CO2 : Design Fault-tolerant Relay Node Deployment Strategy for Throwbox-based DTNs Wenlin Han and Yang Xiao Department of Computer Science The University of Alabama 342 H.M. Comer, Box 870290 Tuscaloosa, AL 35487-0290 USA emails: [email protected], [email protected] Abstract. Delay Tolerant Networks (DTNs) are not like the Internet, where contemporaneous connectivity among all nodes is always available. We need to design a new relay node deployment strategy, which can make DTNs more reliable and fault-tolerant. In this paper, we propose a fault-tolerant relay node deployment strategy for throwbox-based DTNs. It employs an approximation algorithm to choose throwbox placement locations, and to construct a 2-COnnected DTN, called CO2 , where each mobile node can communicate with at least two relay nodes within its activity scope. Simulation results based on Tuscaloosa bus transit system have shown its effectiveness and high efficiency when compared to two types of popular relay node deployment strategies in the literature. Keywords: DTNs, Throwbox, Fault-tolerance, Relay strategy, Intermittent connection, Reliability. 1 Introduction Delay Tolerant Networks (DTNs) [1] are a class of emerging networks attracting various interests. The history of DTNs can date back to late 1990 [2] with the growth of interest in mobile ad-hoc networks and interplanetary Internet [3]. Other popular applications of DTNs include vehicular ad-hoc networks, rural village networks, underwater acoustic networks, disaster recovery networks, and social networks. DTNs are not Internet-like networks. They are networks, where contemporaneous connectivity among all nodes does not always exist. Because of long and variable delay, relay nodes, such as throwboxes, are needed to increase contact opportunities and to reduce delay. Relay node deployment strategies can be classified into three categories: contact-oblivious deployment, contact-based deployment, and customized deployment [4]. In the contact-oblivious deployment, throwboxes are deployed without considering the contact opportunities between mobile nodes and throwboxes, such as regularly deploying throwboxes in an area to form a grid. In the contact-based deployment, throwboxes are placed to maximize contact opportunities between nodes, such as placing throwboxes in the areas mostly visited by mobile nodes. In the papers [5, 6], learning from primates’ scent marking, the authors use sensors nodes or RFID (Radio Frequency Identification) tags left for messages or traces for other mobile robots 2 Wenlin Han and Yang Xiao for information. However, all the traditional deployment strategies have not addressed the problem of fault-tolerance. We need a novel strategy to deploy relay node that can achieve the fault-tolerance purpose, which means when some of the relay nodes fail, the network can still work properly without performance loss. Fault-tolerant relay strategy has been studied in wireless sensor networks (WSNs) [7, 8]. In the paper [9], the problem of deploying relay nodes to provide the desired faulttolerance through multi-path connectivity (k-connectivity) is studied, and they propose an algorithm, which is based on an evolutionary scheme to place an optimum number of energy-constrained relay nodes. It can achieve the desired connectivity between homogeneous wireless sensor nodes with the same communication range of each sensor node. In this paper, we propose a novel strategy, called CO2 , which can deploy relay nodes in DTNs to achieve the fault-tolerance purpose while maintaining a relatively small number of relay nodes. From a set of potential locations of relay throwboxes, CO2 chooses some nodes to construct a 2-connected graph. These throwboxes cover all the mobile nodes in a DTN letting each mobile node connect with at least two relay nodes. Every node in the 2-connected DTN can reach another node via two node disjoint paths so that it can guarantee fault-tolerance. When some of the relay nodes are out of work, the DTN can still work properly and maintain high performance. Our experiments simulate real bus transit system in Tuscaloosa, Alabama, USA, and the experimental results show that the relay nodes chosen by the proposed CO2 strategy can make DTNs fault-tolerant with relatively small number of relay throwboxes. The main contributions of this paper include: – It is the first strategy addressing fault-tolerant relay node deployment problem in DTNs, to the best of our knowledge; – We analyze the impact of different routing protocols and mobility models working with CO2 ; – We compare performance among three deployment strategies: the contact-oblivious deployment, the contact-based deployment, and CO2 . The rest of the paper is organized as follows: Section 2 outlines and models the problem of fault-tolerant relay node deployment. Section 3 presents the strategy of CO2 and the related relay node selection algorithm. In Section 4, we simulate the real world bus transit system in Tuscaloosa and conduct experiments based on it to show performance improvement. Finally, we conclude the paper and propose future work in Section 5. 2 Problem statement In this section, we will present the main problem that the proposed CO2 strategy aiming to address. The intermittent connection is the most prominent feature of DTNs, and it is also a very challenging problem whenever we need to design a new protocol, algorithm or scheme for DTNs. To increase contact opportunity, throwboxes are employed to enhance network performance. As shown in Fig. 1, it is a simple scenario of a Vehicular DTN. Each bus moves within its range of activity - the oval area, follows its certain route. Contact and message delivery can happen when two buses meet each other, but 2-Connected DTN for Throwbox-based DTNs 3 the contact opportunity is rare when the buses are very few. Some throwboxes are placed in the oval areas, so that a bus can transfer its messages to a certain throwbox, and waits for another bus to pick them up. In this way, buses can communicate with each other. For example, Bus Group G1 can communicate with Bus Group G7 via multiple hops between throwboxes and other buses. However, throwboxes are resource-constrained mobile devices with limited battery capacity. They are deployed outdoor, even in rural areas, baring harsh environment, which means that they stand big chances of failure. If some throwboxes are out of work, some buses may not be able to communicate with each other. For example, if Throwboxes x1, x4 and x5 fail, Bus G1 will lose communication with Bus Group G7. G2 x2 G6 x1 G1 x3 x6 G3 G5 x4 x5 G7 x7 Fig. 1: Fault-tolerance problem scenario of a simple throwbox-based DTN. We need to design a new relay node placement strategy, which can work well when some of the throwboxes fail, while the number of the throwboxes deployed is the minimum. Here, we define a set of throwboxes as 2-connected if they can still communicate with each other within one or multiple hops when one of them fails. 3 CO2 : relay node placement strategy CO2 is to construct a 2-connected DTN with a reasonable number of relay nodes. The basic idea is to maximize node availability and link availability, while maintaining two disjoint paths with minimum hops. In this section, we will introduce the proposed relay node placement strategy, CO2 , in details. Let’s define: T is the total number of time segments, where t = 0, 1, · · · , T ; B is the set of mobile nodes, such as buses; U is the set of possible unchosen locations of relay throwboxes; 4 Wenlin Han and Yang Xiao R is the set of already chosen locations of relay throwboxes, and it is ∅ initially; label[b] is the number of times that a mobile node b is covered by relay throwboxes, b ∈ B; C(u) is the set of mobile nodes, which can be covered by a relay throwbox u. Now the problem is to select an appropriate R from U . To observe the links, we assume that we have placed a throwbox v in each possible location in U . Moreover, we name the set of these throwboxes as V . We observe the links between each pair of two throwboxes in V , and name the set of the links as E. Correspondingly, the link states set is named as S. Now we get a graph G(V, E, S, P ), where P is the same as defined previously. To make it concise, we mix the concepts of a throwbox and the location of this throwbox. Thus, when we talk about “pick up a node from U ”, we mean ”pick up a location where we can place a throwbox”, and further examine the connections between this throwbox and other throwboxes or mobile nodes. The algorithm mainly includes four steps. Step I. Pick a node u0 from U satisfying the following four conditions: 1. At least at sometimes, the node u0 can work normally, that is pu0 ̸= 0. (1) 2. The node u0 has at least one available link, that is T ∨ ∨ su0 vt = 1, (2) ∀v∈V t=0 where su0 vt is the link state of Link eu0 v during time period t and v is a node in V , u0 ̸= v. ∑ ∨T 3. The number of nodes in V that u can communicate with is calculated as ∀v∈V t=0 suvt . Moreover, pu is the probability of working normally. In this step, we pick up a node that can maximize node availability. Let us define W1u0 as: T ∑ ∨ { } W1u0 = max pu suvt , ∀u∈U (3) ∀v∈V t=0 where u ̸= v. 4. Let us denote the set of nodes satisfying Equation (3) as U1 . If there are more than one nodes in U1 , pick the one of the maximum link availability, that is: W2u0 T ∑ ∑ { } = max pu suvt , ∀u∈U1 (4) ∀v∈V t=0 where u ̸= v. Mark each node b ∈ B ∩ C(u0 ) as 1, that is label[b] = 1. Put the relay node u0 into the set R, and remove u0 from U . Step II. In the new set U , find a relay node u′ that satisfies the following three conditions: 2-Connected DTN for Throwbox-based DTNs 5 1. u′ can reach u0 through two node-disjoint paths. If there are more than two nodedisjoint paths, select the two paths with the minimum number of hops. Define the set of nodes in the two paths as Qu′ , where u′ ∈ Qu′ and u0 ∈ / Qu′ . A similar definition for a node u is Qu . 2. In this step, we choose u′ , which makes Qu′ mostly cover the nodes in B that already covered by u0 , and the number of relay throwboxes in Qu′ is relatively small. Let us define c(b, Qu ) as the number of times that b is covered by the relay throwboxes in the set of Qu ∩ U , that is c(b, Qu ) = |{q ′ ∈ Qu ∩ U : b ∈ C(q ′ )}|. Also, we need to consider node failure probability. It satisfies: ∑ { pu b∈B min(c(b, Qu ), 2 − label[b]) } . W3u′ = max ∀u∈U |Qu ∩ U | (5) (6) 3. Let us define the set of nodes satisfying Equation (6) as U2 . If there are more than one nodes in U2 , pick the one that can maximize the link availability when considering the links between the nodes in Qu and all other nodes in V . { ∑ T ∑ ∑ } pu∗ su∗ vt , (7) label[b] = label[b] + min(c(b, Qu′ ), 2 − label[b]). (8) W4u′ = max ∀u∈U2 ∀u∗ ∈Qu ∀v∈V t=0 where u∗ ̸= v and u ̸= v . Mark each node b ∈ B ∩ C(Qu′ ∩ U ), e.g., Put all relay nodes in Qu′ into the set R, and remove all nodes in Qu′ from U . For all b in B, if label[b] = 2, remove b from B. Step III. Add an artificial node v ′ into G to construct a graph G′ , and connect each node in R with v ′ . Pick a node u′′ from U , which meets the following three conditions: 1. u′′ can reach v ′ via at least two node disjoint paths. Define two of these disjoint paths with minimum number of hops as Qu′′ , where u′′ ∈ Qu′′ and v ′ ∈ / Qu′′ . 2. Qu′′ can mostly cover the nodes in B that already covered by R, and has relatively smaller amount of nodes. u′′ satisfies: ∑ { pu b∈B min(c(b, Qu ), 2 − label[b]) } W3u′′ = max . (9) ∀u∈U |Qu ∩ U | This equation is similar to Equation 6, but the values of the variables have already changed. 