predict the routing performance. Key input parameters to the framework are random variables describing the forwarding and waiting phases. We show how the properties of the random variables can be derived, both via abstract modeling and small scale ns-2 simulation data. The model is then used to demonstrate the prediction capabilities of the framework in providing results that are close to the (much slower) packet-level simulations.

1. Introduction

Simulation is the most common method for evaluating routing protocols in infrastructure-free wireless communication networks. Using detailed network modeling, simulation enables us to examine the performance of routing protocols without incurring the high costs associated with practical experiments. However, with high fidelity simulations, the simulation time grows rapidly with the number of nodes. Scaling up simulations in terms of number of nodes typically requires the use of a more abstract physical layer or simulation federations.

Instead of relying on a simulator to provide routing performance, we propose the forward-wait mathematical framework to provide key performance properties of geographic routing protocols. The framework is suitable for intermittently connected mobile ad hoc networks (IC-MANETs) where the routing consists of alternating forwarding and waiting phases. In the forwarding phase, a packet is forwarded towards the destination by a partial path, and in the waiting phase a packet is stored at a node awaiting the formation of a new partial path that can forward the packet further towards the destination. The model is applicable to all protocols characterized by alternating forwarding and waiting phases. As an example, we use the Location-Aware Routing for Delay-tolerant networks (LAROD) [1] for numerical performance evaluation.

For opportunistic delay-tolerant networks (DTNs), the inter contact time (ICT) model [24] is the most widely used approach for mathematical characterization. The ICT model describes the time between node encounters. This works well for very sparse networks with unguided or random routing protocols. The ICT model is intrinsically limited to forwarding packets at the start of an encounter, and multi-hop partial paths are not a component of the model. If the network density is high enough for nodes to form connected islands (partitions), and a routing protocol tailored for such topologies is used, the ICT model is not suitable for describing the routing. The reason is that the model does not describe the routing options within a partition; that is, the possibility to route to nodes currently reachable through an encountered node.

The forward-wait framework models the movement of a packet as a sequence of alternating forwarding and waiting phases. A packet is forwarded towards the destination as far as the topology allows it within a partition. When the packet reaches the edge of the partition, it waits until node movements have restructured the topology in such a way that forwarding becomes possible again in a newly formed partition. In order to deal with a large multiplicity of network scenarios and mobility factors, we describe each phase using random variables.

For the forwarding phase and the waiting phase, respectively, we model the distance a packet moves towards (the presumed location of) the destination until it has to wait, and the time a packet has to wait before the next forwarding opportunity arises. The characteristics of the forwarding and waiting random variables depend on both node mobility and the routing protocol. It is thus important to correctly establish the properties of the random variables to obtain accurate predictions from the framework. A feature of the framework is that the characteristics of the forwarding and waiting phases can be derived from multiple sources: models, small scale simulations, or practical data.

We can combine the models of the forwarding and waiting phases to determine the packet delivery probability as a function of source-destination distance and maximum allowed delivery time (time-to-live, TTL). By adding a description of the Euclidian distance from the source to the destination for a given scenario, the packet delivery ratio can be computed for any given value of the TTL parameter. Alternatively, an appropriate TTL can be set to satisfy a given delivery probability. These results are provided more efficiently by the framework than by running packet-level simulations.

To summarize, the contributions of this article are as follows:

  1. 1.

    A general framework for analysis of geographical routing protocols in opportunistic DTNs with locally connected partitions.

  2. 2.

    Two methods to derive the characteristics of forwarding and waiting phases: (1) abstract mobility and routing models, and (2) actual simulation data for arbitrary mobility models and geographic delay-tolerant routing protocols.

  3. 3.

    An illustration of the application of the framework, which includes deriving the forwarding and waiting properties for the pheromone reconnaissance mobility model and the LAROD routing protocol [1].

The article is organized as follows. The next section relates our work to other proposed models for routing analysis in opportunistic DTNs. The main contribution, the forward-wait framework, is presented in Section 3. This is followed by deriving the properties of the forwarding and waiting phases in Section 4. In Section 5, the mathematical framework is validated against simulation results. Section 6 discusses the validity of the assumptions made by the model. In Section 7, we illustrate how the forward-wait framework can be used. Finally, the article ends with concluding remarks in Section 8.

2. Related studies

The benefit of using partial paths in IC-MANETs has formally been proven by Heimlicher et al. [5]. Under some simple and reasonable assumptions, they have shown that the forward-wait paradigm will outperform end-to-end forwarding. While their results do not provide mechanisms to predict the routing performance, they confirm the intuition that partial paths should be used by routing protocols in IC-MANETs.

For predicting routing performance in DTNs, the most commonly used model is the ICT model. The ICT model describes when nodes encounter each other and are capable of exchanging data. Combined by a description of the routing protocol and the properties of the node encounter time, routing performance can be predicted. The two most commonly used metrics to describe the node encounter time are the inter-meeting time and the next encounter time. The inter-meeting time is the time between encounters of two specified nodes, and the next encounter time specifies when a node next encounters any other node. It is very common to characterize these encounter times using exponentially distributed random variables. It has been shown that, for several popular synthetic mobility models, assuming exponential distributions is indeed a reasonable choice [6, 7]. Examples of analyses using exponential distributions are those by Spyropoulos et al. [4], Small and Haas [3], Groenevelt et al. [2], and Resta and Santi [8].

The exponential distribution has been contended by Chaintreau et al. [9] in a study of actual encounter data from humans carrying mobile devices. They have found that the encounter distributions exhibit a power law distribution with a coefficient less than one. The work has been continued by Karagiannis et al. [10]. They showed that the power law distribution is only valid up to a certain time after which the distribution decays exponentially. The power law distribution with exponentially decaying tail can also be found in some synthetic mobility models [1012]. Another perspective on the ICT distributions comes from Zhang et al. [13] who have studied encounter properties in a network of scheduled buses. One important observation they made was that the delivery delays between bus pairs can differ quite significantly. The forward-wait model proposed in this article has a waiting component similar to the delay distributions used in ICT analyses, and for our illustrative scenario we have found that the wait distribution has an exponentially decaying tail.

An extension of the ICT model has been presented by Resta and Santi [8]. In their framework, they compute the distribution of the packet delivery delay, not only the expected mean. While this is a result similar to the one we present, their analysis is limited to very sparse systems where the ICT model assumptions hold. An additional characteristic of their framework is that they analyze monotone relaying schemes, i.e., once a node has received a copy of the packet it will keep a copy until the packet reaches the destination.

Due to the discrete nature of the ICT model, its application in large systems is computationally complex. To overcome this problem, Zhang et al. [14] have proposed to model the routing using ordinary differential equation, and Altman et al. [15] have proposed to describe packet spreading among nodes using a fluid model. Both approaches study epidemic and limited epidemic schemes. This means that, for a single-copy routing protocol, such as the one we consider, these models are not suitable. Additionally, our approach is to provide the option to use a detailed analysis of small-scale scenarios as a foundation to enable the analysis of large systems.

