Next Article in Journal
What Went Wrong for Bad Solvers during Thematic Map Analysis? Lessons Learned from an Eye-Tracking Study
Previous Article in Journal
Spoofing Detection of Civilian UAVs Using Visual Odometry
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Geo-DMP: A DTN-Based Mobile Prototype for Geospatial Data Retrieval

1
School of Computer Science and Technology, Beijing Institute of Technology, Beijing 100081, China
2
Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China
*
Author to whom correspondence should be addressed.
ISPRS Int. J. Geo-Inf. 2020, 9(1), 8; https://doi.org/10.3390/ijgi9010008
Submission received: 6 November 2019 / Revised: 8 December 2019 / Accepted: 16 December 2019 / Published: 20 December 2019

Abstract

:
Geospatial information is gaining immense interest and importance as we enter the era of highly developed transportation and communication. Despite the proliferation of cellular network and WiFi, on some occasions, users still face barriers to accessing geospatial data. In this paper, we design and implement a distributed prototype system with a delay/disruption tolerant network (DTN), named Geo-DMP, for cooperatively and opportunistically sharing and exchanging named geospatial contents in a device-to-device fashion. First of all, we construct a lightweight “content agent” module to bridge the gap between the application layer and the underlying DTN protocol stack. Afterwards, to profile the mobility history of users in practical geospatial environments, we present a map segmentation scheme based on road network and administrative subdivision information. Subsequently, we associate the regional movement history information with the content retrieval process to devise a hierarchical and region-oriented DTN routing scheme for both requests and responses. Finally, we conduct extensive experiments with real-world trajectories and complete implementations on the emulation platform composed of virtual machines. The experiments corroborate that Geo-DMP has the capability of successfully retrieving geospatial contents for users for most of the time under mobile circumstances with episodic connectivity. Moreover, en-route caches can be efficiently exploited to provision contents from multiple sources with less network resource consumption and shorter user-perceived latencies.

1. Introduction

The advancements and achievements in mobile computing have profoundly revolutionized contemporary society. Over the past decade, versatile yet affordable commodity portable devices have exhibited burgeoning growth worldwide, especially in emerging markets, as illustrated in Figure 1 [1]. Liberating users from desktop computers and wired connections, they make almost all applications pervasively available, so, unsurprisingly, they have been inextricably intertwined with people’s daily routine activities [2].
For the majority of mobile users, applications that provide geospatial information often appear in their must-have app list [3]. Such substantial demand is largely resulted from the “motorized mobility” (i.e., travel by car, bus, train or aircraft) and highly-developed transportation system [4] in modern life. People have more opportunities to reach far and strange places and face sophisticated surroundings moulded by fast-paced urbanization [5]. Under these circumstances, instant geospatial information may be of great help.
Along with the high value and importance of geospatial information being widely realized and the coming of the web 2.0 era, users are not only data consumers but also actively participate in the contribution of geospatial content. Such progression is conceptualized by scholars as “Geospatial Crowdsourcing” [6] or “Volunteered Geographic Information” [7]. Compared to conventional collection methods, in this case, expensive deployment and maintenance cost of sensory instruments can be saved, broader spatio-temporal coverage can be achieved, and more timely, detailed, and diversified data can be gathered. As it is a consensus that a significant portion of data generated in human day-to-day life is annotated with locational attributes [8,9], with the aid of innumerable volunteers and a plethora of programmable sensors embedded inside mobile devices, we will gain further insights into the ambient environment from more perspectives, ranging from road traffic forecasting [10], culture heritage conservation [11], meteorological or climatological statistics [12], and environmental monitoring [13], to name just a few.
However, currently, most geospatial-related applications are dependent on a centralized network infrastructure. Although lately, cellular network (3G/4G) and Wi-Fi are almost omnipresent, it still cannot be taken granted that they are always available for use. Firstly, natural catastrophes may incapacitate communication infrastructures and cause long-lasting outages [14,15]. Secondly, in some densely populated situations, such as live concerts, sports matches, or large exhibitions, a burst of mobile clients may overload the cellular network and deteriorate network performance [16,17]. Thirdly, a limited and costly data traffic budget, particularly in underdeveloped and developing countries, as revealed in Figure 2 [18,19], and the time-dependent pricing (TDP) strategies [20] cast influence on the attitude of subscribers towards data usage. Users possibly prefer to conserve a data quota or not enough data volume is left at the moment they need to access geospatial information. Lastly, although ever-growing Wi-Fi hotspots are deployed [21], looking for openly accessible ones is still no easy task, even in metropolitan areas [22]. Most discoverable access points are password-protected, and some enforce an authentication or registration via portals. Even if a user on-the-move is lucky enough to find a free usable AP, it is unable to serve persistent connections for him due to its finite radio coverage [23].
With all that in mind, it is quite reasonable that an alternative infrastructure-free method of acquiring and exchanging geospatial content is worth investigating. As a matter of fact, many past scholarly works have well documented feasibility proofs and practical means towards this goal. Above all, it is confirmed that users show a willingness to bear more patience on time-insensitive contents [24,25]. In addition, multiple built-in short-range radio interfaces offer a novel way for mobile users to transmit contents between their devices directly. This device-to-device (D2D) [26] communication paradigm alleviates the reliance on infrastructures. Furthermore, as in decentralized wireless scenarios, by virtue of the intrinsic mobility and confined communication range of mobile devices, the absence of contemporaneous end-to-end path is commonplace, which contradicts classical network protocols. Delay/disruption tolerant networking (DTN) [27] enhances the resilience and reliability of transmissions in these challenging environments with the “store–carry–forward” paradigm. By taking advantage of the ephemeral pairwise encounter chances, heterogeneous underlying physical networks and local storage resources, data can asynchronously traverse a network via multi-hop relays.
Consequently, it can be envisaged that the fusion of D2D, DTN and spatial-related information would be particularly advantageous in two respects: One is being able to fetch contents that are infrequently changed and not in urgent need across long delay from distant places with classical DTN capabilities, such as maps or geotagged photos [28]. The other is, thanks to such decentralized communication mechanism, some real-time or emergent information could be announced or exchanged among nearby neighbors before it is reported to the supervisor, so it can be made known and dealt with as soon as possible. Some examples are evacuation guidance [29], warning for accident prevention [30], and updates of real-time traffic states [31], among others.
At the same time, it should be admitted that research on DTN is obviously biased. A voluminous literature focuses on strategies (routing, caching, congestion control, incentive encouragement, etc.), while only a small fraction of research work is devoted to actual deployment and application. As a result, there is still a long way to go to fully exploit the potential of DTN in a real-world setting. Filling this gap between theoretical and empirical sides of DTN is one of the chief motivations of our research.
In our former work [32], we have implemented a wireless prototype system, named GeoTile, for geospatial data acquisition through connected multi-hop relay nodes. We thoroughly studied to what extent in-network caches could benefit the end-user and overall performance. In this paper, through the integration with DTN, persistent connections between nodes can be extended to intermittent ones. We also proceed to explore the supportive mechanisms for providing better adaptability to mobile contexts. The principal objective of this work is to present a complementary method for mobile users to obtain or exchange geospatial data under exceptional cases, e.g., when other wireless networks are unavailable at the moment or events of great urgency have just happened. This would similarly be profitable for crowd-sourcing applications, as participants do not have to constantly keep contact with a central server and it is more friendly and convenient to interchange gathered data amongst themselves.
Briefly speaking, the highlights of the work in this paper are as follows. Firstly, we propose a distributed system aimed at geospatial content sharing in opportunistic environments. Secondly, to characterize the mobility of users and embody it in a more concise representation, we introduce a multi-layer map partition scheme that combines road network and administrative information. Thirdly, we design an exploratory hierarchical DTN routing protocol to associate the bundle forwarding process with the history of movement knowledge based on realistic geospatial regions. Finally, to validate whether the system works properly and evaluate system performance, we run experiments on a virtual machine (VM)-based emulation platform.
The outline of the remainder of the paper is as follows. In Section 2 we begin with an overview of relevant academic studies. Next, we will sequentially delineate each point of the main work stated above in Section 3. After that, the evaluation results of the system on the emulation platform are presented and analyzed in Section 4. We end the paper with the conclusions and prospects for future work in Section 5.

2. Literature Review

Concerning the content acquisition process performed by nodes with dynamic mobility and sporadic connectivity, several questions should be considered: How can we make ordinary users able to convey their needs to DTN-aware nodes? Given that they can interact, how can we explicitly identify and find desired contents in distributed cached resources? When these contents can be discovered somewhere, how can we efficiently retrieve them back to the requesters in real-world scenarios? In this section, we will present a review and discussion revolving around these three research topics.

2.1. Bridging DTN with HTTP-Based Services

From the dawn of scholarly pursuits on DTN onwards, how to make this emergent technique apply to existing application-level services has been one of the foremost concerns [33]. Because HTTP is deemed to be the foundation for interaction of a large portion of such kinds of services [34], breaking the isolation between HTTP and bundle protocol is of prime importance. To this end, Ref. [35] summarizes three candidate methods from an architectural viewpoint, namely end-to-end, proxy-based, and gateway-based. The first one refers to the case that both client and server sides have DTN deployed, hence no extra interpreters are needed. The second one, while, similarly, both sides are DTN-aware, a proxy node resides ahead of a cluster of servers, which makes servers transparent to requesters and facilitates content aggregation and load balancing. In the last case, as opposed to the above two methods, the DTN deployment is migrated from client and server nodes to dedicated gateway nodes attached to them.
As the practices of these design thoughts, Ref. [36] proposes an “end-to-end” solution for client browsing in the form of web-based applications over DTN. The web-apps can be automatically installed or removed in accordance with the surroundings of users. However, in this way, too much burden is imposed on the end-device: Not only should native DTN support be built-in, but also a local web server needs to be deployed. Ref. [37] employs the option of “proxy-based” and hotspot nodes are delegated to retrieve contents for end-users from remote servers. Ref. [38] follows the “gateway-based” structure to make the contents inside DTN accessible to users who are not DTN-aware by leveraging shared access points as gateway nodes. Taken together, in this work, we adopt the “gateway-based” approach, for reasons that, firstly, from the perspective of implementation the least effort is required for modification on existing functionalities of clients and servers; secondly, little knowledge about DTN is requisite for users; thirdly, the isolation of DTN makes the system more general-purpose, extensible, and flexible. Although the basic idea of our work bears some resemblance to [38], in our design, the gateway nodes are not specialized APs, but ordinary human-carried or vehicle-mounted devices instead. Apart from the three typical models, aiming at rendering support for a wider range of applications with a unified bottom layer, Ref. [39,40,41] conceive middleware platforms. Nevertheless, their heterogeneous and non-compatible designs complicate the reproduction and deployment. Developers should conform to given API specifications in order to fit the applications onto them.

