skip to main content
research-article

Nullspace-based stopping conditions for network-coded transmissions in DTNs

Published:12 July 2013Publication History
Skip Abstract Section

Abstract

In a challenged network environment, where end-to-end connectivity may be a rare occurrence, delay-tolerant routing protocols must strike a balance between the increased robustness and reliability that comes with message replication and the resulting high bandwidth and storage overhead. Network coded routing, in which a node combines messages from different sources, has been shown to increase reliability in the presence of link failures with small additional overhead. A drawback of network coded routing is the lack of a natural stopping condition to control the dissemination of data. We describe an enhanced coding router that uses the mathematical structure of the orthogonal complement, or nullspace, as an improved stopping condition to eliminate redundant transmissions, and an additional technique to balance multiple coded data flows. These changes are incorporated into the DTN2 Reference Implementation and evaluated in two types of experiments. In a simple data-mule scenario, our EBR router comes very close to perfect efficiency. In a more complicated scenario with segmented communities and occasional nodes moving between them, our solutions show a drastic improvement in delivery rates.

References

  1. R. Ahlswede, N. Cai, S. Li, and R. Yeung. Network information flow. IEEE Transactions on Information Theory, 46(4):1204--1216, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. M. Chuah, P. Yang, and Y. Xi. How mobility models affect the design of network coding schemes for disruption tolerant networks. In Proc. of NetCod, 2009.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. S. Deb and M. Médard. Algebraic gossip: a network coding approach to optimal multiple rumor mongering. In Proc. 42nd Allerton Conference on Communication, Control, and Computing, 2004.Google ScholarGoogle Scholar
  4. DTNRG. DTN bundle protocol ref. implm. http://www.dtnrg.org/wiki/Code.Google ScholarGoogle Scholar
  5. http://www.emulab.net.Google ScholarGoogle Scholar
  6. K. R. Fall. A delay-tolerant network architecture for challenged internets. In Proc. of SIGCOMM' 03, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. C. Gkantsidis and P. Rodriguez. Network coding for large scale content distribution. In Proc. of INFOCOM'05, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  8. B. Haeupler. Analyzing network coding gossip made easy. In Proc. of the 43rd Symp. on Theory of Computing (STOC), 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. D. Hahn, G. Lee, B. Walker, M. Beecher, and P. Mundur. Using virtualization and live migration in a scalable mobile wireless testbed. SIGMETRICS Perform. Eval. Rev., 38:21--25, January 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. Zinky and A. Caro and G. Stein. Bundle protocol erasure coding extension. Internet Draft.Google ScholarGoogle Scholar
  11. S. Jain, M. Demmer, R. Patra, and K. Fall. Using redundancy to cope with failures in a delay tolerant network. In Proc. ACM Sigcomm, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. P. Leach, M. Mealling, and R. Salz. A Universally Unique IDentifier (UUID) URN Namespace. RFC 4122, 2005.Google ScholarGoogle Scholar
  13. Y. Lin, B. Li, and B. Liang. Stochastic analysis of network coding in epidemic routing. In IEEE JSAC, 26(5): 794--808, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. A. Petz, C.-L. Fok, C. Julien, B. Walker, and C. Ardi. Network coded routing in delay tolerant networks: An experience report. In Proc. of ExtremeCom, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. A. Petz, A. Hennessy, B. Walker, C.-L. Fok, and C. Julien. An architecture for context-aware adaptation of routing in delay-tolerant networks. In Proc. of ExtremeCom, 2011.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. S. Schildt, J. Morgenroth, W.-B. Pöttner, and L. Wolf. Ibr-dtn: A lightweight, modular and highly portable bundle protocol implementation. Electronic Communications of the EASST, 37:1--11, Jan 2011.Google ScholarGoogle Scholar
  17. K. Scott and S. Burleigh. Bundle Protocol Specification. RFC 5050 (Experimental), Nov. 2007.Google ScholarGoogle Scholar
  18. A. Vahdat and D. Becker. Epidemic routing for partially connected ad hoc networks, 2000.Google ScholarGoogle Scholar
  19. B. Walker, C. Ardi, A. Petz, J. Ryu, and C. Julien. Experiments on the spatial distribution of network code diversity in segmented dtns. In Proc. of CHANTS'11, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Y. Wang, S. Jain, M. Martonosi, and K. Fall. Erasure-coding based routing for opportunistic networks. In Proc. of WDTN, pages 229--236, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. M. Yang and Y. Yang. Peer-to-peer file sharing based on network coding. In Proc. of IEEE ICDCS, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in

Full Access

  • Published in

    cover image ACM SIGMOBILE Mobile Computing and Communications Review
    ACM SIGMOBILE Mobile Computing and Communications Review  Volume 17, Issue 1
    January 2013
    75 pages
    ISSN:1559-1662
    EISSN:1931-1222
    DOI:10.1145/2502935
    Issue’s Table of Contents

    Copyright © 2013 Authors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 12 July 2013

    Check for updates

    Qualifiers

    • research-article
  • Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader