Skip to main content

Advertisement

Log in

Cooperative transmission control scheme using erasure coding for vehicular delay-tolerant networks

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Transmission control is a challenging problem in vehicular delay-tolerant networks because the network has a high vehicle mobility which leads to a dynamic and unreliable network connectivity. In this paper, we propose a COoperative Transmission control Scheme using erasure coding (COTS) to improve the transmission efficiency. In this scheme, the cooperative message distribution algorithm uses delivery capacities to decide the transmission direction and traffic. Besides, the cooperative task scheduling algorithm sets the transfer order for messages from both sides. This algorithm uses a comprehensive parameter, the number of data blocks to send, to simplify the computation of transmission priority. After analyzing the vehicle transmission behavior under different storage conditions, we apply local deleting and creating behaviors instead of sending and receiving behaviors in specific states to decrease communication overhead. Simulation results show that COTS, compared with other well-known schemes, not only increases the delivery ratio but also decreases the delivery latency and the transmission overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Misra S, Krishna PV, Saritha V (2013) LACAV: an energy-efficient channel assignment mechanism for vehicular ad hoc networks. J Supercomput 62(3):1241–1262

    Article  Google Scholar 

  2. Ott J, Kutscher D (2005) A disconnection-tolerant transport for drive-thru internet environments. In: Proceedings of IEEE INFOCOM’05, March, Miami, USA

  3. Yu H, Ma J, Bian H (2012) Reasonable routing in delay/disruption tolerant networks. Front Comput Sci 5(3):327–334

    Article  MathSciNet  Google Scholar 

  4. Wu Y, Deng S, Huang H (2013) Optimal management of dynamic information in delay tolerant networks. J Supercomput. doi:10.1007/s11227-013-0909-8

  5. Soares VNGJ, Farahmand F, Rodrigues J (2009) A layered architecture for vehicular delay-tolerant networks. In: Proceedings of IEEE ISCC’09. Sousse, Tunisia, July, pp 122–127

  6. Lu X, Pan H, Lio P (2012) High delivery performance opportunistic routing scheme for delay tolerant networks. China Commun 9(6):145–153

    Google Scholar 

  7. Tang X, Pu J, Gao Y, Alshehri MAZ, Xiong Z, Wan Y (2013) Knowledge-based replica deletion scheme using directional anti-packets for vehicular delay-tolerant networks. Trans Emerg Telecommun Technol. doi:10.1002/ett.2685

  8. Niyato D, Wang P (2009) Optimization of the mobile router and traffic sources in vehicular delay-tolerant network. IEEE Trans Veh Tech 58(9):5095–5104

    Article  Google Scholar 

  9. Weatherspoon H, Kubiatowicz J (2002) Erasure coding vs. replication: a quantitative comparison. In: Proceedings of IPTPS’02, London, UK, pp 328–338

  10. Wang Y, Jain S, Martonosi M, Fall K (2005) Erasure-coding based routing for opportunistic networks. Proceedings of ACM SIGCOMM WDTN’05. USA, August, Philadelphia, pp 229–236

  11. Vahdat A, Becher D (2000), Epidemic routing for partially connected ad hoc networks. Duke University, Technical, Report CS-200006, April

  12. Spyropoulos T, Psounis K, Raghavendra CS (2005) Spray and wait: an efficient routing scheme for intermittently connected mobile networks. In: Proceedings of ACM SIGCOMM WDTN’05, August, USA, Philadelphia, pp 252–259

  13. Lindgren A, Doria A, Schelen O (2003) Probabilistic routing in intermittently connected networks. ACM SIGMOBILE Mob Comput Commun Rev 7(3):19–20

    Article  Google Scholar 

  14. Burgess J, Gallagher B, Jensen D, Levine BN (2006) MaxProp: routing for vehicle-Based disruption-tolerant networks. In: Proceedings of IEEE INFOCOM’06, April, Barcelona, Spain

  15. Xu M, Song WZ, Zhao Y (2011) Opportunistic network erasure coding in disruptive sensor networks. In: Proceedings of IEEE MASS’11, October, Valencia, Spain, pp 685–690

  16. Bulut E, Wang Z, Szymanski BK (2010) Cost efficient erasure coding based routing in delay tolerant networks. In: Proceedings of IEEE ICC’10, May, Cape Town, South Africa