2.2. Named Content Retrieval

Indisputably, an evolution has taken place in the way of network usage, as several recent reports [42,43] suggest that data traffic is overwhelmingly dominated by digitized contents. Such a new trend indicates that, instead of “end-to-end” conversations, now users are more concerned with obtaining desired contents efficiently.
Disappointingly, Internet-related protocols are not really good at this aspect: The “link rot” problem [44,45] often causes inaccessibility, and target host-centric requests result in repeated transmissions and significant waste on bandwidth [46]. Though remedial measures such as content distribution network (CDN) and peer-to-peer (P2P) overlays have been proposed, these patching methods inevitably introduce extra complexity and unexpected problems, as the high financial cost for content publishers and maintenance cost for service providers in CDN [47]; and a massive amount of cross-ISP traffic which is contradictory to policies of ISPs in P2P [48].
This is what prompts the academic communities to reconsider clean-slate content-centric designs for the next generation of inter-networking. Among all proposals, information-centric networking (ICN) [49] is a representative solution that attracts much attention. Unlike conventional IP-based networking, ICN natively privileges contents and their unique names to serve the purpose of efficient dissemination and reduction on network load.
Interestingly, despite some dissimilarities in applicable scenarios, DTN shares many commonalities with ICN in respect of in-network caching, late-binding technique, hop-by-hop transport, and asynchronous interaction model. Therefore, it is plausible to borrow the main ideas of ICN to tackle with the inefficiency of content acquisition and resource utilization in DTN. Lately, several research works attempt to directly extend ICN approaches to DTN [50,51,52,53]. However, such migration is neither effortless nor seamless. For one thing, studies of ICN are still in its nascent stage and lots of problems remain unsolved. For another, it should be noticed that ICN and DTN have essential architectural differences.
To gain the synergy with less investment, the Delay-Tolerant Networking Research Group (DTNRG) proposes the bundle protocol query (BPQ) mechanism [54]. BPQ enables content naming as well as name-based matching, caching, and routing. More importantly, it is compatible with antecedent DTN standards, which means modifications on the basic framework can be minimized and existing works in DTN still have their values. Even though BPQ is often mentioned in past papers [55,56,57,58], it is not fully exploited in research work. As far as we know, only two papers put BPQ into practice: in [59], BPQ is adopted to mingle the protocol stack of DTN and named data networking (NDN) [60]. Ref. [61] presents an architecture for offloading contents that are bulky and do not have a tight delivery deadline from cellular network to local DTN network, in which BPQ works for content lookup among DTN nodes. To further explore the possibilities of BPQ, in this paper, we apply BPQ to the dissemination of geospatial data. Additionally, location indicators are incorporated in BPQ-enabled bundles to supplement more information for routing decisions.

2.3. Map-Based Region Partitioning for Content Dissemination

It is known that mobility is a predominant feature of DTN networking. The uncertain and fragmented network topology is a major obstacle for telling exactly how and where to get in touch with a given node when necessary in a distributed environment. Fortunately, implicit in the movement of people is the periodicity and regularity to a certain degree, both in social [62] and geographical [63] aspects. In other words, people have the propensity to meet a group of persons and go to a collection of places more often.
Motivated by these findings, in spite of the scarcity of a real-time global knowledge of a network, scholars have attempted to make progress in making DTN more effective and meaningful by extrapolating future behaviors from historical knowledge of social relationships [64] or spatial movements [65]. In this paper, we are more interested in geographical rather than topological relations among nodes. It goes without saying that precisely capturing the mobility pattern of nodes will greatly contribute to the accuracy of routing strategies.
Meanwhile, simply recording a large quantity of raw GPS coordinates will incur excessive storage consumption and intensive computation to learn the regularity behind moving traces, which is unfavorable as nodes in DTN are typically resource-constrained. One viable solution is region-based methods. By dividing the whole area into a series of subregions, the position of a node can thus be represented by the subarea it currently lies in, and further, the moving process of a node can be simplified as a discrete sequence of subregions. Whereas various ways to generate subregions are presented in existing works, including breaking into regular shapes [66,67,68,69], geometric partitioning [70,71], and artificial clustering [72,73], etc., an apparent shortcoming is that none of them are in line with actual environments, as they neglect natural boundaries such as roads, rails, rivers, outer periphery of buildings, among others. Especially for most used grid-based methods, although it is easier to control the area size, code the area, and maintain the hierarchy information, some researchers point out that the determination of the size, position, and orientation of grids is arbitrary [74], and the fixed-size unit is not sufficient to reflect the density of users and their activities [75]. As a result, macroscopically, the methods above all fall short in portraying the “activity space” [76], which refers to areas that are delimited by the course of daily routines of people, and microscopically, actions of moving across boundaries become less meaningful, as one may produce crossings simply by wandering around his home or workplace.
For the sake of making more solid associations between daily spatiotemporal activities of inhabitants and the segmentation of subregions, small-scale boundaries with administrative properties, for instance, census tracts, postal code areas, or voting precincts are seemingly better choices. They are not merely reasonable approximations to sociological structures like residential neighborhoods, street blocks, and communities [77,78], but exhibit demographic and socioeconomic characteristics as well [79,80]. As more researchers realize the advantages of such methods, recent years have witnessed their wide adoption by multidisciplinary studies, such as criminology [81], public health [82,83], municipal planning [84], and so forth. Many cases [85,86,87] have proved that region-based methods can outperform grid-based methods.
Hopefully, such methods will be analogously beneficial to research in the field of mobile computing. Instructed by this idea, we attempt to devise a multi-level map partitioning scheme based on the road network and administrative boundaries. We expect that it will lay a concrete foundation for future protocol or application design. More specifically, predictive routing based on analysis of historical trajectories, or geocasting [88,89] which aims to route specific messages (e.g., promotional campaigns or emergency notifications) to target locations.
Map segmentation according to the road network of large cities also appeared in [90,91] as the basis of their works. Ref. [91] divides the map recursively into multiple levels by road hierarchy, but this is not enough to reflect administrative features. In our method, we will make an effort to align the segmentation result with administrative subdivisions. Ref. [90] extracts the road skeleton by image processing techniques, with the sacrifice of metadata describing properties of vector objects. By contrast, segmentation of our method is purely through processing on vector data, and metadata can be preserved for future use.

3. Geo-DMP Mobile System

In this section, we will elaborate on each constituent part of our work in the succeeding subsections, respectively. Specifically, we start with introducing the framework of Geo-DMP. Thereafter, the workflow and mechanism of delay-tolerant content retrieval are described in detail. Next, we present the method of partitioning map into regions by taking administrative boundaries into consideration, along with the usefulness of segmented regions in the design of routing protocol.

3.1. System Framework

As illustrated in Figure 3, the framework of Geo-DMP consists of three main modules: content agent, DTN stack, and map adaptor. The content agent is our own implementation to realize the “gateway-based model”. It is deployed on gateway nodes and interacts with DTN on behalf of application and thereby makes DTN transparent to the user. The heart of the content agent is the proxy module. It is implemented with anyproxy [92], an open-sourced javascript-written proxy tool. With the main feature of anyproxy, which is to intercept the incoming HTTP requests and construct new HTTP responses, we developed the transformation between HTTP messages and DTN bundles, as well as the utilization of local caches. Preceding received contents are stored in local cache both for immediate provision for recurring local requests and responding to requests from other nodes in the near future.
The DTN stack we use in our work is DTN2 [93]. DTN2 is an open-sourced reference implementation of the full protocol stack of DTN, consistent with RFC documents [94,95,96] and developed by DTNRG in C++.
As a promising proposal, the code implementation of the BPQ mechanism is also incorporated in the latest version of DTN2. We benefit from this work and employ it for content naming and matching. Two data structures form the core of the BPQ definition: BPQ block and BPQ Cache. BPQ block is an extension block in the bundle header. It mainly records the name of content and specifies the type of bundle so as to support content naming and pub/sub communication model. To distinguish the bundles with BPQ block from the normal bundles, two distinct bundle types are newly defined: query and response. As their names suggest, the former one conveys what content the requester wants, while the latter one carries the content back to the requester. As this block is not mandatory, BPQ-enabled bundles can co-exist with normal bundles and can be routed according to endpoint ID as usual, hence, the compatibility is guaranteed.
BPQ Cache manages content resources that BPQ can take advantage of, that is, it contains all information of response bundles. It should be noted that although the query bundle is also a member of the BPQ-enabled bundle, it is not included in BPQ Cache as it does not have any payload data. Moreover, the normal bundle is excluded from the BPQ Cache, too. This is because its payload does not have a name, so it could not be used by BPQ.
DTN Daemon is the pivot of DTN2, which serves as a central controller and scheduler. It is responsible for handling all incoming events and dispatching jobs to other dedicated components. Bundle List is the place that maintains all local bundles, including normal bundles and BPQ-enabled bundles. In other words, BPQ Cache is a subset of Bundle List.
The “Trace Reader” and “Link Emulator” are two modules that involve emulation. The former one emulates the GPS of the mobile node. Upon the request of location, it reports the GPS coordinates from a pre-generated trace file. This module can be substituted with a real GPS receiver when the implementation is ported to actual devices, leaving other parts in the upper layers unchanged. The latter one controls the establishments and disconnections of links. Periodically, the real-time location is derived from the trace reader and broadcast in a beacon packet. When receiving a beacon packet from another node, the link emulator records the distance between them to the table named “Neighbor Distances”. With this table, the local node can judge whether it resides in the preset communication range with the source of an incoming normal packet, and drop it or make it pass accordingly. As this module works on the network layer in Linux kernel space, the filtration is transparent to DTN.
To make generalized BPQ-based content retrieval adapt better to realistic map-based scenarios, we present the map adaptor module. It is comprised of a local database of map segmentation results and an interface. At fixed time intervals, DTN requests region information by issuing a query to the interface. The interface reads the current GPS coordinates from the trace reader or GPS module, inquires the database with the coordinates, and returns the regions in which the node is located now. Then, DTN saves this regional information to the “Movement History Maintanence” module for future uses of making routing decisions locally and exchanging movement knowledge upon contacting other nodes. The creation process of the map segmentation database will be given in Section 3.3.

3.2. The Workflow of Geo-DMP

After a systematic overview of the framework, by elaborating on the conversion and handling of different types of data units that occurred during the content retrieval procedure, we show the working mechanism of Geo-DMP.

3.2.1. On the Perspective of Transformations between HTTP Messages and DTN Bundles

In this part, we concentrate on interactions on the gateway nodes that connect DTN-aware nodes with the client and server. As the process of contacting with the server side should be made clear, here we do not consider the situation of discovering replicas at intermediate DTN nodes. The entire procedure can be divided into four phases, as shown in Figure 4.
Phase 1: HTTP Request to DTN Query (Client Side)
The proxy at the Terminal Gateway (hereafter TG) keeps listening to HTTP requests and intercepts those asking for geospatial contents in light of predefined rules. Then it resolves the type and name of requested data from the URL, and checks whether this content is already available locally. If yes, it will return the content to the client instantly without resorting to DTN. Otherwise, a new query bundle is created with parameters of destination EID, destination regions, and content name. After that, the proxy invokes the DTN API to inject this bundle into the DTN network.
Phase 2: DTN Request to HTTP Request (Server Side)
Through multi-hop relaying of DTN nodes, when the query bundle arrives at the Server Gateway (hereafter SG), DTN extracts the content name from the BPQ block and hands it to the proxy module. The proxy then asks the back-end server for that content with a newly generated HTTP request.
Phase 3: HTTP Response to DTN Response (Server Side)
After processing inside the server (which is described in our previous paper [32]), the HTTP response is generated and returned to the SG. The proxy at SG unpacks the HTTP response and calls the DTN API to publish this content into the DTN network. Afterwards, this content is used to satisfy the awaiting query bundle and create the corresponding response bundle.
Phase 4: DTN Response to HTTP Response (Client Side)
Eventually, when the response bundle is routed back to the TG, DTN reads the content name from the BPQ block and informs the proxy that the content is ready. Thereupon, the proxy goes to fetch the content, stores the payload to the local cache, makes a new HTTP response, and finishes the procedure by returning it to the client.

