Skip to main content
Log in

On estimating the interest satisfaction ratio in IEEE 802.15.4-based named-data networks

  • Published:
Annals of Telecommunications Aims and scope Submit manuscript

Abstract

Named-Data Networking (NDN) over Low Power and Lossy Networks (LLNs), employing IEEE 802.15.4 communication technology, is projected to provide native support for mobility and efficient content delivery for the emerging Internet of Things (IoT). While many interest forwarding strategies have been proposed for NDNs over LLNs, most existing studies have relied on software simulations to evaluate their performance due to the lack of analytical modeling tools. This paper introduces the first analytical model for estimating the Interest Satisfaction Ratio (ISR) in NDN over LLNs, which is a crucial metric for assessing the effectiveness of interest forwarding strategies. We develop the analytical model specifically for the broadcast forwarding strategy, which has been extensively studied due to its simplicity and ease of implementation. Simulation results confirm that the proposed model predicts the ISR with reasonable accuracy. The model is then used to elucidate the strong interaction between the CSMA/CA parameters of the IEEE 802.15.4 standard and the achieved ISR.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25
Fig. 26

Similar content being viewed by others

Data availability

Not applicable.

References

  1. IEEE (2016) IEEE Standard for low-rate wireless networks. In: IEEE Std 802.15.4-2015 (Revision of IEEE Std 802.15.4-2011), pp 1–709. https://doi.org/10.1109/IEEESTD.2016.7460875

  2. Fazli F, Mansubbassiri M (2022) V-RPL: An effective routing algorithm for low power and lossy networks using multi-criteria decision-making techniques. Ad Hoc Networks 132(1):102868

    Article  Google Scholar 

  3. Guna’thilake NA, Al-Dubai A, Buchanan WJ (2022) Internet of things: concept, implementation and challenges. Internet of Things and Its Applications, Springer, pp. 145–155

  4. Majid M et al (2022) Applications of wireless sensor networks and Internet of things frameworks in the industry revolution 4.0: A systematic literature review. Sensors 22(6):2087

    Article  Google Scholar 

  5. Yang Y, Wang H, Jiang R, Guo X, Cheng J, Chen Y (2022) A review of IoT-enabled mobile healthcare: technologies, challenges, and future trends. IEEE Internet Things J 9(12):9478–9502

    Article  Google Scholar 

  6. Ghaleb B et al (2018) A survey of limitations and enhancements of the IPv6 routing protocol for low-power and lossy networks: a focus on core operations. IEEE Commun Surveys Tutorials 21:1607–1635

    Article  Google Scholar 

  7. Xue K, Wei DSL, Bruschi R, Chih-Lin I (2019) The quest for information-centric networking. IEEE Commun Mag 57(6):12

    Article  Google Scholar 

  8. Djama A, Djamaa B, Senouci MR (2020) Information-centric networking solutions for the Internet of things: a systematic mapping review. Comput Commun 159:37–59

    Article  Google Scholar 

  9. Baccelli F, Mehlis C, Hahm O, Schmidt TC, Wählisch M (2014) Information-centric networking in the IoT: experiments with NDN in the wild. In: Proc. 1st ACM Conference on Information-Centric Networking (ICN’ 2014), ACM, NY, pp 77–86. https://doi.org/10.1145/2660129.2660144

  10. Jacobson V, Smetters DK, Thornton JD, Plass MF, Briggs NH, Braynard RL (2009) Networking named content. In: Proc. 5th Int. Conf. Emerging Networking Experiments & Technologies, ACM, NY, pp 1–12. https://doi.org/10.1145/1658939.1658941

  11. Wang L, Afanasyev A, Kuntz R, Vuyyuru R, Wakikawa R, Zhang L (2012) Rapid traffic information dissemination using named data. Proc. 1st ACM Workshop Emerging Name-Oriented Mobile Networking Design - Architecture, Algorithms, and Applications, vol. 12, ACM, NY, USA, pp. 7–12

  12. Tariq A, Rehman RA, Kim BS (2020) Forwarding strategies on NDN-based wireless networks: a survey. IEEE Commun Surveys Tutorials 22(1):68–95

    Article  Google Scholar 

  13. ndnSIM Simulator, 08, 2020. https://ndnsim.net/current/

  14. Amadeo M, Molinaro A, Ruggeri G (2013) E-CHANET: routing, forwarding and transport in information-centric multi-hop wireless networks. Comput Commun 36(7):792–803

    Article  Google Scholar 

  15. Michael M, Vasileios P, Lixia Z (2010) Listen first, broadcast later: topology-agnostic forwarding under high dynamics. In: Proc. Annual Conf. International Technology Alliance in Network and Information Science, pp 1–8. Available online: http://web.cs.ucla.edu/~lixia/papers/10ITA-LFBL.pdf

  16. Gao Z, Zhang H, Zhang B (2016) Energy efficient interest forwarding in NDN-based wireless sensor networks. Mobile Information Systems, pp 15. https://doi.org/10.1155/2016/3127029