  17. Wicker SB, Bhargava VK (eds) (1999) Reed–Solomon codes and their applications. Wiley, New York

  18. Barry JR (2001) Low-density parity-check codes. Georgia Institute of Technology, Atlanta

  19. MacKay DJC (2005) Fountain codes. IEE Proc Commun 152(6):1062–1068

  20. Luby M (2002) LT codes. In: Proceedings of IEEE FOCS’02, November, Vancouver, Canada

  21. Shokrollahi A (2006) Raptor codes. IEEE Trans Inf Theory 52(6):2551–2567

    Article  MathSciNet  Google Scholar 

  22. Tsapeli F, Tsaoussidis V (2012) Routing for opportunistic networks based on probabilistic erasure coding. In: Proceedings of WWIC’12, Greece, June, pp 257–268

  23. Lu H, Liao W (2012) Cooperative multicasting in network-coding enabled multi-rate wireless relay networks. Proceedings of IEEE INFOCOM’12. Orlando, USA, March, pp 334–342

  24. Yang J, Fei Z (2011) Statistical filtering based broadcast protocol for vehicular networks. In: Proceedings of IEEE ICCCN’11, Maui, Hawaii, USA, July, pp 1–6

  25. Yan Q, Li M, Yang Z, Lou W, Zhai H (2012) Throughput analysis of cooperative mobile content distribution in vehicular network using symbol level network coding. IEEE J Sel Areas Commun 30(2):484–492

    Article  Google Scholar 

  26. Liao Y, Zhang Z, Ryu B, Gao L (2007) Cooperative robust forwarding scheme in DTNs using erasure coding. In: Proceedings of IEEE MILCOM’07, October, Orlando, USA

  27. Zhang L, Lakas A, El-Sayed H, Barka E (2013) Mobility analysis in vehicular ad hoc network (VANET). J Netw Comput Appl 36(3):1050–1056

    Article  Google Scholar 

  28. Blum JJ, Natarajan R, Eskandarian A (2011) Synchronization challenges in media access coordination for vehicular ad hoc networks. Wirel Commun Mob Comput 11(7):954–963

    Article  Google Scholar 

  29. Keranen A, Ott J, Karkkainen T (2009) The ONE simulator for DTN protocol evaluation. In: Proceedings of SIMUTOOL’09, March, Rome, Italy

  30. Tang X, Pu J, Cao K, Zhang Y, Xiong Z (2012) Integrated extensible simulation platform for vehicular sensor networks in smart cities. Int J Distrib Sens Netw. doi:10.1155/2012/860415

  31. Giordano E, Frank R, Pau G, Gerla M (2011) CORNER: a radio propagation model for VANETs in urban scenarios. Proc IEEE 99(7):1280–1294

    Article  Google Scholar 

  32. Arshad SA, Murtaza MA, Tahir M (2012) Fair buffer allocation scheme for integrated wireless sensor and vehicular networks using markov decision processes. In: Proceedings of IEEE TVC Fall’12, September, Quebec City, Canada

  33. Ekici E, Akyildiz IF, Bender MD (2001) A distributed routing algorithm for datagram traffic in LEO satellite networks. IEEE/ACM Trans Netw 9(2):137–147

    Article  Google Scholar 

  34. Baheti R, Gill H (2011) Cyber-physical Systems. The Impact of Control Technology, IEEE, pp 161–166

  35. Eisenman SB, Miluzzo E, Lane ND, Peterson RA, Ahn GS, Campbell AT (2009) BikeNet: a mobile sensing system for cyclist experience mapping. ACM Trans Sens Netw 6(1)

Download references

Acknowledgments

We gratefully acknowledge the support from China’s Natural Science Foundations (61272350 & 61173009), the National High Technology Research and Development Program of China (2013AA01A601), the International S&T Cooperation Program of China (2010DFB13350), the Science Foundation of Shenzhen City in China (JCYJ20120618170520900), the State Key Laboratory of Software Development Environment (SKLSDE-2013ZX-27) and the Innovation Foundation of BUAA for PhD Graduates.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaolan Tang.

Appendix

Appendix

Proposition 1

In the cooperative message distribution algorithm, the expected number of coded blocks carried by node 1 in Eq. (2) is accurate.