The above works have provided an analysis of how long time it takes to reach the destination, an outcome that analysis with the forward-wait framework also provides. In addition to the delivery delay, an analysis of geographic routing protocols can also study the time-distance relationship in packet forwarding. For this, Jacquet et al. [16] have presented an upper bound on the information propagation speed in very sparse networks. While we use the time-distance relationship in our analysis, the results by Jacquet et al. cannot be used since we describe systems with significantly higher node densities.

The assumption of sparse network is, in fact, a major limitation of the previously described models. With this assumption, connected groups of nodes are not taken into account. If the node movements and node density are such that nodes normally do have neighbors, then these models are not appropriate for predicting routing performance. A concept that accounts for connected partitions and non-uniform node mobility is delay expansion, introduced by Asplund [17]. Delay expansion enables us to determine bounds on worst-case latency for a wide class of broadcast protocols. The key idea is to describe the least number of uninformed nodes that will meet an informed node during the time period of interest. By having the number of informed nodes as a function parameter, non-uniform mobility can be handled. However, the results in [17] are not directly applicable to unicast routing.

When location information is available many works attempt to optimize network connectivity by actively adapting transmission power. Some research within the area of MANET topology control focuses on mathematical studies that trade-off the degree of connectivity against energy efficiency (interested reader may refer to a survey by Santi on the topic [18]). This is a different problem compared to the one addressed in this article, where we focus on studies of delivery probability towards a given distance and within a given time using some abstraction of node mobility and routing.

3. The forward-wait framework

In the forward-wait framework, the movement of a packet towards the destination is modeled by two phases: forwarding and waiting. The forwarding phase is used to characterize how much closer a packet gets to the destination when it can be forwarded within a connected partition of the network. Once forwarding is not possible, the waiting phase accounts for how long time a packet has to wait until it can be forwarded again. While the model is developed for geographical routing, it is agnostic to the routing mechanism used to forward the packet. However, the model does make the following assumptions.

  1. 1.

    Only one copy of a packet is routed at any time.

  2. 2.

    The delivery latency is dominated by the waiting time, and thus the forwarding time can be neglected.

  3. 3.

    Packet movement is dominated by the forwarding, and thus in the waiting phase, packet movement due to node mobility can be neglected.

In Section 6, we will discuss the validity of these assumptions. There we will show the impact of violations of these assumptions, and that the impact can be compensated for to some extent. The reason to defer the discussion until then is the need for delay and forwarding data for the purpose of determining the impact of the assumptions.

Figure 1 visualizes assumptions 2 and 3 with two packets moving from source to destination. In a forwarding phase, a packet is routed from one node to another until it has to wait. While forwarding, the elapsed time is ignored by the second assumption above, which is depicted by the horizontal lines in the figure. The waiting phases, on the other hand, ignore node movements, as indicated by the vertical lines. The two cases in the figure illustrate that when a packet is generated by the source, it either has to wait if the source node is at the frontier of a partition (upper track) or it can be forwarded immediately, within the current partition, until it reaches the edge (lower track). Thus, a packet will travel in time and space in a manner similar to one of the two tracks depicted in Figure 1.

Figure 1
figure 1

Time-distance illustration of packet routing.

The forwarding and waiting components of the framework are described by means of independent random variables. In the forwarding phase, the corresponding random variable describes how far a packet can be forwarded until it reaches the edge of its current partition. In the waiting phase, we use a random variable to describe how long time it takes until node movements have restructured the topology in such a way that the packet can be forwarded again. The reason that independence between the random variables can be assumed is that, as a packet is forwarded, it is handled by new nodes whose movements are independent of the nodes previously holding the packet. Examples of how the properties of the random variables can be derived for a specific scenario are provided in Section 4. In the same section, we show why it is important to separate the two cases, depending on whether or not a packet had to wait at the source or not before it could be forwarded. The mathematical description of the framework will be presented in a bottom-up fashion. As a final outcome, we will have the probability of reaching the destination at a (Euclidian) distance d within time t, P d (t, d), and two random variables X(t) and T(d); the former variable describes how much a packet has reduced the distance to the destination at a specific time, and the latter describes the time it took to move towards a (presumed) destination at the specific distance from source. All results are derived based on the random variables describing the forwarding and waiting phases. In Table 1, we summarize the key notation and terms.

Table 1 Key notation and terms

To describe the packet forwarding distance we create auxiliary variables that describe (as random variables) the reduction of distance to the destination after n forwarding phases. The reduction in distance in forwarding refers to the difference between the Euclidean distances between the packet location and its destination before and after a forwarding phase. Note that the first forwarding phase is different from the later forwarding phases, since in the latter cases there are no nodes ahead of the custodian in the direction towards the destination. In the first forwarding case, we may or may not have nodes to route through in the current partition. Due to this difference in the forwarding characteristics, we need one auxiliary variable for each of the two cases (D n and D' n ). These variables are the sum of the independent random variables that make up the separate forwarding phases, and they are defined in Equations (1) and (2). For the case where the packet has to wait at the source before it can be forwarded, D' n is zero with probability one before the first forwarding phase (n = 0). This is denoted by means of a random variable I that always takes the value 0.

D n = L n = 1 D n - 1 + L n n > 1
(1)
D n = I n = 0 L n n = 1 D n - 1 + L n n > 1
(2)

The probability that a packet is in its n th forwarding phase when the distance to the destination has been reduced by d, measuring from the original source location, is then given by Equation (3). Probability P fw (d, n) is defined in the same way using D' n . It is important to note that while P(D n d) is the probability of having moved at least a distance d using exactly n forwarding phases, P fi (d, n) is the probability of being in the n th forwarding phase when the distance to the destination has been reduced by d.

P f i ( d , n ) = P ( D 1 d ) n = 1 P ( D n d ) - m = 1 n - 1 P f i ( d , m ) = P ( D n d ) - P ( D n - 1 d ) n > 1
(3)

Similar to the derivation of the random variables for the forwarding phase, Equation (4) computes the random variable describing the time of waiting after exactly n waiting phases. Analogous to the definition of D' n , W n is defined also for the case where no waiting has occurred. In Equation (5), we give the probability of being in the n th waiting phase at time t.