3.2.2. On the Perspective of Handling Incoming BPQ-Enabled Bundles

Next, we take a closer look at what operations are performed inside intermediate DTN nodes and how BPQ works for content discovery during the multi-hop relay of BPQ-enabled bundles. Depending on different types of incoming bundle, the internal process can be discussed in three situations.
1. Upon Receipt of Newly Generated Query
When the DTN Daemon takes out one event indicating the arrival of a bundle from the event queue, the first step is to recognize the type and source of the bundle. The bundle will be identified as a query bundle when a BPQ Block is found in the bundle header and the value of the type field is “query”. If the source EID is identical to that of the local node, it means this bundle is newly generated locally. As the creation of the query bundle only happens after the proxy fails to find the requested content at the local cache, this bundle cannot be satisfied at the moment. So it will be kept in the Bundle List to wait to be routed to other nodes or matched with incoming contents. This process is illustrated in Figure 5.
2. Upon Receipt of Extrinsic Query
When a received bundle is recognized as a query bundle from another node (i.e., its source EID is different from the local one), DTN Daemon will attempt to satisfy it after putting it into the Bundle List. Firstly, DTN Daemon gives the content name specified in the query bundle to the BPQ module. Secondly, the BPQ module matches this name with items in BPQ Cache to see if the desired content is locally cached. Thirdly, if found, the content body is replicated and assembled with information for the bundle header as a new response bundle, then it is pushed to the BPQ Cache and Bundle List. Whether this response bundle is forwarded to the current neighbor is subject to the decision of the routing protocol. Since the query bundle has accomplished its task of finding the content, it will be removed from the Bundle List. Figure 6 depicts this process where the green arrows represent the steps after the successful matching.
3. Upon Receipt of Extrinsic Response
After the identification, if the received bundle is a response bundle from another node, it will be stored in the Bundle List and BPQ Cache at first. Subsequently, the BPQ module will check whether this new content can be used to satisfy local awaiting queries. Successful matches will generate corresponding new response bundles. Again, these response bundles are pushed to the BPQ Cache and Bundle List while the satisfied query bundles are removed. The routing protocol then selectively forwards some of these response bundle to the neighbor in contact. This process can be seen in Figure 7.

3.3. The Development of the Map Adaptor Module

Next, we will present the production process of another key component of the framework, the map adaptor. In a nutshell, we partition the vector map into three nested layers with proper region size as well as in compliance with typical typology in sociology studies [97]: blocks, communities, and subdistricts. We then transform them into a compact and portable database for mobile devices. Haidian District, which is one of the most developed and active places in central Beijing, is selected as our study area. Our proposal is entirely implemented with public vector data and non-commercial software. The raw vector data we use are the excerpt dataset of Beijing from OSM [98].
1. Road Network
To begin with, we extract the road skeleton as the basis of the segmentation since it can represent the most meaningful borders of the city. We imported the raw data into a PostgreSQL [99] database with the support of PostGIS [100] (a geospatial extension to PostgreSQL) and picked six main road categories by their labels to compose the rough road network. They are motorway, trunk, primary, secondary, tertiary, and residential, respectively. Other road types are excluded as they are excessively detailed. The result is as shown in Figure 8.
2. Polygonization
Polygonization is the process whereby we can derive region polygons from road lines. The main idea of the method we take [101] is that, since the input line objects are elementary units for computing polygon objects, short and small lines will favor the construction of more and precise polygons. Therefore, road lines are broken into the smallest fragments (each fragment contains only two points) as the raw materials for the polygonize function provided by Shapely [102], a python package for computational geometry. As we can observe from Figure 9, after the polygonization, all the objects become enclosed polygons, and lines that cannot form polygons are removed.
3. Blocks
As can be seen from the output of the preceding step, as the by-products of polygonization, a number of undesired tiny cells are generated, and some of them are even too small to be discernible. To resolve this problem, we calculate the area of all polygon objects and filter the tiny ones out (less than 0.01 km 2 as the general criterion). Then we merge them with the larger polygon that encompasses or adjoins them. The basic rules of merging operations are: (1) Regularity: In the premise of not damaging the main road lines, if one tiny polygon touches with multiple bigger ones, we will choose the way which makes the shape of merged polygon as regular and simple as possible. (2) Symmetry: To deal with tiny polygons that are generated around parallel roads or intersections, we will refer to the central line of the road or the central axis of interaction and merge them with the bigger polygons on the same side. (3) Consistency: If a merging operation is done, it will become the reference for the rest along the same road or direction, to make the overall merged boundaries continuous and smooth. These operations are done in QGIS [103], a free and open-source, yet powerful GIS suite. Upon the completion of merging, block regions are derived (Figure 10), which are regions of the finest granularity.
4. Subdistricts and Communities
Because we expect that our map segmentation method can reflect administrative features, employing existing administrative boundaries will be the ideal choice. However, the districts, whose boundaries are off-the-shelf from the OSM vector data, are oversized for capturing the mobility of users. So administrative subdivisions on a smaller scale are desired. However, unlike some other countries, in accordance with laws and regulations of China, boundaries smaller than districts are not released officially. To address this issue, with the associated information of streets and subdistricts [104], we approximately determine the borders of subdistrict regions through joining the block polygons (Figure 11).
Subsequently, to form a hierarchy, we should construct another level between the block layer and the subdistrict layer. Likewise, we produce such level via joining the block regions. For the sake of better practical significance, the joining operations abide by the following principles: (1) The size of these regions should be in the middle of the blocks and the subdistricts; (2) they should keep the subordination relationship with the upper subdistrict boundaries; (3) contiguous block regions that have empirical social ties should be joined together as a priority. The result of the new layer is shown in Figure 12. The scale of this layer can be analogous to the communities. As it can be seen from the statistics in Table 1, the three layers are well differentiated in terms of size and form a reasonable hierarchy. Roughly speaking, each subdistrict contains about 3–5 communities and one community contains about 3–4 blocks, which conforms to the actual situation to a large extent. Moreover, as the aim of the map segmentation is to serve content retrieval, we hope that it would support the multi-hop relay progress as well. Since the community layer is at the intermediate level, it should be capable of reflecting some invariability, i.e., accommodating movements and data exchange happened in a small range. Given that the typical communication range of nodes in VANET can be up to 300–500 m [105], the diameter of derived community regions is approximately 2–3 km, so 4–5 hops of forwarding are possible inside one community region at least, which we think is appropriate. Up to this point, the generation of hierarchical map segmentation is finished.
5. Naming
Only with a simple naming convention can regions be easily and uniquely identified in practical use. Meanwhile, it should also be hierarchically appropriate to make this naming consistent with the three-layer map segmentation. We make use of the administrative division codes for statistical use [106] (ADC), published by the National Bureau of Statistics of China, as the foundation for naming. As Figure 13 demonstrates, the ADC of a subdistrict region is a 12-digit number. Following this naming pattern, we append two digits to the subdistrict names for community names, and two more digits to the community names for block names. The general order of the encoding is from west to east and north to south. To be more specific, the region at the northwest corner is labeled as number one. Then we sequentially designate serial numbers to the regions along the horizontal direction until reaching the east border. Then the next number is given to the region which lies adjacent to region number one in the south, and so forth. In this way, the hierarchical relationship is implicitly involved in names. The name of a region in the upper level can be inferred directly from the names of smaller regions it covers.
6. Local Database
To support the access of regional information continuously with real-time GPS coordinates under the offline mode, we develop a local database based on SQLite [107] and Spatialite [108] (an extension to SQLite with advanced spatial capabilities). The database is a compact single file of only about 5 MB. Regardless of the platform, as soon as one node is configured with SQLite and Spatialite, the file can be copied to the node and it is ready for use. We have tested the access performance on Intel Galileo board (Intel Quark SoC X1000 400 MHz, 256M DRAM) and it only takes about 0.25 s for one query. This database is combined with the map interface as the map adaptor module. The overall picture of the steps stated above is shown in Figure 14.