  17. Djama A, Djamaa B, Senouci MR, Kameche N (2022) LAFS: a learning-based adaptive forwarding strategy for NDN-based IoT network. Ann Telecommun 77:311–330. https://doi.org/10.1007/s12243-021-00850-2

    Article  Google Scholar 

  18. Yu YT, Dilmaghani RB, Calo S, Sanadidi MY, Gerla M (2013) Interest propagation in named data MANETs. In: Proc. 2013 Int. Conf. Computing, Networking & Communications (ICNC), pp 1118–1122. https://doi.org/10.1109/ICCNC.2013.6504249

  19. Ould Khaoua AS, Boukra A, Bey F (2022) Probabilistic forwarding in named data networks for Internet of Things. In: Chikhi S, Diaz-Descalzo G, Amine A, Chaoui A, Saidouni DE, Kholladi MK (eds) Modelling and Implementation of Complex Systems. MISC 2022. Lecture Notes in Networks and Systems, vol 593. Springer, Cham. https://doi.org/10.1007/978-3-031-18516-8_2

  20. Abane A, Daoui M, Bouzefrane S, Mühlethaler P (2019) A lightweight forwarding strategy for named data networking in low-end IoT. J Netw Comput Appl 148:102445

  21. Aboud A, Touati H, Hnich B (2019) Efficient forwarding strategy in an NDN-based internet of things. Clust Comput 22(3):805–818

    Article  Google Scholar 

  22. IEEE (2016) IEEE standard for information technology—telecommunications and information exchange between systems local and metropolitan area networks—specific requirements - part 11: Wireless lan medium access control (mac) and physical layer (phy) specifications. IEEE Std 802.11-2016 (Revision of IEEE Std 802.11-2012), pp 1–3534. https://doi.org/10.1109/IEEESTD.2016.7786995

  23. Carofiglio G, Morabito G, Muscariello L, Solis I, Varvello M (2013) From content delivery today to information-centric networking. Comput Netw 57(16):3116–3127

    Article  Google Scholar 

  24. Wang GQ, Huang T, Liu J, Chen JY, Liu YJ (2013) Modeling in-network caching and bandwidth sharing performance in information-centric networking. J China Univ Posts Telecommun 20(2):99–105

    Article  Google Scholar 

  25. Ren Y, Li J, Li L, Shi S, Zhi J, Wu H (2017) Modeling content transfer performance in information-centric networking. Futur Gener Comput Syst 74:12–19

    Article  Google Scholar 

  26. Udugama A, Palipana S, Goerg C (2013) Analytical characterization of multi-path content delivery in content-centric networks. In: Proc. Int. Conf. Future Internet Communications (CFIC), Coimbra, Portugal, pp 1–7. https://doi.org/10.1109/CFIC.2013.6566319

  27. Carofiglio G, Gallo M, Muscariello L, Perino D (2011) Modeling data transfer in content-centric networking, Proc. 23rd International Tele-traffic Congress (ITC), pp. 111–118

  28. Abane A, Muhlethaler P, Bouzefrane S (2021) Modeling and improving named data networking over IEEE 802.15.4. Ann Telecommun 76(11–12):839–850

    Article  Google Scholar 

  29. Rehman MA, Kim D, Choi K, Ullah R, Kim BS (2019) A Statistical performance analysis of named data ultra-dense networks. Appl Sci 9:3714. https://doi.org/10.3390/app9183714

    Article  Google Scholar 

  30. Kuan C, Dimyati K (2006) Analysis of collision probabilities for saturated IEEE 802.11 MAC protocol. Electron Lett 42(19):1125–1127

    Article  Google Scholar 

  31. Sheikh SM, Wolhuter R, Engelbrecht HA (2017) A model for analyzing the performance of wireless multi-hop networks using a contention-based CSMA/CA strategy. KSII Trans Internet Inf Syst 11(5):2499–2522

    Google Scholar 

  32. Vu HL, Sakurai T (2006) Collision probability in saturated IEEE 802.11 networks. In: Proc. Australian Telecommunication Networks and Applications Conference (ATNAC), Australia, pp 1–5

  33. Bianchi G (2000) Performance analysis of the IEEE 802.11 distributed coordination function. IEEE J Selected Areas Commun 18(3):535–547

    Article  Google Scholar 

  34. Johnson DB, Maltz DA (1996) Dynamic source routing in ad hoc wireless networks, Mobile Computing. Kluwer Int Series Eng Comput Sci 353:153–181

    Article  Google Scholar 

  35. Zhang L, Cai L, Pan J (2013) Connectivity in two-dimensional lattice networks. Proc IEEE INFOCOM, pp. 2814- 2822

  36. Zhang L, Cai L, Pan J, Tong F (2014) A new approach to the directed connectivity in two-dimensional lattice networks. IEEE Trans Mob Comput 13(11):2458–2472

    Article  Google Scholar 

  37. Zhang L et al. Square lattice network directed connectivity calculator. http://grp.pan.uvic.ca/~leiz/latticepoly.html

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Adel Salah Ould Khaoua.