W n = I n = 0 V n n = 1 W n - 1 + V n n > 1
(4)
P w ( t , n ) = P ( W 1 t ) n = 1 P ( W n t ) - m = 1 n - 1 P w ( t , m ) = P ( W n t ) - P ( W n - 1 t ) n > 1
(5)

Using the above results, we can now define expressions predicting routing performance. The main result is presented in Equation (6) where we compute the probability that a packet has, within time t, been delivered to a node that was a distance d from the source. The two terms in the equation consider the cases where a packet initially waits before being forwarded, and the case where it is immediately forwarded from the source, respectively. These two cases correspond to the two tracks in Figure 1. Each term is a sum of the probabilities of the possible sequences of forwarding and waiting at the evaluation point. This equation will be used to compute the packet delivery ratio.

P d ( t , d ) = P w i n = 1 P f w ( d , n ) P ( W n t ) + 1 - P w i n = 1 P f i ( d , n ) P ( W n - 1 t )
(6)

The probabilistic answer provided by (6) might not be enough if a more detailed analysis of the routing performance is to be conducted. To complement P d (t, d), we define how much a packet has reduced its distance to the destination at time t by stochastic variable X(t) in (7), and the time required to reach a distance d from the source by stochastic variable T(d) in (8). To describe these two properties, we use stochastic variables defining the indices of the forwarding or waiting phase that the packet is in. For the selection of distribution for a particular case, we use the Kronecker delta defined as follows.

δ ( n ) = 1 n = 0 0 n 0

Equations (7) and (8) have the same structure as (6), but instead of probabilities, we operate on random variables. Equation (7) describes how much a packet has reduced its distance to the destination at time t. The first term describes the case when the packet was forwarded after an initial wait, and the second term describes the case for a sequence of forwards without an initial wait. The equation uses selection elements (S w i , S w (t), and S' w (t)) defined by the following probabilities described earlier.

P ( S w i = 1 ) = P w i P ( S w ( t ) = n ) = P ( S w ( t ) = n ) = P w ( t , n ) X ( t ) = δ 1 - S w i n = 1 δ n - S w ( t ) - 1 D n + δ S w i n = 1 δ n - S w ( t ) D n
(7)

Equation (8) has the same structure as (7), but instead computes the time taken to move towards the destination with distance d from the source. In addition to S wi , the equation uses the selection elements S fw (d) and S fi (d) defined by the following probabilities described earlier.

P ( S f w ( d ) = n ) = P f w ( d , n ) P ( S f i ( d ) = n ) = P f i ( d , n ) T ( d ) = δ 1 - S w i n = 1 δ n - S f w ( d ) W n + δ S w i n = 1 δ n - S f i ( d ) - 1 W n
(8)

The forthcoming sections will be devoted to deriving the properties of the forwarding and waiting random variables in a given context, and validating the model using simulation data. In addition, we will show how P d (t, d) can be used in a practical application of the framework.

4. Characterizing forwarding and waiting

In order to use the framework presented in Section 3 for estimating the routing performance with a given mobility model and routing protocol, we need a description of the properties of the random variables for forwarding and waiting. We explore two alternatives: (1) using abstract models for mobility and routing in Section 4.2, and (2) using data from a protocol simulation, i.e., LAROD ns-2 simulations [1], in Section 4.3.

The first alternative is useful if the properties of a mobile scenario and routing protocol are well known and can be modeled. The second alternative can capture the distributions of any routing protocol and mobility scenario, including protocols for which the characteristics are not well known. For illustration of the process of creating the abstract model based on a known mobility and routing algorithm, we use the knowledge about LAROD routing protocol, the characteristics of which will briefly be described in Section 4.1.

In ad hoc wireless networks, distances have little meaning, unless the range capabilities of the chosen radio technology are also specified. For this reason, we have chosen to express distance in the nominal radio range. Moreover, we will treat node densities by the average node degree. The average node degree, c, is the average number of nodes per area covered by the nominal radio range, defined as ρπr2, where ρ is the average node density and r is the nominal radio range. For Poisson distributed nodes in an infinitely large system, the average node degree equals the average expected number of neighbors of a node [19].

4.1. Abstract mobility and routing model

In this section, we detail the mobility and routing models that will be used in Section 4.2 to derive the model-based forwarding and waiting properties. The model is intended to capture the mobility and routing in the LAROD ns-2 simulations used in Section 4.3, but still be manageable so that using the model is significantly simpler than using simulations.

4.1.1. Poisson-based mobility

For the abstract mobility model, we choose the Poisson distribution [19] to describe the statistical distribution of the nodes. The Poisson distribution describes the statistical location properties of independent nodes that are equally likely to be in all locations in an infinite space. The choice of using Poisson distribution is justified by three reasons. First, it is a commonly used abstraction and mathematically attractive. Second, it is a reasonable simplification of the pheromone mobility model that we have used in the ns-2 simulations. Third, it describes the location properties of nodes in some commonly used synthetic mobility models [20, 21].

The Poisson distribution only describes how the nodes are statistically distributed, not how they move. To derive the properties of the waiting phase, we need to characterize how the nodes move during a limited time period. To this end, we assume that the nodes move independently at a common constant speed, and that for short time periods the movements can be regarded rectilinear. The common constant speed reflects the speed used in the LAROD ns-2 simulations.

Modeling geographic forwarding

Many geographic opportunistic forwarding algorithms are based on forwarding areas, a notion that we use in the abstract routing model. Since we will demonstrate the use of the wait-forward framework by predicting the performance of LAROD [1], we will use its parameters when modeling routing behavior. LAROD is a delay-tolerant geographic single-copy routing protocol. At each hop, the protocol selects the node providing the most routing progress. Here, progress refers to the reduction in distance to destination. As a packet is forwarded, the custody of the packet is transferred from one node to another, guaranteeing that there always is a node responsible for the packet. If there is no node that can provide a pre-defined minimum progress, LAROD waits until node movements have changed the nodes' positions in such a way that forwarding becomes feasible. The area in which the next custodian can be selected is called the forwarding area; see Figure 2 for an illustration. The protocol periodically attempts to detect new nodes in the forwarding area. The time period of two successive attempts is referred to as the retry interval, t r . Setting the value of t r involves a trade-off between the latency in detecting new nodes and protocol overhead. In LAROD ns-2 simulations, t r is set randomly and uniformly between 8 and 12 s.

Figure 2
figure 2

An illustration of the forwarding area with minimum required progress requirement.

Modeling custodian selection in the geographic routing protocol with a minimum progress requirement leads to Equations (9) and (10), for which the terms are defined in Table 2. Equation (9) defines the forwarding area, and (10) describes the position of the next custodian. The forwarding operation is characterized by the reduction in distance to destination as measured from the current custodian. When a forwarding phase starts, the packet is routed without delay, until forwarding is no longer possible, because the current custodian's forwarding area is empty. In the waiting phase, the protocol regularly attempts to start a new forwarding.