Proof

Assume node 1 and node 2 are two meeting vehicles in the cooperative message distribution algorithm. Let \(\mathrm{CD}_1\) and \(\mathrm{CD}_2\) be their capacities of delivering a given data message, respectively. Considering the positiveness (or negativeness) of the weight \(w_i\) in Eq. (1) shows the positive (or negative) correlation with the delivery capacity, \(\mathrm{CD}_1\) and \(\mathrm{CD}_2\) may also be positive or negative. We compute the expected number of coded blocks according to the signs of these capacities below.

We use the delivery capacities and the current storage states in both sides to compute the expected storage states. The current numbers of data blocks in nodes 1 and 2 are \(\mathrm{Count}_1\) and \(\mathrm{Count}_2\), respectively. Take the expected number of coded blocks of this message in node 1, \(\mathrm{Count}_1^{'}\), as an instance. We analyze different cases in detail below. The computation of \(\mathrm{Count}_2^{'}\) for node 2 can be done in a similar way.

  1. 1.

    When \(\mathrm{CD}_1=CD_2=0\), nodes 1 and 2 are independent with the delivery of this data message. As zero is better than negative values, it is still used in the block distribution. For these two nodes have the same capacity to deliver the blocks, we distribute the data blocks equally in the neighborhood, expressed as \(\mathrm{Count}_1^{'}=\frac{1}{2}(Count_1+Count_2)\).

  2. 2.

    When \(\mathrm{CD}_1>0\) and \(\mathrm{CD}_2 \ge 0\), since the sum of these two capacities is positive, the data blocks are distributed in proportion to each node’s delivery capacity. Thus node 1 gets its part at the ratio of \(\mathrm{CD}_1\) to the sum capacity, as \(\mathrm{Count}_1^{'}=\frac{\mathrm{CD}_1}{\mathrm{CD}_1+\mathrm{CD}_2}(\mathrm{Count}_1+\mathrm{Count}_2)\).

  3. 3.

    When \(\mathrm{CD}_1 \ge 0\) and \(\mathrm{CD}_2 <0\), it implies that node 2 interrupts the delivery of this data message, while node 1 does well to deliver the message. In order to avoid negative effects of node 2, we distribute all the blocks in the neighborhood to node 1. That is, \(\mathrm{Count}_1^{'}=\mathrm{Count}_1+\mathrm{Count}_2\).

  4. 4.

    When \(\mathrm{CD}_1<0\) and \(\mathrm{CD}_2 \ge 0\) or \(\mathrm{CD}_1=0\) and \(\mathrm{CD}_2>0\), node 1 is not helpful to delivery this message (\(\mathrm{CD}_1=0\)) or even interrupts the delivery (\(\mathrm{CD}_1<0\)), while node 2 does well. In order to avoid negative effects of node 1, all the blocks are distributed to node 2. In other words, node 1 gets no blocks, shown as \(\mathrm{Count}_1^{'}=0\).

  5. 5.

    When \(\mathrm{CD}_1<0\) and \(\mathrm{CD}_2<0\), both nodes 1 and 2 disturb the data delivery. However, the interruptions have different extents. The smaller the capacity is, the stronger the negative impact is. Thus less blocks should be distributed to the node having a smaller capacity. We distribute blocks at the reverse ratio of the capacities as \(\mathrm{Count}_1^{'}=\frac{\mathrm{CD}_2}{\mathrm{CD}_1+\mathrm{CD}_2}(\mathrm{Count}_1+\mathrm{Count}_2)\).

To sum up, these cases have covered all the possibilities of the capacities. It works well to compute \(\mathrm{Count}_1^{'}\) and \(\mathrm{Count}_2^{'}\) in nodes 1 and 2. Comparing the current and expected storage states, we get \(\mathrm{Count}_1^{'}+\mathrm{Count}_2^{'}=\mathrm{Count}_1+\mathrm{Count}_2\). Thus the total blocks in the neighborhood are distributed at two sides simultaneously. Therefore, Eq. (2) is accurate to compute the expected number of blocks carried by node 1 in the cooperative message distribution algorithm. \(\square \)

Proposition 2

\(\mathrm{TCount}\) is a suitable substitute for the local and neighbor parameters Prob and Count in the cooperative task scheduling algorithm.