3. Let us define the set of nodes satisfying Equation (9) as U3 . If there are more than one nodes in U3 , pick the one achieving the maximum link availability of the links between the nodes in Qu and all other nodes in V . W4u′′ = max ∀u∈U3 where u∗ ̸= v and u ̸= v . { ∑ T ∑ ∑ ∀u∗ ∈Qu ∀v∈V t=0 } pu∗ su∗ vt , (10) 6 Wenlin Han and Yang Xiao Mark each node b ∈ B ∩ C[Qu′′ ∩ U ], e.g., label[b] = label[b] + min(c[b, Qu′′ ], 2 − label[b]). (11) Put all relay nodes in Qu′′ into the set R, and remove all nodes in Qu′′ from U . For all b in B, if label[b] = 2, remove b from B. Step IV. If B = ∅, we get the solution R; otherwise, repeat Step III. 4 Performance evaluation In this section, we will present some experiments to show the effectiveness of the CO2 strategy. 4.1 Experimental settings We simulate bus transit system at Tuscaloosa, Alabama, USA. There are six routes represented by different colors: gold is for Greensboro Route; amaranth represents Stillman Route; University Shuttle Route is red; green represents Shelton State Route; blue is for Holt Route; and V.A./University Route is crimson [10]. Group Type ID Number Speed/FR Route/Location 1 b1_ 4 10-40 km/h Stillman Route 2 b2_ 4 10-40 km/h University Shuttle Route 3 b3_ 4 25-60 km/h Shelton State Route 4 b4_ 4 10-40 km/h Greensboro Route 5 b5_ 4 25-60 km/h Holt Route 6 b6_ 4 10-50 km/h V.A./University Route North 7 b7_ 4 25-60 km/h V.A./University Route South 8 x1 1 80% G1,G2 9 x2 1 0% G2,G6 10 x3 1 40% G6,G5 11 x4 1 0% G3,G4 12 x5 1 80% G5,G7 13 x6 1 20% G1,G3 14 x7 1 20% G4,G7 Fig. 2: Experimental settings based on real Tuscaloosa bus transit system. FR is the failure rate of a throwbox. Fig. 2 illustrates the experimental settings. The simulation tool is Opportunistic Network Environment Simulator (ONE) [11]. 2-Connected DTN for Throwbox-based DTNs 4.2 7 Experimental results We evaluate CO2 performance working with Epidemic [12], a multi-copy routing protocol. We choose delivery ratio, contact time and fault-tolerance as criteria, and compare CO2 with the contact-oblivious deployment and the contact-based deployment strategies. Delivery ratio Fig. 3 shows delivery ratio comparison among three strategies. The routing protocol in Fig. 3 is Epidemic routing. Regular deployment is contact-oblivious, and it performs the worst among three strategies. The contact-based deployment works better than the regular deployment. CO2 achieves the best delivery ratio performance. It improves delivery ratio from less than 50% to over 80%. Epedemic routing delivery ratio comparison 90% CO2 Contact-based Regular Delivery ratio (%) 80% 70% 60% 50% 40% 30% 20% 10% 0% 0 5000 10000 15000 20000 25000 30000 35000 40000 Time (second) Fig. 3: Delivery ratio comparison among three deployment strategies: Regular deployment, Contact-based deployment and CO2 deployment. Fault-tolerance Fig. 4 shows the comparison of fault-tolerance performance among three strategies, and the routing protocol is the Epidemic routing protocol. When the other strategies cannot deliver any message, CO2 can still work properly, and the delivery ratio can reach over 40%. Contact time Fig. 5 shows accumulated contact time comparison among three strategies. The routing protocol is the Epidemic routing protocol in Fig. 5. Since the regular deployment strategy is contact-oblivious, the contact opportunities among nodes are not 8 Wenlin Han and Yang Xiao Fault-tolerance comparison (Epidemic) 45% CO2 Contact-based Regular Delivery ratio (%) 40% 35% 30% 25% 20% 15% 10% 5% 0% 0 5000 10000 15000 20000 25000 30000 35000 40000 Time (Second) Fig. 4: Fault-tolerance comparison among three deployment strategies: Regular deployment, Contact-based deployment, and CO2 deployment. considered during the relay nodes placement process. Its contact time performance is the worst. Compared to the contact-based deployment, CO2 nearly doubles the contact time. 5 Conclusion In this paper, we proposed a relay node deployment strategy for DTNs, named CO2 . This 2-connected DTN can handle message delivery even when some of the relay nodes fail, and the number