Receiver-Triggered Handshake Protocol for DTN in Disaster Area
Abstract
:1. Introduction
2. Related Studies
2.1. Epidemic Routing and Spray and Wait
Item | Delivery rate | Storage usage | Likelihood of network congestion | Battery consumption | |
---|---|---|---|---|---|
Method | |||||
Epidemic Routing | High | Large | High | Large | |
Spray and Wait | Low to high | Small to large | Low to high | Large |
2.2. Other Related Studies
3. DTN Structure and Implementation Issues
3.1. DTN Structure in a Disaster
3.2. Issues and Performance Objectives
4. Receiver-Triggered Handshake Protocol
4.1. Functional Requirements
Item | Roles of nodes | Number of copies made by a source terminal | Number of copies made by a relay node | Number of hops before a message reaches the destination | Method of deleting copies | Trigger for communication | |
---|---|---|---|---|---|---|---|
Method | |||||||
Proposed protocol | Differentiated | Limited | Unlimited | Unlimited | Acknowledge bundle | Receiver | |
Epidemic Routing | Not differentiated | Unlimited | Unlimited | Unlimited | TTL | Sender | |
Spray and Wait | Not differentiated | Limited | Limited | Limited | TTL | Sender |
4.2. Receiver-Triggered Handshake Protocol
4.2.1. Communication between a Victim Terminal and a Carrier (or Shelter) Terminal
- Step 1:
- Carrier terminal, Ci, moves around the disaster area while transmitting SM every T seconds.
- Step 2:
- Victim terminal, V, receives an SM from Ci, and sends back an RM to Ci.
- Step 3:
- Ci receives the RM from V and sends back an AM.
- Step 4:
- 4-1: If V receives the AM, go to Step 5.4-2: If V receives no AM, go back to Step 1.
- Step 5:
- V does not send any more RM.
4.2.2. Inter-Carrier Terminal Communication
- Step 1:
- Carrier terminal Cj transmits an SM.
- Step 2:
- Carrier terminal Ci transmits an SM.
- Step 3:
- Ci compares its stime with that of Cj.Case 1: If stime of Ci < stime of Cj, go to Step 4-1.Case 2: If stime of Ci > stime of Cj, go to Step 4-2.
- Step 4:
- 4-1: Ci sends an RM to Cj.4-2: Ci sends an SM to Cj, go to Step 2.
- Step 5:
- Cj sends back an AM.Ci receives the AM from Cj and deletes the RM.
4.2.3. Communication between a Carrier Terminal and a Shelter Terminal
- Step 1:
- Shelter terminal, H, transmits an SM every T seconds.
- Step 2:
- Carrier terminal, Ck, receives the SM, and sends back an RM, which contains collected safety confirmation information.
- Step 3:
- H sends back an AM.
- Step 4:
- Ck receives the AM from H and deletes the RM.
5. Construction of a Simulation Environment and Evaluation Conditions
5.1. Construction of a Simulation Environment
5.2. Simulation Execution Environment Model and Simulation Conditions
Item | Value | Item | Value |
---|---|---|---|
Simulator | Scenargie 1.8 | Moving speed | Victim: 0 m/s Carrier: 0–3 m/s |
Execution time | 1 hour | Mobility of victims | Standing still |
Environment | Around Shinjuku station (1.8 × 2.2 km2) | Mobility of carriers | Random waypoint |
Number of victim terminals | 100 | Maximum communication distance | About 80 m |
Number of carrier terminals | 30 | Number of simulation attempts | 10 |
Number of shelters | 15 | Storage capacity of a carrier terminal | 10 MB |
Wireless communication method | IEEE802.11a | Message size | 100 Bytes |
5.3. Calculation of Battery Consumption
Parameter | Value |
---|---|
bcontrolrecv | 120 mW·s |
msend | 1.89 mW·s/byte |
bsend | 246 mW·s |
6. Evaluation
6.1. Bundle Delivery Rate
6.2. Total Number of Bundles Generated in the Network
6.3. Maximum Storage Usage of Carrier Terminals
6.4. Average Delivery Time
6.5. Overall Evaluation
7. Conclusions and Future Issues
Author Contributions
Conflicts of Interest
References
- White Paper 2011 Information & Communications in Japan, Part 1, Section 1. Available online: http://www.soumu.go.jp/johotsusintokei/whitepaper/eng/WP2011/2011-index.html (accessed on 9 March 2015).
- White Paper 2011 Information & Communications in Japan, Part 1, Chapter 3. Available online: http://www.soumu.go.jp/johotsusintokei/whitepaper/eng/WP2012/2012-index.html (accessed on 9 March 2015).
- Warthman, F. Delay Tolerant Networks (DTNs)—A Tutorial Version 2.0. Warthman Associates, Based on Technology Developed by the Interplanetary Internet Special Interest Group. 23 July 2012. Available online: http://ipnsig.org/wp-content/uploads/2012/07/DTN_Tutorial_v2.04.pdf (accessed on 10 March 2015).
- Vahdat, A.; Becker, D. Epidemic Routing for Partially-Connected Ad Hoc Networks; Duke Technical Report, CS-2000-6; Department of Computer Science Duke University: Durham, NC, USA, 2000. [Google Scholar]
- Spyropoulos, T.; Psounis, K.; Raghavendra, C.S. Spray and Wait: An Efficient Routing Scheme for Intermittently Connected Mobile Networks. In Proceedings of the SIGCOMM’05 Workshops, Philadelphia, PA, USA, 22–26 August 2005.