3.4. The Routing Scheme Based on Map Segmentation and Movement History

Based on the map segmentation presented in the previous section, we designed a straightforward routing scheme, yet it is adequate for validation and testing purposes.
The design is partly inherited from our former work [109], which takes advantages of square regions to capture the movement patterns of people and take them as a basis to predict contact chances in the near future. Since we primarily focus on the retrieval of spatial-related contents, which are commonly location-dependent, a node that is more probable to pass the target location can be regarded as a better carrier, so we will keep going along this direction.
Compared with [109], while preserving the basic idea, we make major changes on three aspects:
  • We use realistic administrative regions originated from map segmentation instead of simple square regions to characterize the movement of nodes.
  • The emphasis of routing design is transited from EID-based (identifier of nodes) to region-based as we do not intend to contact certain nodes, but to expect to acquire demanded contents along the path to certain locations.
  • Besides regular bundles, we also support BPQ-enabled request and response bundles to achieve bi-directional, name-based, and on-demand content retrieval.
Accompanying the movement, the node obtains its current GPS position at a periodic interval of 5 s. By querying its position through the map interface, regions where the node lies are obtained. Thereby, we project the detailed trajectory onto a sequence of subregions, which is more friendly for comparison and maintenance. The local recorded history of passed regions is not merely for self use. Upon a link establishment, two nodes will exchange this information in the form of a normal bundle. A node can only learn the history regions of its direct one-hop neighbors, and such knowledge of a certain neighbor will be updated to the latest state only when that neighbor is encountered again.
Correspondingly, we add new fields indicating the source and target regions of the bundle in the bundle header. As we partition the map into multiple layers with different granularities, the region on every layer that encompasses the given location is recorded. The source regions are those from which the bundle originates. To be more specific, for query bundles, they are where the request is issued, while for a response bundle, they are where the successful content matching happens. Beyond use in forwarding, this information can reflect the spatial distribution of content supply and demand to some degree. On the other side, regions for which the bundle is destined are target regions. Potential candidates of target regions include, but are not limited to: publicly known locations of road side unit (RSU), possible regions where contents could be found indicated by received response bundles, or locations that are highly correlated with the demanded contents (e.g., updates on traffic or weather condition, or photographs and short videos from the scene of an incident). With designated target regions and collected regional movement history, the routing strategy will make efforts to take bundles to gradually approach their destinations by selecting the next hops that have get closer to the finer target regions.
With the movement trajectories represented by a sequence of regions, the mobility pattern can be learned. However, how to accurately identify the regularity of mobile nodes is also a sophisticated research problem. There are numerous works that investigate this problem with respect to frequency, recency, or optimality, etc. Due to its complexity, this problem is beyond the scope of this paper. Here we put an emphasis on showing the ability of Geo-DMP on the support of region-based routing strategy. If a better mobility pattern can be derived via analysis of history regions, it can be applied to Geo-DMP as well. So we presume that all of the moving nodes have strong regularity, i.e., they move along their predefined routes back and forth just like buses or trams. Based on this premise, the history regions across which a node has moved are limited and the node will certainly revisit these regions at least several times.
As mentioned earlier, an outstanding feature of the administrative subdivision method is that it can surround the daily activities of people’s lives, i.e., one will stay or move about within one single region for a long stretch of time. Therefore, it is reasonable that we make the assumption that the requester will not leave the community region where it sends out the query bundles. As a result, once a query bundle triggers the generation of a response bundle, the target regions of this response bundle can be set to the source regions of that query bundle. With reference to the target regions of the query bundle, as the query bundle is probably satisfied by intermediate caches during the forwarding process, they are not meant for the place to which it must be delivered but just suggest where the demanded content could definitely be found as a last resort. Here they are set to the location where the RSU resides. How to intelligently determine the appropriate target regions by DTN itself is another of our intriguing research problems.
For the sake of brevity, in the following description of routing strategy, the forwarding process of a query bundle is taken as the example. The same goes for a new response bundle. The query bundles are forwarded in a single-copy fashion. We suppose that a query bundle B is created on node N a , whose destination regions are r 1 / r 2 / r 3 in a top-down view where the subscript indicates the level. N a makes its decision on whether it should forward bundle B to one of its neighbors according to Algorithm 1. For a concise expression of the algorithm, we denote R = { r i | i = 1 , 2 , 3 } , and N c as the current best candidate node for next hop and its initial state is set to local node N a . Then each neighbor N i is compared concerning the relation between visited regions and target regions. The comparison result can be categorized into several cases:
Case I: Neither N c nor N i has visited any regions in R (lines 9–16)
We notice that, within a period of time after the creation of bundles, the source node may scarcely be able to meet eligible next hop due to the long distance away from the target regions or because most nodes have not accumulated enough knowledge about their movement pattern at the early stage of the experiment. To mitigate the influence of this cold-start problem, the first task is to make bundles start to move towards the right direction as soon as possible. So in this case, we measure the distance between the regions they have been to ( V c and V i ) and the smallest target region r 3 . The distance between two regions is defined as the straight-line distance between the two centroids of them. As the purpose of these measurements is to roughly determine which one is more likely to move on the right direction, a small number of simple calculations is enough. If one node has traveled across many regions already, calculations can be confined to history regions in a single layer. Such elasticity is easy to achieve according to the length of region ID. The  N i will become new N c if it has the minimum distance.
Case II: Either N c or N i has visited the region(s) in R (lines 17–20)
In this case, one side has evidence that it has been to at least one region in R while the other side does not. Thus, obviously the one whose known trajectory goes through the target regions should be selected as the bundle keeper as it is more likely that it will bring the bundle there.
Case III: Both N c and N i have visited the region(s) in R (lines 21–29)
To decide which node has superiority over the other one when both of them declare that they have been to the region(s) in R, we follow the principle that, intuitively, the node that has reached the target region on a deeper level can be expected to get closer to the content. According to the result of the intersection of V c and V i with R, if V i overlaps R to a greater depth than V c , N i is qualified as the next best candidate. By this means, the bundle will gradually approach the destination.
Algorithm 1 The routing scheme based on map segmentation and movement history
1:
N c N a
2:
for each node N i that has an active connection with N a do
3:
if N i is the destination of B then
4:
  deliver B to N i
5:
  break
6:
end if
7:
V c g e t V i s i t e d R e g i o n s ( N c )
8:
V i g e t V i s i t e d R e g i o n s ( N i )
9:
if ( V c R = a n d V i R = ) then
10:
   d c c o m p u t e S h o r t e s t D i s t a n c e ( r 3 , V c )
11:
   d i c o m p u t e S h o r t e s t D i s t a n c e ( r 3 , V i )
12:
  if d i < d c then
13:
    N c N i
14:
  else
15:
   continue
16:
  end if
17:
else if ( V c R a n d V i R = ) then
18:
  continue
19:
else if ( V c R = a n d V i R ) then
20:
   N c N i
21:
else if ( V c R a n d V i R ) then
22:
   l c m a x i m u m l w h e r e r l V c R
23:
   l i m a x i m u m l w h e r e r l V i R
24:
  if l c < l i then
25:
    N c N i
26:
  else
27:
   continue
28:
  end if
29:
end if
30:
end for
31:
if N c N a then
32:
 forward B to N c
33:
end if

4. Experimental Validation and Evaluation

4.1. Emulation Platform

DTN-related experimentation has been a long-standing challenging task, largely owing to the fact that conditions like short-lived contacts and multi-hop transmissions are too costly to provide in laboratory environments. As a hybrid approach between virtual simulation and physical testbed, emulations are viable for indoor spaces and its support for real codes can yield more convincing results. An emerging trend in emulation is that virtual nodes gain ever-growing attention and widespread adoption for their better scalability and deployability. In this paper, we propose a decentralized and lightweight emulation platform based on virtual machines (VM), as VM with a standalone kernel and network protocol stack offers the capability to thoroughly examine the implementation and a higher degree of fidelity [110] compared to the kernel-based containers.
Unlike the majority of works on emulation which assign a dedicated central controller to govern the evolution of network topology [111,112,113], inspired by several works in ad-hoc networking [114], we leverage the “Link Emulator” module to make each node automatically manage its own links and hence it becomes an autonomous entity in the experiment progress. Only a simple document that records positions is necessary for a node to virtually move accordingly.
Each node is instantiated as a VM running an Ubuntu distribution. All nodes are interconnected via LAN. To settle the time synchronization problem, a “starting pistol” node is set up to launch the initialization script and time adjustment with an NTP server on every DTN node almost simultaneously with “Parallel SSH” [115] tool. Afterwards, this node will not intervene in the experimental process and other DTN nodes will behave independently.

4.2. Validation in Simple Scenarios

We first present several experiments in simple scenarios to validate the feasibility and usability of the implementation. The movement of nodes is orchestrated to create the planned contact chances. The contents requested are vector map tiles and in future we will support more types of informative geographical data that can be overlaid on maps.

4.2.1. Validation of Delay-Tolerant Multi-Hop Content Retrieval

Figure 15 illustrates the scenario for experiments in this part. We took a portion of a bus route at the northwest of the third ring road of Beijing from the OSM dataset (osmid: 2094880) as the track. Four nodes participate in these experiments: two mobile nodes plus two stationary nodes. The mobility pattern of these nodes is listed in Table 2. Thirty seconds at the very beginning are reserved for the initialization of nodes and the creation of query bundles. Node 1 acts as the requester and Node 4 is the RSU. They stay motionlessly at point A and E, respectively. Point C is the rendezvous point of Nodes 2 and 3. Node 2 moves between points B and C, while Node 3 moves between points C and D. The communication range is set to 300 m. Next, we conduct experiments in three situations with different distributions of the requested contents.
1. No Intermediate Cached Contents
In this experiment, there are no cached contents on Nodes 2 and 3. All contents have to be retrieved from Node 4. The time sequence of transmission events is shown in Figure 16. The descriptions of the process are as follows:
  • Before 30 s: Initially, Node 1 generates a series of query bundles whose source regions are those where it resides, namely R 1 , R 2 , and R 3 , and target regions are those where Node 4 resides, namely T 1 , T 2 , and T 3 .
  • About 200 s: Shortly after that, when Node 2 passes by Node 1, according to the routing strategy, because Node 2 comes from T 1 while Node 1 falls outside all target regions, these queries are transferred to Node 2.
  • About 400 s: Then Node 2 moves to point C and meets Node 3 there. As Node 3 has been to T 3 which is the target region on a deeper level than T 1 , the only target region visited by Node 2, so Node 3 succeeds Node 2 to become the carrier of the queries.
  • About 600 s: Node 3 continues to carry the queries until it reaches T 3 and delivers them to Node 4. When corresponding response bundles are generated at Node 4, since neither of Node 3 and Node 4 has visited any of their target regions, i.e., R 1 , R 2 , and R 3 , they compare the minimum distance between their history regions and R 3 . As can be observed from Figure 15, for Node 3 this value is the distance between M 3 and R 3 . It is shorter than that of Node 4, which is the distance between T 1 and R 3 . As a result, Node 3 obtains all contents from Node 4 and turns around to point C.
  • About 800 s: When Node 3 gets in touch with Node 2 again at point C, because Node 2 has moved across R 3 while Node 3 has no chances to any of the target regions of response bundles, the contents are forwarded to Node 2.
  • About 1000 s: Finally, on Node 2’s path returning to B, the responses are successfully delivered to Node 1.
This experiment proves that the system works properly on regular opportunistic multi-hop content retrieval from the data source. In the following two situations, the reasons why forwardings can happen under instructions of the routing scheme will not be explained repeatedly because they share the same mobility pattern.
2. Full Intermediate Cached Contents
In this experiment, we aim to ascertain if caches at a nearby place could be utilized. All contents requested by Node 1 are cached at Node 3 in advance. According to the temporal results in Figure 17, after the first round of movement of Node 2 between point B and C (about 400 s), all queries can be satisfied at Node 3. Consequently, responses are delivered to the requester in less time and fewer hops (about 600 s), which coincides with our expectation.
3. Partial Intermediate Cached Contents
This experiment is a combination of the two situations above: partial contents are cached at Node 3, while the remainders could only be found at Node 4. Referring to Figure 18, we describe the interactions between nodes as follows:
  • About 200 s: Firstly, Node 2 takes all query bundles from Node 1.
  • About 400 s: Node 2 and Node 3 come together at point C. Node 3 matches some queries from Node 2 with its local cached contents and gives the responses back to Node 2, then it carries the unfulfilled queries towards the RSU. Node 2 goes back to point B with those response bundles.
  • About 600 s: Node 2 brings the first batch of responses back to Node 1. Almost at the same time, Node 3 gets the rest of the requested contents from Node 4.
  • About 800 s: Node 2 and Node 3 meet at point C again. At this time the rest of the responses are unloaded from Node 3 to Node 2.
  • About 1000 s: Finally, the second batch of responses are delivered to Node 1.
This experiment verifies that a number of queries issued at one time can be satisfied by different content sources, and responses are supported to be returned to the requester separately.

4.2.2. Validation of Delay-Tolerant Client Visualization

As confirmed in the previous part, contents can return from multiple sources at different times. The next question is, from the standpoint of the user, whether they can be collectively and correctly visualized in the browser across a prolonged time duration. Recall that as one advantage of gateway-based implementation, the terminal is not required to be aware of the DTN and only a little adjustment is enough for our purpose. In our implementation, through tuning the parameter of response timeout of the browser, the responses returned at a later time will not be dropped.
In this experiment, we imagine that a user without network access is in need of a map of his surroundings. The map data is retrieved from several other nodes in the form of vector tiles which are data units that we propose in our former work [32]. Seven nodes take part in and their contacts are prearranged. Node 1 acts the requester and Node 7 is as the RSU. In order to achieve the effect of queries being satisfied by multiple sources, we put one-third of the requested contents on Node 2 and one-third on Node 3 in advance, assuming that they have received these contents beforehand. The remaining one-third has to be fetched from Node 7. The bundle exchanges are shown in Figure 19. To make the result more clear, the details of each batch of returned contents are summarized in Table 3. As we can see from the screenshots of the browser in Figure 20, the vector map incrementally becomes complete. This verifies that the client-side can support delay-tolerant content retrieval and visualization.