of throwboxes deployed is relatively small. We have carried out simulations based on Tuscaloosa bus transit system, and the simulation results have demonstrated that CO2 achieves much better performance than the contact-oblivious and the contact-based relay node deployment strategies. As a future work, we will further analyse the applicability of CO2 , and its performance working with other routing protocols. Acknowledgment This work was supported in part by the National Science Foundation (NSF) under grants CCF-0829827 and CCF-0829828. References 1. V. N. G. J. Soares, F. Farahmand, and J. J. P. C. Rodrigues, “Improving Vehicular DelayTolerant Network Performance with Relay Nodes,” In Proceedings of Next Generation Internet Networks (NGI’09), Pages 1-5, July 2009. 2-Connected DTN for Throwbox-based DTNs 9 Epidemic routing contact time comparison 30000 Contact time (Second) 25000 CO2 Contact-based Regular 20000 15000 10000 5000 0 1000.6 10495.9 21095.2 Time (Second) 30340.7 40714.8 Fig. 5: Contact time comparison among three deployment strategies: Regular deployment, Contact-based deployment, and CO2 deployment. 2. W. D. Ivancic, “Security Analysis of DTN Architecture and Bundle Protocol Specification for Space-Based Networks,” In Proceedings of 2010 IEEE Aerospace Conference, Pages 1-12, March 2010. 3. M. Boucher, “Generation InterPlanetary Internet,” available at: http://www.spaceref.com/news/viewnews.html?id=87, Accessed January 2013. 4. W. Zhao, Y. Chen, M. Ammar, M. Corner, B. Levine, and E. Zegura, “Capacity Enhancement using Throwboxes in DTNs,” In Proceedings of IEEE International Conference on Mobile Adhoc and Sensor Systems (MASS), Pages 31-40, October 2006. 5. Y. Xiao, Y. Zhang, and X. Liang, “Primate-inspired Communication Methods for Mobile and Static Sensors and RFID Tags,” ACM Transactions on Autonomous and Adaptive Systems, Vol. 6, No. 4, Article 26, Pages 26:1-26:37, December 2011. 6. Y. Zhang and Y. Xiao, “Primate-inspired Scent Marking for Mobile and Static Sensors and RFID Tags,” In Proceedings of 18th International Conference on Computer Communications and Networks(ICCCN 2009), Pages 1-5, August 2009. 7. Z. Wu, N. Xiong, W. Han, Y. N. Huang, C. Y. Hu, Q. Gu, and B. Hang, “A Fault-tolerant Method for Enhancing Reliability of Services Composition Application in WSNs Based on BPEL,” International Journal of Distributed Sensor Networks, special issue on Fault-Tolerant and Ubiquitous Computing in Sensor Networks, Vol. 2013, Article ID 493678, 2013. 8. J. Li, Y. Pan, and Y. Xiao, “Performance Study of Multiple Route Dynamic Source Routing Protocols for Mobile Ad Hoc Networks,” Journal of Parallel and Distributed Computing, Special issue on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peerto-Peer Networks, Vol. 65, No. 2, Feb. 2005, pp. 169-177. 9. D. R. Dandekar and P. R. Deshmukh, “Fault-Tolerant Relay Placement in Wireless Sensor Networks Using Particle Swarm Optimization,” Intelligent and Soft Computing, 130: 749757, 2012. 10. “Tuscaloosa Bus Transit Routes Map,” available at: http://www.tuscaloosatransit.com/nssfolder/scrapbook/Overlaying%20Route%20Map.pdf, 2011. 11. A. Kernen and J. Ott, “Increasing Reality for DTN Protocol Simulations,” Helsinki University of Technology, Networking Laboratory, Technical Report, July 2007. 10 Wenlin Han and Yang Xiao 12. A. Vahdate and D. Becker, “Epidemic Routing for Partially-connected Ad-hoc Networks,” Duke University, Technical Report CS-2000-06, June 2000. 13. S. Jain, K. Fall, and R. Patra, “Routing in a Delay Tolerant Network,” In Proceedings of the 2004 ACM conference on Applications, technologies, architectures, and protocols for computer communications (SIGCOMM), Pages 145-158, New York, USA, 2004. 14. Rodrigo, “Interplanetary Internet from NASAs experiment,” available at: http://writepass.co.uk/journal/2012/12/interplanetary-internet-from-nasas-experiment/, Accessed February 2013.
© Copyright 2026 Paperzz