Proof

As shown in Eq. (5), we construct the mathematical model of transmission priority of a given data message. Let node 1 and node 2 be two meeting vehicles. Assume \(\mathrm{TCount}_1>0\), which means that node 1 should send \(\mathrm{TCount}_1\) blocks of this message to node 2. Other cases when \(\mathrm{TCount}_2>0\) can be analyzed similarly. Denote the parameters from node 1 as \(\mathrm{Prob}_1\) and \(\mathrm{Count}_1\), and those from node 2 as \(\mathrm{Prob}_2\) and \(\mathrm{Count}_2\).

First, we qualitatively analyze the effects of \(\mathrm{Prob}_1\), \(\mathrm{Prob}_2\), \(\mathrm{Count}_1\) and \(\mathrm{Count}_2\) on the transmission priority of this message from node 1 to node 2.

Larger \(\mathrm{Prob}_1\) indicates a higher probability for the sender node 1 to deliver these blocks by itself. Thus node 1 has a smaller chance to forward these blocks to its neighbor. In other words, \(\mathrm{Prob}_1\) has a negative correlation with the transmission priority of this message from node 1 to node 2. Similarly, \(\mathrm{Prob}_2\) shows a positive correlation since a larger probability of the receiver node 2 to deliver these blocks prompts the data transmission from node 1 to node 2.

Larger \(\mathrm{Count}_1\) indicates that node 1 has more data blocks. As data dissemination is helpful for the data delivery, larger \(\mathrm{Count}_1\) requires more data transfers to others, to improve the cover range of these blocks. Thus \(\mathrm{Count}_1\) shows positive correlation with the priority. Similarly, \(\mathrm{Count}_2\) has a negative effect on the priority, since sufficient blocks in node 2 prohibit the extra transmission from node 1 to node 2. Therefore, it is concluded that the weights of \(\mathrm{Prob}_2\) and \(\mathrm{Count}_1\) in Eq. (5) should be positive, while those of \(\mathrm{Prob}_1\) and \(\mathrm{Count}_2\) should be negative.

Next we analyze Eq. (9) to check out the sign of each parameter. Note that Eq. (9) can be simplified as \(\mathrm{CT}=a \times \mathrm{TTL} +b \times \mathrm{TCount}\) where \(a>0, b>0\). By Eq. (4), we get

$$\begin{aligned} \mathrm{CT}&= a \times \mathrm{TTL} +b \times (\mathrm{Count}_1- \frac{\mathrm{Prob}_1}{\mathrm{Prob}_1+\mathrm{Prob}_2}(\mathrm{Count}_1+\mathrm{Count2})) \nonumber \\&= a \times \mathrm{TTL} +b \times \mathrm{Count}_1- \frac{b \times \mathrm{Prob}_1}{\mathrm{Prob}_1+\mathrm{Prob}_2}(\mathrm{Count}_1+\mathrm{Count}2) \nonumber \\&= a \times \mathrm{TTL} +b \times \mathrm{Count}_1-\frac{b}{1+{\mathrm{Prob}_2}/{\mathrm{Prob}_1}}(\mathrm{Count}_1+\mathrm{Count}_2)) \end{aligned}$$
(11)
$$\begin{aligned}&= a \times \mathrm{TTL} +\frac{b \times \mathrm{Prob}_2}{\mathrm{Prob}_1+\mathrm{Prob}_2}\mathrm{Count}_1- \frac{b \times \mathrm{Prob}_1}{\mathrm{Prob}_1+\mathrm{Prob}_2}\mathrm{Count2}. \end{aligned}$$
(12)

From Eqs. (11), (12), we derive that \(\mathrm{Prob}_2\) and \(\mathrm{Count}_1\) have positive correlations with CT, while \(\mathrm{Prob}_1\) and \(\mathrm{Count}_2\) have negative correlations, which are in accordance with the previous theoretical analysis. Therefore, we conclude that \(\mathrm{TCount}\) is a suitable substitute of the local and neighbor parameters Prob and Count in the cooperative task scheduling algorithm. \(\square \)

Rights and permissions

Reprints and permissions

About this article

Cite this article

Tang, X., Pu, J., Ma, K. et al. Cooperative transmission control scheme using erasure coding for vehicular delay-tolerant networks. J Supercomput 68, 1462–1486 (2014). https://doi.org/10.1007/s11227-014-1101-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-014-1101-5

Keywords

Navigation