4.3. Experiments in Comprehensive Scenarios

In this section, we discuss the extensive experiments on Geo-DMP in a more realistic and comprehensive scenario. An approximate square area of 3 km 2 near Zhongguancun, Haidian District is selected as the movement range of nodes. Ten nodes participate in the experiments, whose traces are excerpted from T-drive [116], a dataset that contains real-world trajectories of taxis. Nodes move along their own path repeatedly for two rounds in each experiment execution and their contacts are not planned beforehand. The one-way travel time ranges from 20 to 40 min. We create different conditions for every group of experiments by replacing all the traces of nodes. The movement range and one example set of traces are given in Figure 21.
First, we evaluate the performance of Geo-DMP when only a single content source is available. Node 1 acts as the user and Node 10 is the RSU, while others are relay nodes. According to the variation of the communication range and whether nodes have knowledge of their own movements in advance, four cases in one group of experiments are given in Table 4. We ran 10 groups of experiments altogether.

4.3.1. Without Intermediate Cached Contents

As seen from Figure 22, except for Case B, in most situations (over 80% on average) we can accomplish the two-way deliveries. As there is no contents cached on intermediate nodes, queries could only be satisfied by RSU after they are brought to their smallest target region. Likewise, only when the responses are routed back to the requester can the deliveries be successful. Hence, the high delivery ratio reveals that the multi-layer segmented regions can appropriately profile the movement of nodes. During the process of bundles approaching their target regions, they can serve as a valuable reference for selecting proper next hops under realistic scenarios. Moreover, in agreement with intuition, the enlargement of communication range contributes to more successful deliveries as many new contact opportunities emerge. All in all, we confirmed that we achieve our goal to design and implement a prototype that supports cooperatively retrieving named geospatial data units across intermittent links and a long time span.
Next, we present an analysis of the decline of delivery ratio when nodes have knowledge of movements in advance. We deem that this decline can be ascribed to the underutilization of the movement history so far. According to our investigation of some delivery failures, if both nodes report that they have visited the smallest target region, the current routing protocol is unable to judge which one is superior. The consequence is, bundles will be forwarded to the one showing up first. But sometimes that intermediate node fails to get in touch with the destination node after it enters the smallest target region. Two reasons may account for this phenomenon. The first one is, due to the limitation of the experimental condition, the amount of nodes and executed experiment sets did not suffice to dilute the impact of the characteristics of the selected trajectories. The second one is that, as the communication range is a variable, it is very likely that there is a mismatch between region size and communication range. When the communication range becomes smaller, this problem will get more severe. That is why the problem looks more evident for case B than case D. We recognize that two nodes coming to the same finest target region and two nodes being able to contact with each other are not absolutely equivalent. Similar to the classical “last mile” problem, although target regions can indicate correct forwarding directions, additional strategies should be conceived for the “last hop” problem.
With respect to hop counts and average delay, as we can see from Figure 23 and Figure 24, case A with smaller communication range and without initial movement knowledge takes the longest latency and the highest forwarding hops to retrieve contents from the RSU. In case C, with a larger communication range, nodes can more easily find an eligible next hop, leading to a decrease of both delay and hop counts. The movement knowledge shows its advantage in case B and D. The average delay of case B reduces to about 50% of that in case A, while the average delay of case D is about 70% of that in case C. The reason for substantial savings in time consumption can be explained by the initial movement knowledge eliminating the need to collect visited regions from scratch. The awareness of the places in the path enables nodes to more easily and quickly find a better, even the best, next hop. Meanwhile, for the same reason, fewer hops of forwarding are required for deliveries in case B and D compared with case A and C.

4.3.2. With Intermediate Cached Contents

In this part, we study the effect of intermediate caches in the content acquisition process. We select six sets of trajectories by which the contents can be delivered successfully in the previous experiments. For each set of trajectories, we initiate the new experiment based on the results of the former one. To put it more clearly, the experiment without intermediate caches is executed prior to the new experiment to bring contents to some nodes in preparation. Except for Node 1, Node 10, and nodes that possess the cached contents, the other nodes will play the role of the requester in turn, in separate executions.
Because in former experiments, contents are mostly forwarded back to the requester in two or three hops, not too many nodes will have cached contents. However, we think that, in reality it is quite common that demanded contents are scattered over surrounding areas. Many factors could be the cause of this: the lower popularity of the contents, the unwillingness of some users to expose their cache to the public, or limited support of BPQ mechanism among DTN nodes.
We categorize the results by where the contents are retrieved from in Figure 25. As it can be seen, when the communication range is 300 m, due to cached contents only existing on a few intermediate nodes, other nodes have rather limited chances to discover them, so a large portion of the requests is still fulfilled by RSU. Despite this, cached nodes can contribute nearly a half of successful retrievals, which implies that Geo-DMP is capable of effectively utilizing a moderate amount of cached contents to markedly reduce the unsuccessful retrievals and promote retrieving contents from nearer locations compared to experiments without caches in Figure 22. With the communication range up to 600 m, we observe that the number of requests fulfilled by caches decreases a little instead. The reason for this is that, as stated before, larger communication range will create more contact opportunities and hence intermediate nodes can more easily contact with better next hops, even the RSU. So there is a tendency that forwardings are preferred to the direction of the RSU and the role of intermediate caches will inevitably be diminished.
To close this section, we sum up the extensive experiments presented above in brief. Firstly, we prove the framework of Geo-DMP works properly and correctly on delay-tolerant content retrieval in a simplistic scenario with different cache distributions. Secondly, with a more realistic scenario and trajectories of nodes, we show that the delivery ability of Geo-DMP is acceptable for most cases, and the movement history information can help to select proper next hops as well as reduce average hops and delays. Thirdly, we discuss the reason behind some delivery failures for potential amelioration of our region-based routing strategy. Finally, we validate that Geo-DMP can leverage a small amount of intermediate caches to have a remarkable positive effect on the overall efficiency.

5. Conclusions and Outlook

In this paper, we present Geo-DMP, a mobile prototype system supporting the sharing and exchanging of geospatial contents in an opportunistic, distributed, and collaborative way. The framework of Geo-DMP consists of a full DTN protocol stack, a “content agent” module, and a “map adaptor” module. DTN and its BPQ mechanism are employed as the foundation for their capabilities of identification, matching, and multi-hop delay-tolerant forwarding of named contents. Then we follow the “gateway-based” communication paradigm to develop the “content agent” module to break the isolation between non-DTN nodes and DTN-aware nodes. To extract the concise mobility pattern of users from their movements for the purpose of routing, we present the “map adaptor” module, which provides real-time regional information based on the product of our proposed multi-scale map segmentation scheme. Next, to accomplish a complete content retrieval process with the framework of Geo-DMP, we explore the design of a pure region-oriented DTN routing scheme which is tailored for real-life spatial environments. The full implementation is thoroughly verified on the emulation platform composed of VMs. Through experiments on real-world trajectories in realistic scenarios, we can conclude that with Geo-DMP, the requests of named spatial contents can be directed to and fulfilled by distant content sources via transient connectivities and cooperation of DTN nodes, and the requester can utilize the responses which are routed back across a long time period. We also find that intermediate cache resources can be efficiently exploited by Geo-DMP to lessen the reliance on content originators, reduce unsuccessful retrievals, and enhance overall delivery performance.
Despite the achievements, we are also conscious that there is still much room for improvement. The potential directions include: large scale experiments with physical embedded devices in real environments; improving the design of routing protocol by better exploiting the knowledge of historical movements and intelligent determination of target regions; and exploring a more programmatic way to automate processing or calibrating the road network and trajectories of nodes.
In addition to the enhancements of the system itself, we will also seek to broaden the applicability scope of Geo-DMP. Two possible ways could be suggested: First, supporting the retrieval of more manifold timely or customized geospatial contents such as emergency event warnings, safety cautions (e.g., road surface anomalies or accident prone road sections), weather updates, or POI (point-of-interest) recommendations; and second, better integration with crowd-sourcing services to assist efficient harvesting and sharing of up-to-date as well as valuable location-aware information around us.