Ethics declarations

Conflict of interest

The authors declare no competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendix. Computing the reachability probability, R(p)

Appendix. Computing the reachability probability, R(p)

This appendix briefly presents the methodology of [35, 36] for computing the reachability probability in 2-dimensional grids. Consider Fig. 6, which illustrates a 6 × 6 square with directed links, and suppose a packet is originated at node (0, 0) and destined for node (5, 5). The objective is to determine the reachability probability, R(p). It is the likelihood that the packet from the source node (0, 0) reaches the destination node (5, 5), given that each network node retransmits the packet to the next adjacent node with probability p. We assume that the probability p is uniform across all nodes. Moreover, each node independently decides whether or not to retransmit a given packet.

Despite the above assumptions, it is challenging to derive the reachability probability that the packet from node (0, 0) will reach node (5, 5). This is because to reach node (5, 5), the packet may pass through node (4, 5) or node (5, 4) at the last hop. Even if the reachability probability to node (4, 5) and node (5, 4) are known, it will still be challenging to determine the reachability probability to node (5, 5) since the paths from node (0, 0) to node (5, 5) are not independent.

A brute force approach would examine all possible paths between the source and destination. However, this approach’s complexity is hampered by a combinatorial explosion due to the exponentially increasing number of paths as the grid grows. Furthermore, most paths share common links, making them non-independent.

To address this challenge, the authors of [35, 36] have developed a technique for computing the reachability probability in a 2-dimensional grid. They first calculated the reachability probability for the two fundamental paths: serial and parallel. These probabilities were subsequently used to determine the reachability probability for the 2 × 2 square and triangular grid. After that, the authors employed serial and parallel paths, 2 × 2 squares, and triangular grids as building blocks to create larger grids hierarchically. They combined their respective reachability probabilities to compute the reachability probability in larger grids, such as 3 × 3, 4 × 4, etc.

Let us illustrate the approach for computing the reachability probabilities for “serial” and “parallel” paths. As depicted in Fig. 

Fig. 27
figure 27

Two types of paths exist in the grid: serial and parallel paths

27, in a “serial” path where two directed links connect nodes A to C through a common node B, the reachability probability, \({R}_{0}\left(p\right)\), that a packet generated by node A reaches node C is given by.

$${R}_{0}\left(p\right)= p \cdot p = {p}^{2}$$
(21)

On the other hand, Fig. 27 b shows two “parallel” paths connecting node A to node C, each of which is serial. The reachability probability, \({R}_{1}\left(p\right)\), can be expressed, using the principle of inclusion and exclusion because the two parallel paths are not independent, as.

$${R}_{1}\left(p\right) = {R}_{0}\left(p\right) + {R}_{0}\left(p\right)- {R}_{0}\left(p\right)\cdot {R}_{0}\left(p\right)= {p}^{2}+{p}^{2}-{p}^{2}\cdot {p}^{2}= -1 \cdot {p}^{4} +2 \cdot {p}^{2}$$
(22)

The probability \({R}_{1}\left(p\right)\) can then be used to compute the reachability probability for the 2 × 2 square. Figure 

Fig. 28
figure 28

The 2 × 2 square is composed of two parallel paths

28 reveals that the 2 × 2 square is composed of two parallel paths. Consequently, the reachability probability in the 2 × 2 square is \({R}_{1}\left(p\right)\), given by Eq. (A.2).

The authors in [35, 36] used the serial and parallel paths, and the 2 × 2 square, to compose larger grids hierarchically. In doing so, they encountered the triangular grid when dealing with larger grids. The triangular grid provides a means to summarize a path between two nodes at the opposite corner in a large grid. Figure 

Fig. 29
figure 29

The triangular grid is composed of two parallel paths

29 indicates that the triangular grid consists of two parallel paths, each is a serial path. The first serial path consists of a single link; thus, its reachability probability is simply p. However, the second path is serial, and its reachability probability is.\({R}_{0}\left(p\right)\). Consequently, we can write the reachability probability of the triangular grid, \({R}_{T}\left(p\right)\) using the principle of inclusion and exclusion principle as

$$R_T\left(p\right)=p+R_0\left(p\right)-p{\cdot R}_0\left(p\right)=p+p^2-p\cdot p^2=p+p^2-p^3.$$
(23)

The study of [35, 36] has utilized the reachability probabilities obtained from Eqs. (A.1) to (A.3) to calculate the reachability probability of larger grids, including 3 × 3 and 4 × 4 squares, and so forth. It is important to note that constructing larger grids from fundamental components, such as serial paths, parallel paths, 2 × 2 squares, and triangular grids, requires addressing various unique scenarios separately. Due to the lengthy nature of explaining these cases, we refer the interested reader to [35, 36] for further information.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ould Khaoua, A.S., Boukra, A. & Bey, F. On estimating the interest satisfaction ratio in IEEE 802.15.4-based named-data networks. Ann. Telecommun. 79, 111–130 (2024). https://doi.org/10.1007/s12243-023-00983-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12243-023-00983-6

Keywords

Navigation