X f a ( X c X d ) | X - X d X c - X d + p , X c - X r
(9)
X x = X n | min X n - X d | X n f a ( X c X d )
(10)
Table 2 Terms in custodian selection

Framework inputs based on models

In this section, we will derive the properties for the forwarding and waiting random variables based on the mobility and forwarding models described in Section 4.1. The random variables will be described using distributions [19]. To describe the probability density function (pdf) and cumulative distribution function (cdf) we use the notations pdf(X, x) and cdf(X, x) where X is a random variable and x is the value of the random variable. To see the impact of node density, we will evaluate four different node densities within a relevant range.

Forwarding distribution based on models

Even for the ideal disk-based transmission model, determining the forwarding distribution analytically for Poisson distributed nodes is unfortunately too complex to be practically tractable. For details, please see Appendix 1. For this reason, we have derived the forwarding cdfs using Monte Carlo simulation.

For determining the reduction of distance to the destination that a packet achieves while approaching the destination from the source (L), the Monte Carlo simulation is set up as follows. A number of nodes drawn from a Poisson distribution are placed in a rectangular area. The area is large enough so that at most 0.1% of the packets will reach the area boundary. Each node's coordinate is set randomly following a rectangular distribution. A packet is sent towards a destination located infinitely far away, and the forwarding progress, measured along the line connecting the source and destination, is determined. Custodian selection is performed according to (10), until an empty forwarding area is encountered.

The result is shown in Figure 3 using the complementary cdf (ccdf) for four different values of node density (where c denotes the node degree described earlier). The ccdf in the figure is (1 - cdf(L, d))·(1 - P wi ), as the Monte Carlo simulation also records the occasions when no node is present in the forwarding area and the packet has to wait. In order to derive a well-behaved density function, the distribution from the Monte Carlo simulation has been fitted to a curve described by (11), where G is a gamma-distributed random variable with shape parameter r and scale parameter λ. The transition points in (11) are selected to achieve an optimal match between the measured distribution and the fitted curve.

Figure 3
figure 3

Probability of being forwarded by at least a given distance from the source with no initial wait (ccdf), for four node density values.

Using the assumption of Poisson distributed nodes, the measured probability that a packet could not be forwarded from the source (P wi ) obtained from the Monte Carlo simulations can be verified theoretically. Knowing the node density and forwarding area size the theoretical probability for not forwarding is trivial to determine (this is the probability that there are no nodes in the forwarding area). For our definition of the forwarding area, the results are presented in Table 3. These values are closely matched by the Monte Carlo simulations.

cdf ( L , d ) = 0 d < 0 . 04 k 0 + k 1 d + k 2 d 2 + k 3 d 3 0 . 04 d 1 . 3 cdf G ( r , λ ) , d d > 1 . 3
(11)
Table 3 Probability of having an initially empty forwarding area

When the packet is forwarded to the edge of a partition, it has to wait until further forwarding can take place. When at least one node enters the forwarding area this wait ends, and forwarding can continue. The property of this forwarding will not be the same as the forwarding experienced by the source node when the packet was generated. The reason is that a custodian candidate in the forwarding area after a wait will be found close to the edge of the current custodian's forwarding area. This is due to the fact that the node movements are small during a retry interval compared to the size of the forwarding area. We will see that this will have significant implications for the forwarding distribution.

The Monte Carlo simulations used to determine the distance forwarded after a wait (L n , L' n ) are set up similar to the ones used for analyzing packet forwarding from the source (L). A simulation run starts by placing a number of nodes, drawn from a Poisson distribution, in a rectangular area. Searching through the nodes, the first node having an empty forwarding area is selected to be the custodian of a packet. If no node with an empty forwarding area exists, the simulation run is aborted. Provided that a custodian is found, the next step is to move all the nodes (including the custodian) in random directions with a distance randomly selected to correspond to the retry interval employed between forward attempts (in the abstract model we have used the same interval, 8-12 s, as in LAROD ns-2 simulations). If a node has entered the forwarding area after the retry interval, the forwarded distance of the packet is recorded; otherwise the simulation run is discarded.

The resulting distribution is shown in Figure 4 using its ccdf. The figure leads to several interesting observations. The steep drop at the beginning of the curves corresponds to the scenario that a node enters the forwarding area from the rear. In this case, the forwarding areas of the initial and new custodians have a large overlap. As a result, the probability of making another hop is low. Similar to the cdfs for initial forwarding at the source, the cdfs corresponding to the ccdfs in Figure 4 have been curve-fitted to derive well-behaved pdfs. The curve fitting is done according to Equation (12), where the transition points are selected based on a maximum match between the measured distribution and the fitted curve. In the equation, parameters d4 and d5 are density dependent, and selected to achieve an optimal fit.

Figure 4
figure 4

Probability of being forwarded by at least a given distance from the source after a wait (ccdf), for four node density values.

cdf ( L n , d ) = cdf ( L n , d ) = 0 d 0 . 04 k 0 + k 1 d + k 2 d 2 + k 3 d 3 0 . 04 < d 0 . 16 k 10 + k 11 d + k 12 d 2 + k 13 d 3 0 . 16 < d 0 . 85 k 20 + k 21 d + k 22 d 2 + k 23 d 3 0 . 85 < d d 4 k 30 + k 31 d + k 32 d 2 + k 33 d 3 d 4 < d d 5 cdf G ( r , λ ) , d d > d 5
(12)

Waiting distribution based on models

A wait period starts when a packet reaches the edge of a partition where it has to wait until mobility makes further forwarding possible. To determine the distributions for the waiting phase based on the modeled mobility and routing, we consider the periodic forward attempts employed by LAROD. After waiting a time t the probability of successful forwarding is described by P f (t). With the knowledge of when a forward attempt is made, described by R, the waiting distribution can be established. For the LAROD simulations, pdf(R, t) is a rectangular distribution as specified in (13).

pdf ( R , t ) = 0 . 25 8 t 12 0 otherwise
(13)

For P f (t), we note that it is zero at t = 0 and equals P wi as t approaches infinity. Therefore, P f (t) is expected to have an exponential-type shape. Since we are only interested in P f (t) when pdf(R, t) is non-zero, a linear approximation is considered. An analysis of the data points used to establish P f (t) has shown that this is a reasonable approximation over the relevant interval.

The probability of forwarding after a given waiting time (P f (t)) is not trivial to determine analytically, and for this reason we have used Monte Carlo simulations. In each simulation run, a number of nodes are placed in a rectangular area, following a Poisson distribution. The size of the area is selected such that the expected number of nodes with an empty forwarding area is 100. All nodes are then randomly moved. Whether or not nodes have entered forwarding areas that initially are empty is then recorded. The simulation has been run for 100 times for each of the time values 8, 9, 10, 11, and 12 s, giving approximately 10,000 samples per point. The collected data are then fitted to a linear function to represent P f (t). The coefficients in the linear function and two sample values are provided in Table 4, and the linear function itself is given in (14).

P f ( t ) = k t + o
(14)
Table 4 Average probability of forwarding after a retry interval

What remains to compute is the waiting time V n based on R and (14). To this end, we first determine the probability that a forward attempt is a success or a failure (see Equations 15 and 16). Next, we use two random variables, E n and A n , to describe the waiting times for a successful or a failed forward attempt, respectively. The density functions of E n and A n are defined in (17) and (18). Based on these and the failed wait time described by (19), a random variable describing the time when a successful forward attempt is made after n - 1 failed attempts is defined in (20). The random variable V n is then defined in (22) using the selection element S f (21) and the Kronecker delta. The notation is summarized in Table 5. In Figure 5, cdf(V n , t) is illustrated.

P f = 0 pdf ( R , t ) P f ( t ) d t = 8 12 0 . 25 k t + o d t = 10 k + o
(15)
P a = 0 pdf ( R , t ) 1 - P f ( t ) d t = 1 - P f = 1 - 10 k - o
(16)
pdf ( E n , t ) = pdf ( R , t ) P f ( t ) P f
(17)
pdf ( A n , t ) = pdf ( R , t ) 1 - P f ( t ) P a
(18)
B n = A n n = 1 B n - 1 + A n n > 1
(19)
F n = E n n = 1 B n - 1 + E n n > 1
(20)
P ( S f = n ) = P f P a n - 1
(21)
V n = n = 1 δ ( n - S f ) F n
(22)
Table 5 Notation and terms in deriving distributions for the waiting phase
Figure 5
figure 5

Probability of waiting for at most a given time, for four node density values.

Distributions from ns-2 data

In this section, we present the alternative approach to deriving probability distributions for the framework for an arbitrary protocol and mobility model, provided that some detailed simulation traces are available. As an example, we compute numerically the forwarding and waiting distributions from ns-2 simulations of LAROD under the pheromone reconnaissance mobility model. The idea is to compare the results to the distributions derived in the previous section, in which mobility and routing are modeled more abstractly. We do not expect that the results will match each other perfectly due to the following reasons. First, the ns-2 simulator has a more realistic radio model. Second, the pheromone reconnaissance mobility model does not produce Poisson distributed nodes. Third, the location of a destination is assumed to be known in the abstract model, i.e., a perfect location service is assumed in our derivation of the distributions. This is however not the case in the ns-2 simulations.

Forwarding distribution based on simulations

Extracting forwarding distributions from simulation traces calls for some methodological considerations, because distance measurements in the simulations can only provide finite values. The consequence of a finite distance is that a packet might reach its destination during a forwarding operation, and in this case it is impossible to tell how much further the forwarding could have continued. Consider a packet transmitted by its custodian. If the packet reaches the edge of the partition before reaching its destination, the simulation data give relevant distance information for deriving the distributions. On the other hand, if the packet reaches the destination, then one cannot tell how much further it could have been forwarded. To limit the impact of this issue when establishing the simulation-based cdf(L, d), cdf(L n , d), and cdf(L' n , d), we only consider simulation data where forwarding takes place to destinations for which the distance from the custodian is above a pre-defined threshold. Thus, the computed forwarding distribution will be representative for the true distribution up to the distance threshold. A problem with setting a high distance threshold is that the number of data points available for establishing the distribution becomes very low. For the LAROD ns-2 simulations, a distance threshold of 5 radio radii is used. In order to obtain a smooth distribution over this value, we apply an extrapolation technique.

A second issue in deriving forwarding distributions via simulations is packet duplication. This can happen due to LAROD routing logic, e.g., when a custodian forwards the same packet to two nodes that are not within the radio range of each other. To deal with the issue, the consideration is limited to the copy that has reached furthest towards the destination. In the LAROD simulations, the average node degree equals 3.93. Throughout the article, the data extracted from simulations are based on a TTL value of 1,000 s.

In Figures 6 and 7, we provide the ccdfs of forwarding, obtained by trace data from the LAROD simulations. The modeled (dashed) curve is based on the equations in Section 4.2.1. For the solid black curve representing the LAROD ns-2 data, we see a drop after 5 radio radii. After this value, some packets have reached their destinations, and hence they only provide a truncated forwarding distance. The LAROD ns-2 curves have been extrapolated and curve-fitted using the functions given in Section 4.2.1. The modeled curve uses the same node density level (3.93) to ease the comparison. From the simulation results, the probability of having an initial waiting phase, P wi , is 19% for an average node degree of 3.93. This is considerably higher than the value of 15% derived for the similar node degree level under Poisson distribution (see Table 3). From these results, we see that the model we use does not exactly describe the forwarding properties experienced in the simulations. Some probable causes were discussed at the beginning of Section 4.3.

Figure 6
figure 6

Probability of being forwarded by at least a given distance from the source with no initial wait (ccdf).

Figure 7
figure 7

Probability of being forwarded by at least a given distance after an initial wait (ccdf).

The lower ccdf curves from LAROD ns-2 compared to those derived for Poisson distributed nodes reveals lower average forwarding distance. Consequently, more waiting phases are required before the destination is reached. Whether or not this means a longer delivery time depends on the characteristics of waiting — an aspect that we will study in the next section.

Waiting distribution based on simulations

We now turn our attention to characterizing waiting time using LAROD ns-2 simulations. Processing waiting data is less problematic compared to the case of forwarding data. Yet some caution is necessary, because some packets may time out while waiting to be forwarded. In data processing, such packets are discarded. Hence, only packets for which forwarding does occur after waiting are considered. Consequently, information associated with very long waiting times is not available, meaning that the distribution derived from simulations is slightly optimistic. The results are presented in Figure 8, and compared to the curve computed by the modeling approach (Section 4.2.2) under the same node density level. From the figure, it is apparent that the distribution derived from the Poisson distributed nodes yields a very good approximation; the waiting time obtained from the LAROD simulations is only slightly longer than the one derived in Section 4.2.2. The study in Section 4 has thus demonstrated that with carefully constructed models the model-based and simulation-based distributions can be fairly close to each other. The challenge is to know when the models are good enough.

Figure 8
figure 8

Probability of waiting for at most a given time before forwarding (cdf).

5. Validation of the framework

Having presented the forward-wait framework in Section 3, and its parameters in terms of random variables in Section 4, we are now in a position to evaluate the validity of the framework. We compare the predictions by the framework to those given by LAROD ns-2 simulations, and if they are reasonably similar we conclude that the framework accurately can predict the routing performance. While this only proves that the framework can predict the routing performance for this specific case, it strengthens our belief that its use can be extended to previously unexplored scenario configurations.

For the framework, we consider both the model-based input from Section 4.2 and the simulation-based input from Section 4.3. Due to the difference between the two sources of input, the routing performance predictions should somewhat differ. What we hope, however, is that when simulation-based input is used, the predictions by the framework come close to the simulation results. Differences in the results, if any, should originate from the assumptions made in the framework and data extraction issues.