Author Contributions

Conceptualization and methodology: Chao Li and Yong Xiang; software: Chao Li and Rui Gao; validation and investigation: Chao Li; writing—original draft preparation: Chao Li; writing—review & editing: Yong Xiang, Huimei Lu, and Chao Li. All authors have read and agree to the published version of the manuscript. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. ICT Facts and Figures 2017, International Telecommunication Union. Available online: https://www.itu.int/en/ITU-D/Statistics/Pages/facts/default.aspx (accessed on 15 May 2019).
  2. Line, T.; Jain, J.; Lyons, G. The role of ICTs in everyday mobile lives. J. Transp. Geogr. 2011, 19, 1490–1499. [Google Scholar] [CrossRef]
  3. Huang, H.; Gartner, G.; Krisp, J.M.; Raubal, M.; de Weghe, N.V. Location based services: Ongoing evolution and research agenda. J. Locat. Based Serv. 2018, 12, 63–93. [Google Scholar] [CrossRef]
  4. Pucher, J.; Peng, Z.R.; Mittal, N.; Zhu, Y.; Korattyswaroopam, N. Urban Transport Trends and Policies in China and India: Impacts of Rapid Economic Growth. Transp. Rev. 2007, 27, 379–410. [Google Scholar] [CrossRef]
  5. Wang, H.; He, Q.; Liu, X.; Zhuang, Y.; Hong, S. Global urbanization research from 1991 to 2009: A systematic research review. Landsc. Urban Plan. 2012, 104, 299–309. [Google Scholar] [CrossRef]
  6. See, L.; Mooney, P.; Foody, G.; Bastin, L.; Comber, A.; Estima, J.; Fritz, S.; Kerle, N.; Jiang, B.; Laakso, M.; et al. Crowdsourcing, Citizen Science or Volunteered Geographic Information? The Current State of Crowdsourced Geographic Information. ISPRS Int. J. Geo-Inf. 2016, 5, 55. [Google Scholar] [CrossRef]
  7. Wilson, M.; Graham, M. Neogeography and Volunteered Geographic Information: A Conversation with Michael Goodchild and Andrew Turner. Environ. Plan. A Econ. Space 2013, 45, 10–18. [Google Scholar] [CrossRef] [Green Version]
  8. Hahmann, S.; Burghardt, D. How much information is geospatially referenced? Networks and cognition. Int. J. Geogr. Inf. Sci. 2013, 27, 1171–1189. [Google Scholar] [CrossRef]
  9. Arribas-Bel, D. Accidental, open and everywhere: Emerging data sources for the understanding of cities. Appl. Geogr. 2014, 49, 45–53. [Google Scholar] [CrossRef] [Green Version]
  10. Liu, Z.; Jiang, S.; Zhou, P.; Li, M. A Participatory Urban Traffic Monitoring System: The Power of Bus Riders. IEEE Trans. Intell. Transp. Syst. 2017, 18, 2851–2864. [Google Scholar] [CrossRef]
  11. Turner, M.; Dowsland, S.; Mazel, A.; Giesen, M. Rock art CARE: A cross-platform mobile application for crowdsourcing heritage conservation data for the safeguarding of open-air rock art. J. Cult. Herit. Manag. Sustain. Dev. 2018, 8, 420–433. [Google Scholar] [CrossRef]
  12. Muller, C.; Chapman, L.; Johnston, S.; Kidd, C.; Illingworth, S.; Foody, G.; Overeem, A.; Leigh, R. Crowdsourcing for climate and atmospheric sciences: Current status and future potential. Int. J. Climatol. 2015, 35, 3185–3203. [Google Scholar] [CrossRef] [Green Version]
  13. Radicchi, A.; Henckel, D.; Memmel, M. Citizens as smart, active sensors for a quiet and just city. The case of the “open source soundscapes” approach to identify, assess and plan “everyday quiet areas” in cities. Noise Mapp. 2018, 5, 1–20. [Google Scholar] [CrossRef] [Green Version]
  14. Davis, G.L.; Robbin, A. Network Disaster Response Effectiveness: The Case of ICTs and Hurricane Katrina. J. Homel. Secur. Emerg. Manag. 2015, 12, 437–467. [Google Scholar] [CrossRef]
  15. Yamamura, H.; Kaneda, K.; Mizobata, Y. Communication Problems After the Great East Japan Earthquake of 2011. Disaster Med. Public Health Prep. 2014, 8, 293–296. [Google Scholar] [CrossRef] [Green Version]
  16. Castagno, P.; Mancuso, V.; Sereno, M.; Marsan, M.A. Why your smartphone doesn’t work in very crowded environments. In Proceedings of the 2017 IEEE 18th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), Macau, China, 12–15 June 2017; pp. 1–9. [Google Scholar]
  17. Shafiq, M.Z.; Ji, L.; Liu, A.X.; Pang, J.; Venkataraman, S.; Wang, J. A First Look at Cellular Network Performance During Crowded Events. In Proceedings of the ACM SIGMETRICS/International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS ’13), Pittsburgh, PA, USA, 17–21 June 2013; pp. 17–28. [Google Scholar]
  18. Monthly Earnings. CEIC. Available online: https://www.ceicdata.com/en/indicator/monthly-earnings (accessed on 15 May 2019).
  19. Worldwide Mobile Data Pricing: The Cost of 1GB of Mobile Data in 230 Countries. Available online: https://www.cable.co.uk/mobiles/worldwide-data-pricing/ (accessed on 15 May 2019).
  20. Ding, J.; Li, Y.; Zhang, P.; Jin, D. Time Dependent Pricing for Large-scale Mobile Networks of Urban Environment: Feasibility and Adaptability. IEEE Trans. Serv. Comput. 2017. [Google Scholar] [CrossRef]
  21. Mahadevan, L.; Kaleta, J.P. Free Wi-Fi: To Buy or Not to Buy. J. Comput. Inf. Syst. 2018. [Google Scholar] [CrossRef]
  22. Zhang, L.; Zhao, L.; Wang, Z.; Liu, J. WiFi Networks in Metropolises: From Access Point and User Perspectives. IEEE Commun. Mag. 2017, 55, 42–48. [Google Scholar] [CrossRef]
  23. Berezin, M.E.; Rousseau, F.; Duda, A. Citywide Mobile Internet Access Using Dense Urban WiFi Coverage. In Proceedings of the First Workshop on Urban Networking (UrbaNe ’12), Nice, France, 10 December 2012; pp. 31–36. [Google Scholar]
  24. Ha, S.; Sen, S.; Joe-Wong, C.; Im, Y.; Chiang, M. TUBE: Time-dependent Pricing for Mobile Data. In Proceedings of the ACM SIGCOMM 2012 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM ’12), Helsinki, Finland, 13–17 August 2012; pp. 247–258. [Google Scholar]
  25. Mehmeti, F.; Spyropoulos, T. Performance Modeling, Analysis, and Optimization of Delayed Mobile Data Offloading for Mobile Users. IEEE/ACM Trans. Netw. 2017, 25, 550–564. [Google Scholar] [CrossRef]
  26. Gandotra, P.; Jha, R.K.; Jain, S. A survey on device-to-device (D2D) communication: Architecture and security issues. J. Netw. Comput. Appl. 2017, 78, 9–29. [Google Scholar] [CrossRef]
  27. Khabbaz, M.J.; Assi, C.M.; Fawaz, W.F. Disruption-Tolerant Networking: A Comprehensive Survey on Recent Developments and Persisting Challenges. IEEE Commun. Surv. Tutor. 2012, 14, 607–640. [Google Scholar] [CrossRef]
  28. Rost, M.; Cramer, H.; Holmquist, L.E. Mobile exploration of geotagged photographs. Pers. Ubiquitous Comput. 2012, 16, 665–676. [Google Scholar] [CrossRef]
  29. Gorbil, G. No way out: Emergency evacuation with no internet access. In Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), St. Louis, MO, USA, 23–27 March 2015; pp. 505–511. [Google Scholar]
  30. Gokulakrishnan, P.; Ganeshkumar, P. Road Accident Prevention with Instant Emergency Warning Message Dissemination in Vehicular Ad-Hoc Network. PLoS ONE 2015, 10, e0143383. [Google Scholar]
  31. Martuscelli, G.; Boukerche, A.; Foschini, L.; Bellavista, P. V2V protocols for traffic congestion discovery along routes of interest in VANETs: A quantitative study. Wirel. Commun. Mob. Comput. 2016, 16, 2907–2923. [Google Scholar] [CrossRef]
  32. Li, C.; Lu, H.; Xiang, Y.; Liu, Z.; Yang, W.; Liu, R. Bringing Geospatial Data Closer to Mobile Users: A Caching Approach Based on Vector Tiles for Wireless Multihop Scenarios. Mob. Inf. Syst. 2018, 2018, 5186495. [Google Scholar] [CrossRef] [Green Version]
  33. Kärkkäinen, T.; Pitkänen, M.; Ott, J. Applications in Delay-Tolerant and Opportunistic Networks. In Mobile Ad Hoc Networking: Cutting Edge Directions, 2nd ed.; Basagni, S., Conti, M., Giordano, S., Stojmenovic, I., Eds.; John Wiley & Sons: Hoboken, NJ, USA, 2013; pp. 315–359. [Google Scholar]
  34. Popa, L.; Ghodsi, A.; Stoica, I. HTTP As the Narrow Waist of the Future Internet. In Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks, Monterey, CA, USA, 20–21 October 2010. [Google Scholar]
  35. Ott, J.; Kutscher, D. Bundling the Web: HTTP over DTN. In Proceedings of the Workshop on Networking in Public Transport (WNEPT) in conjunction with QShine 2006, Waterloo, ON, Canada, 7–9 August 2006. [Google Scholar]
  36. Sankaran, K.; Chan, M.C.; Peh, L.S. Dynamic framework for building highly-localized mobile web DTN applications. Comput. Commun. 2016, 73, 56–65. [Google Scholar] [CrossRef]
  37. Pitkänen, M.; Kärkkäinen, T.; Ott, J. Opportunistic web access via WLAN hotspots. In Proceedings of the 2010 IEEE International Conference on Pervasive Computing and Communications (PerCom), Mannheim, Germany, 29 March–2 April 2010; pp. 20–30. [Google Scholar]
  38. Nagy, M.; Kärkkäinen, T.; Ott, J. Enhancing Opportunistic Networks with Legacy Nodes. In Proceedings of the 9th ACM MobiCom Workshop on Challenged Networks (CHANTS ’14), Maui, HI, USA, 7 September 2014; pp. 1–6. [Google Scholar]
  39. Helgason, Ó.; Kouyoumdjieva, S.T.; Pajević, L.; Yavuz, E.A.; Karlsson, G. A middleware for opportunistic content distribution. Comput. Netw. 2016, 107, 178–193. [Google Scholar] [CrossRef]
  40. Zhuang, H.; Ntareme, H.; Ou, Z.; Pehrson, B. A Service Adaptation Middleware for Delay Tolerant Network based on HTTP Simple Queue Service. In Proceedings of the 6th USENIX/ACM Workshop on Networked Systems for Developing Regions (NSDR ’12), Boston, MA, USA, 15 June 2012. [Google Scholar]
  41. Srinivasan, V.; Julien, C. MadApp: A Middleware for Opportunistic Data in Mobile Web Applications. In Proceedings of the 2014 IEEE 15th International Conference on Mobile Data Management, Brisbane, QLD, Australia, 14–18 July 2014; pp. 172–177. [Google Scholar]
  42. Surging High-Speed Internet Access, More Devices and More Content Combine to Drive Media Consumption Upwards. PricewaterhouseCoopers. 2016. Available online: https://www.pwc.com/gx/en/entertainment-media/publications/assets/internet-access-outlook-article-december-2016.pdf (accessed on 31 March 2019).
  43. Ericsson Mobility Report. Ericsson. 2018. Available online: https://www.ericsson.com/assets/local/mobility-report/documents/2018/ericsson-mobility-report-june-2018.pdf (accessed on 31 March 2019).
  44. Oguz, F.; Koehler, W. URL decay at year 20: A research note. J. Assoc. Inf. Sci. Technol. 2016, 67, 477–479. [Google Scholar] [CrossRef] [Green Version]
  45. Jones, S.M.; de Sompel, H.V.; Shankar, H.; Klein, M.; Tobin, R.; Grover, C. Scholarly Context Adrift: Three out of Four URI References Lead to Changed Content. PLoS ONE 2016, 11, e167475. [Google Scholar] [CrossRef]
  46. Zhang, Y.; Ansari, N. On Protocol-Independent Data Redundancy Elimination. IEEE Commun. Surv. Tutor. 2014, 16, 455–472. [Google Scholar] [CrossRef]