- Akiyama, Y.; Kobayashi, A. A Protocol and the Prototype to communicate with a communication blackout region based on DTN architecture. In Proceedings of the Forum on Information Technology (FIT) 2012, Koganei-shi, Tokyo, Japan, 4–6 September 2012; pp. 149–156.
- Takemoto, H.; Zamora, F.L.J.; Kashihara, S.; Taenaka, Y.; Mineo, T.; Kanada, S.; Yamaguchi, S. Evaluation of information-Sharing Method among Disaster Victims in A Collapsed Communication Service Area; IEICE Tech. Rep., MoNA2013-43; The Institute of Electronics, Information and Communication Engineering (IEICE): Tokyo, Japan, November 2013; pp. 11–16. [Google Scholar]
- Sawamura, Y.; Teranishi, Y.; Takeuchi, S.; Harumoto, K.; Nishio, S. An Efficient Broadcast Method Based on Estimation and Preservation of Stable Links in Delay Tolerant Networks. In Proceedings of the IPSJ, Multimedia, Distributed, Cooperative, and Mobile Symposium 2011 (DICOMO2011), Miyazu-shi, Kyoto, Japan, 6–8 July 2011; pp. 1121–1129.
- Sun, W.; Kitani, T.; Shimata, N.; Yasumoto, K. A Data Gathering and Sharing Proposal for Disaster Relief based on DTN; Information Processing Society of Japan (IPSJ) SIG Technical Report; IPSJ: Tokyo, Japan, February 2009; pp. 61–66. [Google Scholar]
- Koyama, Y.; Mizumoto, T.; Imazu, S.; Yasumoto, K. Safety Confirmation System with DTN-based Message Routing in 3G Disabled Areas Caused by Large-Scale Disaster; IEICE Tech. Rep., MoMuC 122(44); The Institute of Electronics, Information and Communication Engineering (IEICE): Tokyo, Japan, May 2012; pp. 171–177. [Google Scholar]
- Chuah, C.M.; Ma, W. Integrated Buffer and Route Management in a DTN with Message Ferry. In Proceedings of the IEEE Military Communications Conference (MILCOM) 2006, Washington, DC, USA, 23–25 October 2006; pp. 1–7.
- Abe, R.; Nakamura, Y.; Shiraishi, Y.; Takahashi, O. An Effective DTN Routing Scheme using Message Ferries. In Proceedings of the IPSJ, Multimedia, Distributed, Cooperative, and Mobile Symposium 2012 (DICOMO2012), Kaga-shi, Ishikawa, Japan, 4–6 July 2012; pp. 1686–1696.
- Tariq, B.M.M.; Ammar, M.; Zegura, E. Message Ferry Route Design for Sparse Ad hoc Networks with Mobile Nodes. In Proceedings of the MobiHoc’06, Florence, Italy, 22–25 May 2006.
- Wentui, Z.; Ammar, H.M. Message Ferrying: Proactive Routing in Highly-partitioned Wireless Ad Hoc. In Proceedings of the Ninth IEEE Workshop on Future Trends of Distributed Computing Systems (FTDCS’03), San Juan, Puerto Rico, 28–30 May 2003; pp. 308–314.
- Seino, W.; Yoshihisa, T.; Hara, T.; Nishio, S. A Communication Traffic Reduction Method by Delivering Predicted Values on Sensor Data Collection with a Mobile Sink. In Proceedings of the IPSJ, Multimedia, Distributed, Cooperative, and Mobile Symposium 2011 (DICOMO2011), Miyazu-shi, Kyoto, Japan, 6–8 June 2011; pp. 1175–1182.
- Yoshihisa, T.; Nishio, S. Communication Methods for Sensor Database Construction by Rounding Sink Considering Amount of Data Collection. DBSJ J. 2010, 8, 13–18. [Google Scholar]
- Nakamiya, M.; Kishino, Y.; Terada, T.; Nishio, S. Route Planning Method for Multi Mobile Sensor Nodes. Inf. Process. Soc. Jpn. (IPSJ) J. 2009, 50, 1262–1271. [Google Scholar]
- Scenargie. Space-Time Engineering. Available online: https://www.spacetime-eng.com/en/index.html (accessed on 9 March 2015).
- Feeney, M.L. An Energy-Consumption Model for Performance Analysis of Routing Protocols for Mobile Ad Hoc Networks. ACM/Kluwer Mob. Netw. Appl. (MONET) 2001, 6, 239–249. [Google Scholar] [CrossRef]
© 2015 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Yamashita, R.; Takami, K. Receiver-Triggered Handshake Protocol for DTN in Disaster Area. Future Internet 2015, 7, 152-169. https://doi.org/10.3390/fi7020152
Yamashita R, Takami K. Receiver-Triggered Handshake Protocol for DTN in Disaster Area. Future Internet. 2015; 7(2):152-169. https://doi.org/10.3390/fi7020152
Chicago/Turabian StyleYamashita, Ryoma, and Kazumasa Takami. 2015. "Receiver-Triggered Handshake Protocol for DTN in Disaster Area" Future Internet 7, no. 2: 152-169. https://doi.org/10.3390/fi7020152
APA StyleYamashita, R., & Takami, K. (2015). Receiver-Triggered Handshake Protocol for DTN in Disaster Area. Future Internet, 7(2), 152-169. https://doi.org/10.3390/fi7020152