We need a final part of the puzzle before the framework predictions can be compared to the simulation results. The output from the ns-2 simulations is the packet delivery ratio for various maximum packet life times, whereas the output from the forward-wait framework is the probability that a packet has reached a destination located at distance d from the source within time t. To make them comparable, we need a description of source-destination distance. This aspect is addressed first, followed by results of the comparison.

Distance to destination

The source-destination distance differs for each packet. This variation will be described by the random variable Y. We determine properties of Y along two lines, one based on a mathematical description of the source and destination locations, and the other based on LAROD ns-2 simulations.

In the mathematical description, we assume that the nodes are evenly and independently distributed in a square area. Denoting the side length of the area by k, the density function of Y follows (23). For the derivation of the equation, the reader is referred to Appendix 2.

The corresponding results obtained from LAROD ns-2 simulations are illustrated in Figure 9 for the 8 × 8 radio radii square. The source-destination distance from the ns-2 simulation is somewhat higher than that from the mathematical description. We conjecture that non-uniform node placement, movement of the destination during packet routing, and location service inaccuracies have all contributed to the difference between the curves.

pdf ( Y , d ) = 2 d π k 2 - 4 d k 3 + d 2 k 4 0 d k 2 d 2 k 2 tan - 1 2 k 2 - d 2 2 k d 2 - k 2 - 2 k 2 + 4 d 2 - k 2 k 3 - d 2 k 4 k < d < 2 k 0 otherwise
(23)
Figure 9
figure 9

Cdf of source-destination distance.

Delivery predictions

With the tools and data previously presented, we can now estimate the delivery ratio using the forward-wait framework, and compare the prediction to the delivery ratio obtained by LAROD ns-2 simulations. The delivery ratio based on P d (t, d) and Y is computed according to (24). The equation models the fact that when a packet is within the radio range of the destination, the last hop is a guaranteed success.

P TTL ( t ) = 0 r pdf ( Y , x ) d x + r pdf ( Y , x ) P d ( t , x - r ) d x
(24)

The delivery ratio predicted by the forward-wait framework, using input from the modeling approach and the LAROD ns-2 simulations, is presented in Figure 10. The figure also shows the delivery ratio from the LAROD ns-2 simulations with a 95% confidence interval.

Figure 10
figure 10

Predicted and simulated delivery ratio with respect to TTL.

Two major observations follow from the figure: (1) the predicted delivery ratio can differ significantly, depending on the type of input, and (2) providing the framework with key input parameters from simulations leads to highly accurate predictions of the delivery performance. The remaining gap can be attributed to simplifications made in the framework, and the fact that it is difficult to estimate long forwarding chains and delays from the simulation data, as described earlier in Section 4.3.

The first observation illustrates the importance of using a relevant data source when predicting routing performance. Assuming idealistic conditions, predictions become too optimistic in comparison to the simulation results, even though the latter may not necessarily represent real-world performance.

Distance and time predictions

In addition to validating the model in terms of the final delivery ratio, it is also of interest to validate the distance and time distributions predicted by Equations (7) and (8) against data from the LAROD ns-2 simulations. From the simulations, it is easy to extract how far a packet has traveled from the source at some specific time, as well as at the time taken for achieving a given reduction in the distance to packet destination. The measurements are however performed only for packets that have not yet been delivered to their destinations. For the time for having reached a distance from the source (Equation 8), the data from the simulations can directly be compared to the predictions made by the forward-wait framework. The reason for this is that while we cannot extract data for packets having reached their destinations before the measurement point, all packets have the same distribution regarding time of passing the measurement point.

For the time to reach a certain point analysis, we have chosen a measurement point 4 radio radii from the source. In Figure 11, the distribution function from the ns-2 simulations is compared to the one computed by the forward-wait framework using the ns-2-based distributions. As can be seen from the figure, the two distributions are very close to each other. The distribution from the framework is slightly more optimistic on how fast a packet travels, an effect also reflected in the slightly optimistic results from the framework in the previous section.

Figure 11
figure 11

Probability of reaching at least 4 radio radii with respect to time.

The direct validation of Equation (7) is not possible due to the following reason. In practical, simulations packets are delivered to their destinations, and if a packet reaches its destination before the time used for measurement, data for that packet cannot be gathered. Thus, we only measure packets for which the following is true, X(t) < Y - r, where Y is the distance to destination, and r is the radio range. As in the previous section, we assume that when a packet is within radio range of the destination, the last hop is a guaranteed success.

In Figure 12, we have plotted the distributions of X(t) < Y - r and the data from the ns-2 simulations at time t = 200 s. We observe a visible difference between the framework prediction and the ns-2 data. The main reason for the difference is that the forward-wait framework assumes that the node holding the packet does not move while it waits. The ns-2 data on the other hand includes node movements during waiting. Obviously, node movements can be in any direction, both towards and away from the source, but since we measure the absolute distance from the source we cannot tell if the packet has advanced towards the destination or not. What we clearly see is that the impact on node mobility while waiting cannot be ignored. A further discussion regarding the validity of the forward-wait framework due to this effect is provided in the next section.

Figure 12
figure 12

Probability of requiring at least 200 s with respect to distance from source.

From the results in this and the previous section, we conclude that the forward-wait framework can reasonably accurately predict the routing performance for LAROD, provided that representative forward and wait distributions are used. We believe that these results extend to other geographic routing protocols in IC-MANETs.

6. The validity of the framework assumptions

In the previous section, we have shown that the forward-wait framework can successfully predict simulation results. Let us now examine how well the assumptions used for building up the framework (see Section 3) are met. We consider first the assumption that forwarding takes no time and that packet movement is minimal in the waiting phase. Table 6 shows the mean values of waiting times and forwarding distances, obtained from the mobility model in Section 4.1.1 and the LAROD ns-2 evaluations, respectively.

Table 6 Average waiting times and forwarding distances

It is striking to observe the significant amounts of distance that packets traveled during waiting in relation to the forwarding distance. An immediate question is how much this result influences the validity of the model. The answer is that the impact is in fact not significant--whereas some nodes move closer to the destination of a packet waiting to be forwarded, other nodes will move away from the destination. Assuming directional uniformity of the movements, they cancel each other's effect in the infinite case. In the finite case, the distance to a static destination will somewhat increase (on average) during a waiting phase. However, this increase is typically small enough to be negligible.

We now consider the related assumption that time for forwarding is negligible. The time that a forwarding phase takes depends greatly on the communication technology and packet size. As the modeling approach in Section 4.1.2 does not include these aspects, we look in more detail into LAROD ns-2 simulations. From the simulation results in Table 6, we observe that the time consumed by forwarding is small (≈1.5%) in comparison to the waiting time. This confirms that the assumption in the framework holds. If this was not the case, Equation (5) would have been adapted to include forwarding time.

Another assumption in Section 3 was that, at any given time, only one copy of a packet is routed. For LAROD, however, occasionally this is not true in our ns-2 simulation data. For such cases, we use the copy that reaches furthest towards the destination for deriving the forwarding distributions. Hence, the assumption can be respected by extraction of suitable traces from simulations (at the expense of being more or less optimistic). To analyze the delivery ratio of a routing protocol that routes multiple copies of a packet, the forwarding and waiting distributions can be extended by considering the first copy arriving at the destination and modeling the routing decisions made for those packets.

7. Practical application of the forward-wait framework

In Section 5, we showed that the forward-wait framework can accurately match the results by simulations. This establishes some trust in the capability of the framework in predicting routing performance. In this section, we illustrate how the framework can be used in connection with a large-scale deployment. For the illustrations, we require data for multiple node densities. Since these data are only available for the model of routing and mobility from Section 4.1, we will in this section use the distributions derived in Section 4.2.

A first natural use of the framework is to predict the packet delivery ratio for large scenarios. In Figure 13, we show the delivery ratio for different scenario sizes at a constant average node degree of 4. With the random selection of destination in the used scenario and the constant node density, more nodes means longer source-destination distances. This is reflected in the figure by lower delivery ratio for larger scenarios for the same packet life time.

Figure 13
figure 13

Delivery ratio for different scenario sizes.

In addition to being predictive, the framework can be used to enable a source node to dynamically set the packet TTL to achieve a desired delivery probability. To illustrate this, in Figure 14 we plot the relationship between distance to destination and TTL for various density levels with a 95% delivery probability.

Figure 14
figure 14

TLL required for achieving 95% delivery guarantee for various density levels.

If the TTL is fixed, P d (t, d) can be used to determine whether a packet shall be transmitted or not for the required delivery probability. Figure 15 shows P d (t, d) for the mobility and routing models for an average node degree of 4. For example, if the requirement of delivery probability is 95% or higher, then the packets to destinations that are over 6.5 radio radii away can be discarded if the TTL is set to 600 s.

Figure 15
figure 15

Delivery probability in distance to destination and TTL.

8. Conclusions and further study

We have presented and validated the forward-wait mathematical framework for geographic routing. The framework describes the probability of delivery as a function of the maximum allowed delivery time and the distance to destination. As input, the framework uses scenario- and protocol-specific random variables characterizing the forwarding and waiting phases. Combined with a description of the distance to destination, the delivery ratio can be computed for any scenario size. The framework can also be used to dynamically assess delivery probabilities based on different packet life time settings. A first application of the framework in the context of a military reconnaissance scenario has already provided useful insights [22].

A major challenge in modeling routing performance is that the routing performance is scenario- and protocol-dependant. For the proposed forward-wait framework, the scenario- and protocol-specific elements are captured by the properties of the forwarding and waiting phases. For a specific scenario evaluated in ns-2, we determined these properties using two methods: (1) an abstract mobility model with Poisson distributed node placement and a routing protocol model, and (2) basic routing data from the ns-2 simulations. Comparing the two approaches, we observed that only with the latter input the forward-wait framework could accurately predict the routing results from the ns-2 simulations. This illustrates the difficulty of accurately describing node mobility and routing protocol using simple abstractions, and that if simplistic models are used, then the performance results are generally not reliable.

While the proposed framework is believed to be general enough to apply to other geographic routing algorithms, further study is needed to provide the evidence for this. In addition to the validation of the framework to broaden its usefulness, the prediction accuracy could be improved by explicitly considering both time and motion in the models describing forwarding and waiting.

Appendix 1

Complexity of deriving the distribution of forwarding distance

In illustrating the complexity of determining forwarding distance analytically, it is instructive to make a couple of major simplifications. First, nodes are Poisson distributed. Second, the destination is infinitely far away. With these assumptions, the forwarding area has a constant shape. Yet, an analytical derivation of the forwarding distance is still practically unfeasible. For the first hop from the source, it is trivial to establish whether or not a packet can be forwarded, and the probability distribution of the progress if forwarding takes place. For the possible second hop, the distribution becomes harder to derive. Depending on the location of the custodian after the first hop, there are three different cases, as illustrated in Figure 16. Under the assumption of perfect custodian selection, the intersection of the two forwarding areas does not contain any other node. Although the process is cumbersome, it is feasible to derive analytical expressions on a case-by-case basis. However, with a chain of forwarding operations, the derivation becomes overwhelmingly complex and practically unfeasible. This justifies the use of determining the distributions of the forwarding phase by means of Monte Carlo simulations.

Figure 16
figure 16

An illustration of the custodian location after first hop.

Appendix 2

Source-destination distribution

In this section, we derive the source-destination distance density function, by considering two nodes being placed randomly with a uniform distribution in a square area. Let the positions of the two nodes A and B be represented by random variables defined below, where k is the side length of the square.

A = X A , Y A
B = X B , Y B
pdf ( X A , x ) = pdf ( Y A , x ) = pdf ( X B , x ) = pdf ( Y B , x ) = 1 / k 0 x k 0 otherwise

The random variable representing the distance between the two nodes has the following expression.

Y = A - B = X A - X B 2 + Y A - Y B 2

In determining the density function of Y, we make use of the below relationships.

pdf ( A + B , t ) = pdf ( A , x ) pdf ( B , y ) δ ( ( x + y ) - t ) d x d y
pdf ( A - B , t ) = pdf ( A , x ) pdf ( B , y ) δ ( ( x - y ) - t ) d x d y

pdf ( f ( X ) , y ) = pdf ( X , x ) d x d y , where f(x) is a continuous and strictly increasing or decreasing function of x within the range where pdf(X, x) > 0.

The density function of Y, pdf(Y, d), can then be derived as follows.

pdf ( X A - X B , d ) = pdf ( Y A - Y B , d ) = pdf ( X A , x ) pdf ( X B , y ) δ ( ( x - y ) - d ) d x d y = = 0 k + d 1 k 1 k d x - k d 0 d k 1 k 1 k d x 0 < d k 0 otherwise = = 1 / k + d / k 2 - k d 0 1 / k - d / k 2 0 < d k 0 otherwise
pdf ( X A - X B , d ) = 2 / k - 2 d / k 2 0 d k 0 otherwise
pdf ( X A - X B ) 2 , d = pdf X A - X B 2 , d = pdf X A - X B , d 1 2 d = 1 k d - 1 k 2 0 d k 2 0 otherwise
pdf X A - X B 2 + Y A - Y B 2 , d = pdf X A - X B 2 , x pdf Y A - Y B 2 , y δ ( ( x + y ) - d ) d x d y = = 0 d 1 k x - 1 k 2 1 k d - x - 1 k 2 d x 0 d k 2 d - k 2 k 2 1 k x - 1 k 2 1 k d - x - 1 k 2 d x k 2 < d < 2 k 2 0 otherwise = = 2 k 2 tan - 1 x d - x + 2 d - x k 3 - 2 x k 3 + x k 4 0 d 0 d k 2 2 k 2 tan - 1 x d - x + 2 d - x k 3 - 2 x k 3 + x k 4 d - k 2 k 2 k 2 < d < 2 k 2 0 otherwise = = π k 2 - 4 d k 3 + d k 4 0 d k 2 2 k 2 tan - 1 2 k 2 - d 2 k d - k 2 - 2 k 2 + 4 d - k 2 k 3 - d k 4 k 2 < d < 2 k 2 0 otherwise
pdf ( Y , d ) = pdf X A - X B 2 + Y A - Y B 2 , d 2 2 d = 2 d π k 2 - 4 d k 3 + d 2 k 4 0 d k 2 d 2 k 2 tan - 1 2 k 2 - d 2 2 k d 2 - k 2 - 2 k 2 + 4 d 2 - k 2 k 3 - d 2 k 4 k < d < 2 k 0 otherwise

References

  1. Kuiper E, Nadjm-Tehrani S: Geographical routing with location service in intermittently connected MANETs. IEEE Trans Veh Technol 2011, 60: 592-604. doi:10.1109/TVT.2010.2091658

    Article  Google Scholar 

  2. Groenevelt R, Nain P, Koole G: The message delay in mobile ad hoc networks. Perform Eval 2005, 62: 201-228. doi:10.1016/j.peva.2005.07.018

    Google Scholar 

  3. Small T, Haas ZJ: The shared wireless infostation model--a new ad hoc networking paradigm (or Where there is a Whale, there is a Way). Paper presented at the 4th ACM international symposium on Mobile ad hoc networking & computing (MobiHoc) 2003.

    Google Scholar 

  4. Spyropoulos T, Psounis K, Raghavendra CS: Efficient routing in intermittently connected mobile networks: the single-copy case. IEEE/ACM Trans Netw 2008, 16: 63-76. doi:10.1109/TNET.2007.897962

    Article  Google Scholar 

  5. Heimlicher S, Karaliopoulos M, Levy H, Spyropoulos T: On leveraging partial paths in partially-connected networks. Paper presented at IEEE INFOCOM 2009. Rio de Janeiro

    Google Scholar 

  6. Jindal A, Psounis K: Fundamental mobility properties for realistic performance analysis of intermittently connected mobile networks. In Paper presented at the Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW). White Plains, NY; 2007.

    Google Scholar 

  7. Spyropoulos T, Psounis K, Raghavendra CS: Performance analysis of mobility-assisted routing. Paper presented at the 7th ACM international symposium on Mobile ad hoc networking and computing (MobiHoc) 2006.

    Google Scholar 

  8. Resta G, Santi P: A framework for routing performance analysis in delay tolerant networks with application to noncooperative networks. IEEE Trans Parallel Distrib Syst 2012, 23: 2-10. doi:10.1109/TPDS.2011.99

    Article  Google Scholar 

  9. Chaintreau A, Hui P, Crowcroft J, Diot C, Gass R, Scott J: Impact of human mobility on the design of opportunistic forwarding algorithms. Paper presented at the 25th IEEE International Conference on Computer Communications (INFOCOM) 2006.

    Google Scholar 

  10. Karagiannis T, Le Boudec J-Y, Vojnovic M: Power law and exponential decay of inter contact times between mobile devices. Paper presented at the 13th Annual ACM International Conference on Mobile Computing and Networking (MobiCom) 2007.

    Google Scholar 

  11. Cai H, Eun DY: Toward stochastic anatomy of inter-meeting time distribution under general mobility models. Paper presented at the 9th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc) 2008.

    Google Scholar 

  12. Hong S, Rhee I, Kim SJ, Lee K, Chong S: Routing performance analysis of human-driven delay tolerant networks using the truncated Levy walk model. Paper presented at the 1st ACM SIGMOBILE workshop on Mobility models (MobilityModels) 2008.

    Google Scholar 

  13. Zhang X, Kurose J, Levine N, Towsley D, Zhang H: Study of a bus-based disruption-tolerant network: mobility modeling and impact on routing. Paper Presented at the 13th Annual ACM International Conference on Mobile Computing and Networking (MobiCom) 2007.

    Google Scholar 

  14. Zhang X, Neglia G, Kurose J, Towsley D: Performance modeling of epidemic routing. Comput Netw 2007, 51: 2867-2891. doi:10.1016/j.comnet.2006.11.028 10.1016/j.comnet.2006.11.028

    Article  Google Scholar 

  15. Altman E, Basar T, De Pellegrini F: Optimal monotone forwarding policies in delay tolerant mobile ad-hoc networks. Perform Eval 2010, 67: 299-317. doi:10.1016/j.peva.2009.09.001 10.1016/j.peva.2009.09.001

    Article  Google Scholar 

  16. Jacquet P, Mans B, Rodolakis G: Information propagation speed in mobile and delay tolerant networks. IEEE Trans Inf Theory 2010, 56: 5001-5015. doi:10.1109/TIT.2010.2059830

    Article  MathSciNet  Google Scholar 

  17. Asplund M: PhD Dissertation. Linköping University; 2011. URL: urn:nbn:se:liu:diva-60553

    Google Scholar 

  18. Santi P: Topology control in wireless ad hoc and sensor networks. ACM Comput Surv (CSUR) 2005, 37: 164-194. doi:10.1145/1089733.1089736 10.1145/1089733.1089736

    Article  Google Scholar 

  19. Baron M: Probability and Statistics for Computer Scientists. Chapman & Hall/CRC; 2007.

    Google Scholar 

  20. Le Boudec J-Y, Vojnović M: Perfect simulation and stationarity of a class of mobility models. Paper Presented at the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM) 2005.

    Google Scholar 

  21. Nain P, Towsley D, Liu B, Liu Z: Properties of random direction models. Paper Presented at the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM) 2005.

    Google Scholar 

  22. Kuiper E, Nadjm-Tehrani S: Predicting the performance of geographic delay-tolerant routing. Presented at the Military Communications Conference (MILCOM) 2011.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Erik Kuiper.

Additional information

Competing interests

The authors declare that they have no competing interests.

Authors’ original submitted files for images

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Reprints and permissions

About this article

Cite this article

Kuiper, E., Nadjm-Tehrani, S. & Yuan, D. A framework for performance analysis of geographic delay-tolerant routing. J Wireless Com Network 2012, 184 (2012). https://doi.org/10.1186/1687-1499-2012-184

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/1687-1499-2012-184

Keywords