  47. Agyapong, P.K.; Sirbu, M. Economic incentives in information-centric networking: Implications for protocol design and public policy. IEEE Commun. Mag. 2012, 50, 18–26. [Google Scholar] [CrossRef]
  48. Choffnes, D.R.; Bustamante, F.E. Taming the Torrent: A Practical Approach to Reducing Cross-isp Traffic in Peer-to-peer Systems. In Proceedings of the ACM SIGCOMM 2008 Conference on Data Communication (SIGCOMM ’08), Seattle, WA, USA, 17–22 August 2008; pp. 363–374. [Google Scholar]
  49. Morelli, A.; Tortonesi, M.; Stefanelli, C.; Suri, N. Information-Centric Networking in next-generation communications scenarios. J. Netw. Comput. Appl. 2017, 80, 232–250. [Google Scholar] [CrossRef]
  50. Sarros, C.A.; Diamantopoulos, S.; Rene, S.; Psaras, I.; Lertsinsrubtavee, A.; Molina-Jimenez, C.; Mendes, P.; Sofia, R.; Sathiaseelan, A.; Pavlou, G.; et al. Connecting the Edges: A Universal, Mobile-Centric, and Opportunistic Communications Architecture. IEEE Commun. Mag. 2018, 56, 136–143. [Google Scholar] [CrossRef] [Green Version]
  51. Anastasiades, C.; Schmid, T.; Weber, J.; Braun, T. Information-centric content retrieval for delay-tolerant networks. Comput. Netw. 2016, 107, 194–207. [Google Scholar] [CrossRef]
  52. Islam, H.M.A.; Chatzopoulos, D.; Lagutin, D.; Hui, P.; Ylä-Jääski, A. Boosting the Performance of Content Centric Networking Using Delay Tolerant Networking Mechanisms. IEEE Access 2017, 5, 23858–23870. [Google Scholar] [CrossRef]
  53. Trossen, D.; Sathiaseelan, A.; Ott, J. Towards an information centric network architecture for universal internet access. ACM SIGCOMM Comput. Commun. Rev. 2016, 46, 44–49. [Google Scholar] [CrossRef]
  54. Farrell, S.; Lindgren, A.; Lynch, A.; Kutscher, D. Bundle Protocol Query Extension Block. 2012. Available online: https://tools.ietf.org/pdf/draft-irtf-dtnrg-bpq-00.pdf (accessed on 20 June 2019).
  55. Pentikousis, K.; Ohlman, B.; Corujo, D.; Boggia, G.; Tyson, G.; Davies, E.; Molinaro, A.; Eum, S. Information-Centric Networking: Baseline Scenarios. 2015. Available online: https://tools.ietf.org/pdf/rfc7476.pdf (accessed on 20 June 2019).
  56. Kurnikov, A.; Kärkkäinen, T.; Ott, J. Data to the People. In Proceedings of the 8th ACM MobiCom Workshop on Challenged Networks (CHANTS ’13), Miami, FL, USA, 30 September 2013; pp. 49–50. [Google Scholar]
  57. Tyson, G.; Bigham, J.; Bodanese, E. Towards an information-centric delay-tolerant network. In Proceedings of the 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Turin, Italy, 14–19 April 2013; pp. 387–392. [Google Scholar]
  58. Pérez-Sánchez, S.; Cabero, J.M.; Urteaga, I. DTN Routing Optimised by Human Routines: The HURRy Protocol. In Proceedings of the 13th International Conference (WWIC 2015) on Wired/Wireless Internet Communications, Malaga, Spain, 25–27 May 2015; pp. 299–312. [Google Scholar]
  59. Islam, H.M.; Lukyanenko, A.; Tarkoma, S.; Yla-Jaaski, A. Towards disruption tolerant ICN. In Proceedings of the 2015 IEEE Symposium on Computers and Communication (ISCC), Larnaca, Cyprus, 6–9 July 2015; pp. 212–219. [Google Scholar]
  60. Zhang, L.; Afanasyev, A.; Burke, J.; Jacobson, V.; Crowley, P.; Papadopoulos, C.; Wang, L.; Zhang, B. Named Data Networking. ACM SIGCOMM Comput. Commun. Rev. 2014, 44, 66–73. [Google Scholar] [CrossRef]
  61. Petz, A.; Lindgren, A.; Hui, P.; Julien, C. MADServer: A Server Architecture for Mobile Advanced Delivery. In Proceedings of the Seventh ACM International Workshop on Challenged Networks (CHANTS ’12), Istanbul, Turkey, 22–26 August 2012; pp. 17–22. [Google Scholar]
  62. Toole, J.L.; Herrera-Yaque, C.; Schneider, C.M.; González, M.C. Coupling human mobility and social ties. J. R. Soc. Interface 2015, 12, 1–9. [Google Scholar] [CrossRef] [Green Version]
  63. Oliveira, E.M.R.; Viana, A.C.; Sarraute, C.; Brea, J.; Alvarez-Hamelin, I. On the regularity of human mobility. Pervasive Mob. Comput. 2016, 33, 73–90. [Google Scholar] [CrossRef] [Green Version]
  64. Wei, K.; Liang, X.; Xu, K. A Survey of Social-Aware Routing Protocols in Delay Tolerant Networks: Applications, Taxonomy and Design-Related Issues. IEEE Commun. Surv. Tutor. 2014, 16, 556–578. [Google Scholar]
  65. Wang, T.; Cao, Y.; Zhou, Y.; Li, P. A Survey on Geographic Routing Protocols in Delay/Disruption Tolerant Networks. Int. J. Distrib. Sens. Netw. 2016, 12, 1–12. [Google Scholar] [CrossRef] [Green Version]
  66. Wen, H.; Ren, F.; Liu, J.; Lin, C.; Li, P.; Fang, Y. A Storage-Friendly Routing Scheme in Intermittently Connected Mobile Network. IEEE Trans. Veh. Technol. 2011, 60, 1138–1149. [Google Scholar] [CrossRef] [Green Version]
  67. Yamada, A.; Ishihara, S. Data Exchange Strategies for Aggregating Geographical Distribution of Demands for Location-Dependent Information Using Soft-State Sketches in VANETs. In Proceedings of the 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA), Taipei, Taiwan, 27–29 March 2017; pp. 728–736. [Google Scholar]
  68. He, X.; Yang, G.; Zhang, H. DRANS: Daily Routine Analysis for Node Searching in delay tolerant networks. Int. J. Distrib. Sens. Netw. 2017, 13, 1–15. [Google Scholar] [CrossRef]
  69. Furutani, T.; Kawamoto, Y.; Nishiyama, H.; Kato, N. Proposal and Performance Evaluation of Information Diffusion Technique with Novel Virtual-Cell-Based Wi-Fi Direct. IEEE Trans. Emerg. Top. Comput. 2019. [Google Scholar] [CrossRef]
  70. Chen, K.; Shen, H. Greedyflow: Distributed greedy packet routing between landmarks in DTNs. Ad Hoc Netw. 2019, 83, 168–181. [Google Scholar] [CrossRef]
  71. Choi, C.S.; Baccelli, F.; de Veciana, G. Densification Leveraging Mobility: An IoT Architecture Based on Mesh Networking and Vehicles. In Proceedings of the Eighteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing (Mobihoc ’18), Los Angeles, CA, USA, 26–29 June 2018; pp. 71–80. [Google Scholar]
  72. Zhang, L.; Yu, B.; Pan, J. GeoMobCon: A Mobility-Contact-Aware Geocast Scheme for Urban VANETs. IEEE Trans. Veh. Technol. 2016, 65, 6715–6730. [Google Scholar] [CrossRef]
  73. Anwar, T.; Liu, C.; Vu, H.L.; Leckie, C. Partitioning road networks using density peak graphs: Efficiency vs. accuracy. Inf. Syst. 2017, 64, 22–40. [Google Scholar] [CrossRef]
  74. Liu, X.; Ai, T.; Liu, Y. Road density analysis based on skeleton partitioning for road generalization. Geo-Spat. Inf. Sci. 2009, 12, 110–116. [Google Scholar] [CrossRef]
  75. Lai, C.; Wang, L.; Chen, J.; Meng, X.; Zeitouni, K. Effective Density Queries for Moving Objects in Road Networks. In Proceedings of the Joint 9th Asia-Pacific Web Conference (APWeb 2007) and 8th International Conference, on Web-Age Information Management (WAIM 2007), Huang Shan, China, 16–18 June 2007; pp. 200–211. [Google Scholar]
  76. Li, R.; Tong, D. Constructing human activity spaces: A new approach incorporating complex urban activity-travel. J. Transp. Geogr. 2016, 56, 23–35. [Google Scholar] [CrossRef]
  77. Marco, A.D.; Marco, M.D. Conceptualization and measurement of the neighborhood in rural settings: A systematic review of the literature. J. Community Psychol. 2010, 38, 99–114. [Google Scholar] [CrossRef]
  78. Hipp, J.R.; Faris, R.W.; Boessen, A. Measuring ‘neighborhood’: Constructing network neighborhoods. Soc. Netw. 2012, 34, 128–140. [Google Scholar] [CrossRef] [Green Version]
  79. Weden, M.M.; Peterson, C.E.; Miles, J.N.; Shih, R.A. Evaluating Linearly Interpolated Intercensal Estimates of Demographic and Socioeconomic Characteristics of U.S. Counties and Census Tracts 2001–2009. Popul. Res. Policy Rev. 2015, 34, 541–559. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  80. Elnakat, A.; Gomez, J.D.; Booth, N. A zip code study of socioeconomic, demographic, and household gendered influence on the residential energy sector. Energy Rep. 2016, 2, 21–27. [Google Scholar] [CrossRef] [Green Version]
  81. Tompson, L.; Johnson, S.; Ashby, M.; Perkins, C.; Edwards, P. UK open source crime data: Accuracy and possibilities for research. Cartogr. Geogr. Inf. Sci. 2015, 42, 97–111. [Google Scholar] [CrossRef] [Green Version]
  82. Krieger, N.; Chen, J.T.; Waterman, P.D.; Soobader, M.J.; Subramanian, S.V.; Carson, R. Geocoding and Monitoring of US Socioeconomic Inequalities in Mortality and Cancer Incidence: Does the Choice of Area-based Measure and Geographic Level Matter?: The Public Health Disparities Geocoding Project. Am. J. Epidemiol. 2002, 156, 471–482. [Google Scholar] [CrossRef] [PubMed]
  83. Thomas, A.J.; Eberly, L.E.; Smith, G.D.; Neaton, J.D. ZIP-Code-based versus Tract-based Income Measures as Long-Term Risk-adjusted Mortality Predictors. Am. J. Epidemiol. 2006, 164, 586–590. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  84. Yang, Z.; Song, T.; Chahine, T. Spatial representations and policy implications of industrial co-agglomerations, a case study of Beijing. Habitat Int. 2016, 55, 32–45. [Google Scholar] [CrossRef]
  85. Wang, X.; Zhou, Z.; Zhao, Y.; Zhang, X.; Xing, K.; Xiao, F.; Yang, Z.; Liu, Y. Improving Urban Crowd Flow Prediction on Flexible Region Partition. IEEE Trans. Mob. Comput. 2019. [Google Scholar] [CrossRef]
  86. Ren, Y.; Cheng, T.; Zhang, Y. Deep spatio-temporal residual neural networks for road-network-based data modeling. Int. J. Geogr. Inf. Sci. 2019, 33, 1894–1912. [Google Scholar] [CrossRef]
  87. Rosser, G.; Davies, T.; Bowers, K.J.; Johnson, S.D.; Cheng, T. Predictive Crime Mapping: Arbitrary Grids or Street Networks? J. Quant. Criminol. 2017, 33, 569–594. [Google Scholar] [CrossRef] [Green Version]
  88. Rajaei, A.; Chalmers, D.; Wakeman, I.; Parisis, G. Efficient Geocasting in Opportunistic Networks. Comput. Commun. 2018, 127, 105–121. [Google Scholar] [CrossRef] [Green Version]
  89. Lu, S.; Liu, Y. Geoopp: Geocasting for opportunistic networks. In Proceedings of the 2014 IEEE Wireless Communications and Networking Conference (WCNC), Istanbul, Turkey, 6–9 April 2014; pp. 2582–2587. [Google Scholar]
  90. Yuan, N.J.; Zheng, Y.; Xie, X.; Wang, Y.; Zheng, K.; Xiong, H. Discovering Urban Functional Zones Using Latent Activity Trajectories. IEEE Trans. Knowl. Data Eng. 2015, 27, 712–725. [Google Scholar] [CrossRef]
  91. Gonzalez, H.; Han, J.; Li, X.; Myslinska, M.; Sondag, J.P. Adaptive Fastest Path Computation on a Road Network: A Traffic Mining Approach. In Proceedings of the 33rd International Conference on Very Large Data Bases (VLDB ’07), Vienna, Austria, 23–27 September 2007; pp. 794–805. [Google Scholar]
  92. Anyproxy—A Fully Configurable http/https Proxy in NodeJS. Available online: https://github.com/alibaba/anyproxy (accessed on 15 September 2018).
  93. DTN2—DTN Reference Implementation. Available online: https://github.com/delay-tolerant-networking (accessed on 15 September 2018).
