On exploiting transient contact patterns for data forwarding in delay tolerant networks

Wei Gao, Guohong Cao

Research output: Chapter in Book/Report/Conference proceedingConference contribution

64 Scopus citations

Abstract

Effective data forwarding in Delay Tolerant Networks (DTNs) is challenging, due to the low node density, unpredictable node mobility and lack of global information in such networks. Most of the current data forwarding schemes choose the nodes with the best cumulative capability of contacting others as relays to carry and forward data, but these nodes may not be the best relay choices within a short time period, due to the heterogeneity of the transient node contact patterns. In this paper, we propose a novel approach to improve the performance of data forwarding in DTNs by exploiting the transient node contact patterns. We formulate the transient node contact patterns based on experimental studies of realistic DTN traces, and propose appropriate forwarding metrics based on these patterns to improve the effectiveness of data forwarding decision. When applied to various data forwarding strategies, our proposed forwarding metrics achieve much better performance compared to existing schemes with similar forwarding cost.

Original languageEnglish (US)
Title of host publication18th IEEE International Conference on Network Protocols, ICNP'10
Pages193-202
Number of pages10
DOIs
StatePublished - Dec 1 2010
Event18th IEEE International Conference on Network Protocols, ICNP'10 - Kyoto, Japan
Duration: Oct 5 2010Oct 8 2010

Publication series

NameProceedings - International Conference on Network Protocols, ICNP
ISSN (Print)1092-1648

Other

Other18th IEEE International Conference on Network Protocols, ICNP'10
CountryJapan
CityKyoto
Period10/5/1010/8/10

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Software

Fingerprint Dive into the research topics of 'On exploiting transient contact patterns for data forwarding in delay tolerant networks'. Together they form a unique fingerprint.

Cite this