  94. Cerf, V.; Burleigh, S.; Durst, R.; Fall, K.; Hooke, A.; Scott, K.; Torgerson, L.; Weiss, H. Delay-Tolerant Networking Architecture. 2007. Available online: https://tools.ietf.org/html/rfc4838 (accessed on 6 May 2019).
  95. Scott, K.; Burleigh, S. Bundle Protocol Specification. 2007. Available online: https://tools.ietf.org/html/rfc5050 (accessed on 6 May 2019).
  96. Ramadas, M.; Burleigh, S.; Farrell, S. Licklider Transmission Protocol—Specification. 2008. Available online: https://tools.ietf.org/html/rfc5326 (accessed on 6 May 2019).
  97. Kusenbach, M. A Hierarchy of Urban Communities: Observations on the Nested Character of Place. City Community 2008, 7, 225–249. [Google Scholar] [CrossRef]
  98. OpenStreetMap Data Extracts. Available online: http://download.geofabrik.de/ (accessed on 15 September 2018).
  99. PostgreSQL—The World’s Most Advanced Open Source Relational Database. Available online: https://www.postgresql.org/ (accessed on 15 September 2018).
  100. PostGIS—Spatial and Geographic objects for PostgreSQL. Available online: https://postgis.net/ (accessed on 15 September 2018).
  101. OpenStreetMap City Blocks as GeoJSON Polygons. Available online: https://peteris.rocks/blog/openstreetmap-city-blocks-as-geojson-polygons/ (accessed on 17 May 2018).
  102. Shapely—Manipulation and Analysis of Geometric Objects in the Cartesian Plane. Available online: https://github.com/Toblerity/Shapely (accessed on 6 May 2019).
  103. QGIS—A Free and Open Source Geographic Information System. Available online: https://qgis.org/en/site/ (accessed on 15 September 2018).
  104. The Gazetteer of Haidian. Available online: http://www.xzqh.org/html/list/397.html (accessed on 2 November 2018). (In Chinese).
  105. Wu, J.; Lu, H.; Xiang, Y. Measurement and comparison of Sub-1GHz and IEEE 802.11p in vehicular networks. In Proceedings of the 2017 IEEE Symposium on Computers and Communications (ISCC), Heraklion, Greece, 3–6 July 2017; pp. 1063–1066. [Google Scholar]
  106. The Administrative Division Codes for Statistic Use, Haidian Distrct, Beijing. Available online: http://www.stats.gov.cn/tjsj/tjbz/tjyqhdmhcxhfdm/2018/11/01/110108.html (accessed on 2 November 2018). (In Chinese)
  107. SQLite. Available online: https://www.sqlite.org/index.html (accessed on 15 September 2018).
  108. SpatiaLite. Available online: https://www.gaia-gis.it/fossil/libspatialite/index (accessed on 15 September 2018).
  109. Wang, W.; Lu, H.; Xiang, Y.; Cai, B.; Wu, J.; Gao, R. AAaS: Area approaching and spray-and-wait routing scheme for DTN in Android. In Proceedings of the 2016 18th International Conference on Advanced Communication Technology (ICACT), Pyeongchang, Korea, 31 January–3 February 2016; pp. 510–516. [Google Scholar]
  110. Suo, K.; Zhao, Y.; Chen, W.; Rao, J. An Analysis and Empirical Study of Container Networks. In Proceedings of the IEEE INFOCOM 2018—IEEE Conference on Computer Communications, Honolulu, HI, USA, 15–19 April 2018; pp. 189–197. [Google Scholar]
  111. Siby, S.; Galati, A.; Bourchas, T.; Olivares, M.; Gross, T.R.; Mangold, S. METhoD: A Framework for the Emulation of a Delay Tolerant Network Scenario for Media-Content Distribution in Under-Served Regions. In Proceedings of the 2015 24th International Conference on Computer Communication and Networks (ICCCN), Las Vegas, NV, USA, 3–6 August 2015; pp. 1–9. [Google Scholar]
  112. Li, Y.; Hui, P.; Jin, D.; Chen, S. Delay-tolerant network protocol testing and evaluation. IEEE Commun. Mag. 2015, 53, 258–266. [Google Scholar] [CrossRef]
  113. Sánchez-Carmona, A.; Guidec, F.; Launay, P.; Mahéo, Y.; Robles, S. Filling in the missing link between simulation and application in opportunistic networking. J. Syst. Softw. 2018, 142, 57–72. [Google Scholar] [CrossRef] [Green Version]
  114. Kiess, W.; Mauve, M. A survey on real-world implementations of mobile ad-hoc networks. Ad Hoc Netw. 2007, 5, 324–339. [Google Scholar] [CrossRef]
  115. ParallelSSH. Available online: https://parallel-ssh.org/ (accessed on 19 November 2018).
  116. Yuan, J.; Zheng, Y.; Xie, X.; Sun, G. Driving with Knowledge from the Physical World. In Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD ’11), San Diego, CA, USA, 21–24 August 2011; pp. 316–324. [Google Scholar]
Figure 1. The global subscription number of mobile phone per 100 inhabitants.
Figure 1. The global subscription number of mobile phone per 100 inhabitants.
Ijgi 09 00008 g001
Figure 2. The average price of 1 GB of mobile traffic and the proportion it constitutes in the daily earnings per capita by country.
Figure 2. The average price of 1 GB of mobile traffic and the proportion it constitutes in the daily earnings per capita by country.
Ijgi 09 00008 g002
Figure 3. The framework of Geo-DMP.
Figure 3. The framework of Geo-DMP.
Ijgi 09 00008 g003
Figure 4. The transformations between HTTP messages and delay/disruption tolerant network (DTN) bundles during the content retrieval procedure.
Figure 4. The transformations between HTTP messages and delay/disruption tolerant network (DTN) bundles during the content retrieval procedure.
Ijgi 09 00008 g004
Figure 5. The handling of newly generated query.
Figure 5. The handling of newly generated query.
Ijgi 09 00008 g005
Figure 6. The handling of an extrinsic query.
Figure 6. The handling of an extrinsic query.
Ijgi 09 00008 g006
Figure 7. The handling of extrinsic response.
Figure 7. The handling of extrinsic response.
Ijgi 09 00008 g007
Figure 8. The rough road network extracted from OSM vector dataset (partial).
Figure 8. The rough road network extracted from OSM vector dataset (partial).
Ijgi 09 00008 g008
Figure 9. The effect after the polygonization (partial).
Figure 9. The effect after the polygonization (partial).
Ijgi 09 00008 g009
Figure 10. Segmentation result of block regions.
Figure 10. Segmentation result of block regions.
Ijgi 09 00008 g010
Figure 11. Segmentation result of subdistrict regions.
Figure 11. Segmentation result of subdistrict regions.
Ijgi 09 00008 g011
Figure 12. Segmentation result of community regions.
Figure 12. Segmentation result of community regions.
Ijgi 09 00008 g012
Figure 13. An example of region naming.
Figure 13. An example of region naming.
Ijgi 09 00008 g013
Figure 14. The production procedure of the map adaptor module.
Figure 14. The production procedure of the map adaptor module.
Ijgi 09 00008 g014
Figure 15. The scenario and key locations for experiments in Section 4.2.1.
Figure 15. The scenario and key locations for experiments in Section 4.2.1.
Ijgi 09 00008 g015
Figure 16. The timeline of interactions—the case of no intermediate caches.
Figure 16. The timeline of interactions—the case of no intermediate caches.
Ijgi 09 00008 g016
Figure 17. The timeline of interactions—the case of full intermediate caches.
Figure 17. The timeline of interactions—the case of full intermediate caches.
Ijgi 09 00008 g017
Figure 18. The timeline of interactions—the case of partial intermediate caches.
Figure 18. The timeline of interactions—the case of partial intermediate caches.
Ijgi 09 00008 g018
Figure 19. The timeline of interactions—in the experiment on client visualization.
Figure 19. The timeline of interactions—in the experiment on client visualization.
Ijgi 09 00008 g019
Figure 20. Screenshots of the browser in validation of delay tolerant client visualization.
Figure 20. Screenshots of the browser in validation of delay tolerant client visualization.
Ijgi 09 00008 g020
Figure 21. The movement range of comprehensive scenario and one set of traces as an example.
Figure 21. The movement range of comprehensive scenario and one set of traces as an example.
Ijgi 09 00008 g021
Figure 22. The delivery ratio of experiments without intermediate caches.
Figure 22. The delivery ratio of experiments without intermediate caches.
Ijgi 09 00008 g022
Figure 23. The average delay of deliveries in experiments without intermediate caches.
Figure 23. The average delay of deliveries in experiments without intermediate caches.
Ijgi 09 00008 g023
Figure 24. The average hop of deliveries in experiments without intermediate caches.
Figure 24. The average hop of deliveries in experiments without intermediate caches.
Ijgi 09 00008 g024
Figure 25. The sources of content retrieval with cached nodes.
Figure 25. The sources of content retrieval with cached nodes.
Ijgi 09 00008 g025
Table 1. The statistics of map segmentation.
Table 1. The statistics of map segmentation.
LayerNumber of RegionsArea Size (km 2 )
subdistricts2910.238 ± 10.97
communities1551.965 ± 1.002
blocks4350.708 ± 0.882
Table 2. The movement pattern for experiments in Section 4.2.1.
Table 2. The movement pattern for experiments in Section 4.2.1.
NodeNode 1Node 2Node 3Node 4
Time
0–30 sStationary at AStationary at CStationary at CStationary at E
30–230 sStationary at AMoving from C towards BMoving from C towards DStationary at E
230–430 sStationary at AMoving from B towards CMoving from D towards CStationary at E
430–630 sStationary at AMoving from C towards BMoving from C towards DStationary at E
630–830 sStationary at AMoving from B towards CMoving from D towards CStationary at E
830–1030 sStationary at AMoving from C towards BMoving from C towards DStationary at E
Table 3. Summary of returned contents in validation of delay tolerant client visualization.
Table 3. Summary of returned contents in validation of delay tolerant client visualization.
BatchesReturn TimeRoute
#1about 10 minQuery: N 1 N 2
Response: N 2 N 1
#2about 65 minQuery: N 1 N 2 N 3
Response: N 3 N 2 N 1
#3about 115 minQuery: N 1 N 2 N 3 N 4 N 7
Response: N 7 N 4 N 5 N 6 N 1
Table 4. The cases with different conditions.
Table 4. The cases with different conditions.
Communication RangeWith Movement Knowledge at the Initial State
Case A300 mNo
Case B300 mYes
Case C600 mNo
Case D600 mYes

Share and Cite

MDPI and ACS Style

Li, C.; Lu, H.; Xiang, Y.; Gao, R. Geo-DMP: A DTN-Based Mobile Prototype for Geospatial Data Retrieval. ISPRS Int. J. Geo-Inf. 2020, 9, 8. https://doi.org/10.3390/ijgi9010008

AMA Style

Li C, Lu H, Xiang Y, Gao R. Geo-DMP: A DTN-Based Mobile Prototype for Geospatial Data Retrieval. ISPRS International Journal of Geo-Information. 2020; 9(1):8. https://doi.org/10.3390/ijgi9010008

Chicago/Turabian Style

Li, Chao, Huimei Lu, Yong Xiang, and Rui Gao. 2020. "Geo-DMP: A DTN-Based Mobile Prototype for Geospatial Data Retrieval" ISPRS International Journal of Geo-Information 9, no. 1: 8. https://doi.org/10.3390/ijgi9010008

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop