Evaluation and Innovation in Opportunistic Networks
Evaluation and Innovation in Opportunistic Networks
Loading...
Date
2011
Authors
Editors
Journal ISSN
Electronic ISSN
ISBN
Bibliographical data
Publisher
Series
URI (citable link)
International patent number
Link to the license
EU project number
Project
Reliable Opportunistic Mobile Networks
Open Access publication
Collections
Title in another language
Publication type
Dissertation
Publication status
Published in
Abstract
The presence of an increasing number of mobile devices has prompted the demand to use them for information dispersion through opportunistic networks, which they form coincidently due to their geographic location. Opportunistic networks pose several new challenges to the current transmission protocols as they are not only capable of store and forward routing, but also lack the offline routing capability, i.e. source and destination must be connected to the network simultaneously. We can find several opportunistic network protocols in literature, but neither a solid comparison nor a trusted baseline has been presented.
In this study, we have analyzed and evaluated eight existing routing algorithms on a common basis in an effort to grasp the strong and weak points of each of them and to see whether it is possible to design a hybrid technique that may take advantage of the strengths of several other techniques. We propose three important criticisms regarding the evaluation of existing routing algorithms.
1. Most evaluations restrict themselves to comparing against the two extremes, direct-contact forwarding and flooding.
2. Each attempt uses a completely different choice of scenario and simulation parameters.
3. Most attempts concentrate on methods to find a path to destination but the reliability of the path cannot be ensured in this paradigm.
The findings have revealed that almost all the techniques fail to perform under variable conditions, i.e. bandwidth hungry techniques failed to deliver when bot- tlenecks existed although, they outclassed every other technique where network had sufficient capacity. In contrast, techniques that required good network con- nectivity failed to perform in sparse network. As a result of our comparison of selected networks under a wide variety of realistic scenarios, we have not only been able to identify and describe favorable traits of protocols, but also neces- sary relationships of successful mobile opportunistic network protocols with QoS routing. This study defines a very light weight metric, which not only encapsu- lates the path bandwidth but also maintains a dynamic path ranking by degrading the path efficiency as it suffers from data load. Moreover, this study focuses on the routing algorithm Nile1 that has an adapting capability with the underlying network. It thereby maintains acceptable performance without exhausting the network resources keeping a check on the network “pulse”, i.e. bandwidth. Nile is a multi-path protocol that deploys replication based on heuristic for computing disjoint path . Flooding is considered to be a protocol that can deliver the best performance if its overhead is ignored. Therefore, it is customary to use flooding as a performance benchmark for opportunistic networks. We identify and describe the current sim- ulation practices that do not expose the shortcomings of flooding as an upper bound. We provide a step towards a routing benchmark, which is flexible, pro- vides results close to an upper bound, is simple to implement, and thus might be a candidate for a common benchmark. This new method called EPO2, does not suffer from bottlenecks that limit the performance of epidemic flooding, even when bandwidth is scarce. Our analysis shows that networks are not suffering congestion as suggested by flooding, giving a better insight in the underlying network.
Since most of the practical routing protocols rely on history to profile devices, these profiles are used to compute the routes in the network. We found that history is either not able to predict device behavior accurately or history looses the details about the device behavior due to aggregation of metrics. We have therefore analyzed opportunistic network with max-flow to see the throughput of the network. We afterwards compared the outcome of this max-flow with a modified max-flow that uses history for its throughput computations. We have found that it is not possible to obtain an accurate history based max-flow, since it is not easy to find the link in path that can be considered to be responsible if history gives an unreliable path.
In this study, we have analyzed and evaluated eight existing routing algorithms on a common basis in an effort to grasp the strong and weak points of each of them and to see whether it is possible to design a hybrid technique that may take advantage of the strengths of several other techniques. We propose three important criticisms regarding the evaluation of existing routing algorithms.
1. Most evaluations restrict themselves to comparing against the two extremes, direct-contact forwarding and flooding.
2. Each attempt uses a completely different choice of scenario and simulation parameters.
3. Most attempts concentrate on methods to find a path to destination but the reliability of the path cannot be ensured in this paradigm.
The findings have revealed that almost all the techniques fail to perform under variable conditions, i.e. bandwidth hungry techniques failed to deliver when bot- tlenecks existed although, they outclassed every other technique where network had sufficient capacity. In contrast, techniques that required good network con- nectivity failed to perform in sparse network. As a result of our comparison of selected networks under a wide variety of realistic scenarios, we have not only been able to identify and describe favorable traits of protocols, but also neces- sary relationships of successful mobile opportunistic network protocols with QoS routing. This study defines a very light weight metric, which not only encapsu- lates the path bandwidth but also maintains a dynamic path ranking by degrading the path efficiency as it suffers from data load. Moreover, this study focuses on the routing algorithm Nile1 that has an adapting capability with the underlying network. It thereby maintains acceptable performance without exhausting the network resources keeping a check on the network “pulse”, i.e. bandwidth. Nile is a multi-path protocol that deploys replication based on heuristic for computing disjoint path . Flooding is considered to be a protocol that can deliver the best performance if its overhead is ignored. Therefore, it is customary to use flooding as a performance benchmark for opportunistic networks. We identify and describe the current sim- ulation practices that do not expose the shortcomings of flooding as an upper bound. We provide a step towards a routing benchmark, which is flexible, pro- vides results close to an upper bound, is simple to implement, and thus might be a candidate for a common benchmark. This new method called EPO2, does not suffer from bottlenecks that limit the performance of epidemic flooding, even when bandwidth is scarce. Our analysis shows that networks are not suffering congestion as suggested by flooding, giving a better insight in the underlying network.
Since most of the practical routing protocols rely on history to profile devices, these profiles are used to compute the routes in the network. We found that history is either not able to predict device behavior accurately or history looses the details about the device behavior due to aggregation of metrics. We have therefore analyzed opportunistic network with max-flow to see the throughput of the network. We afterwards compared the outcome of this max-flow with a modified max-flow that uses history for its throughput computations. We have found that it is not possible to obtain an accurate history based max-flow, since it is not easy to find the link in path that can be considered to be responsible if history gives an unreliable path.
Summary in another language
Subject (DDC)
004 Computer Science
Keywords
Conference
Review
undefined / . - undefined, undefined. - (undefined; undefined)
Cite This
ISO 690
ISLAM, Muhammad Arshad, 2011. Evaluation and Innovation in Opportunistic Networks [Dissertation]. Konstanz: University of KonstanzBibTex
@phdthesis{Islam2011Evalu-12967, year={2011}, title={Evaluation and Innovation in Opportunistic Networks}, author={Islam, Muhammad Arshad}, address={Konstanz}, school={Universität Konstanz} }
RDF
<rdf:RDF xmlns:dcterms="http://purl.org/dc/terms/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:bibo="http://purl.org/ontology/bibo/" xmlns:dspace="http://digital-repositories.org/ontologies/dspace/0.1.0#" xmlns:foaf="http://xmlns.com/foaf/0.1/" xmlns:void="http://rdfs.org/ns/void#" xmlns:xsd="http://www.w3.org/2001/XMLSchema#" > <rdf:Description rdf:about="https://kops.uni-konstanz.de/server/rdf/resource/123456789/12967"> <bibo:uri rdf:resource="http://kops.uni-konstanz.de/handle/123456789/12967"/> <dc:creator>Islam, Muhammad Arshad</dc:creator> <dc:language>eng</dc:language> <dcterms:title>Evaluation and Innovation in Opportunistic Networks</dcterms:title> <dcterms:hasPart rdf:resource="https://kops.uni-konstanz.de/bitstream/123456789/12967/2/ThesisIslam_MuhammadA.pdf"/> <dcterms:rights rdf:resource="https://rightsstatements.org/page/InC/1.0/"/> <dspace:isPartOfCollection rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/> <foaf:homepage rdf:resource="http://localhost:8080/"/> <dc:rights>terms-of-use</dc:rights> <dcterms:isPartOf rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/> <dc:contributor>Islam, Muhammad Arshad</dc:contributor> <void:sparqlEndpoint rdf:resource="http://localhost/fuseki/dspace/sparql"/> <dcterms:issued>2011</dcterms:issued> <dcterms:available rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2011-05-12T07:12:39Z</dcterms:available> <dc:date rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2011-05-12T07:12:39Z</dc:date> <dcterms:abstract xml:lang="eng">The presence of an increasing number of mobile devices has prompted the demand to use them for information dispersion through opportunistic networks, which they form coincidently due to their geographic location. Opportunistic networks pose several new challenges to the current transmission protocols as they are not only capable of store and forward routing, but also lack the offline routing capability, i.e. source and destination must be connected to the network simultaneously. We can find several opportunistic network protocols in literature, but neither a solid comparison nor a trusted baseline has been presented.<br />In this study, we have analyzed and evaluated eight existing routing algorithms on a common basis in an effort to grasp the strong and weak points of each of them and to see whether it is possible to design a hybrid technique that may take advantage of the strengths of several other techniques. We propose three important criticisms regarding the evaluation of existing routing algorithms.<br />1. Most evaluations restrict themselves to comparing against the two extremes, direct-contact forwarding and flooding.<br />2. Each attempt uses a completely different choice of scenario and simulation parameters.<br />3. Most attempts concentrate on methods to find a path to destination but the reliability of the path cannot be ensured in this paradigm.<br />The findings have revealed that almost all the techniques fail to perform under variable conditions, i.e. bandwidth hungry techniques failed to deliver when bot- tlenecks existed although, they outclassed every other technique where network had sufficient capacity. In contrast, techniques that required good network con- nectivity failed to perform in sparse network. As a result of our comparison of selected networks under a wide variety of realistic scenarios, we have not only been able to identify and describe favorable traits of protocols, but also neces- sary relationships of successful mobile opportunistic network protocols with QoS routing. This study defines a very light weight metric, which not only encapsu- lates the path bandwidth but also maintains a dynamic path ranking by degrading the path efficiency as it suffers from data load. Moreover, this study focuses on the routing algorithm Nile1 that has an adapting capability with the underlying network. It thereby maintains acceptable performance without exhausting the network resources keeping a check on the network “pulse”, i.e. bandwidth. Nile is a multi-path protocol that deploys replication based on heuristic for computing disjoint path . Flooding is considered to be a protocol that can deliver the best performance if its overhead is ignored. Therefore, it is customary to use flooding as a performance benchmark for opportunistic networks. We identify and describe the current sim- ulation practices that do not expose the shortcomings of flooding as an upper bound. We provide a step towards a routing benchmark, which is flexible, pro- vides results close to an upper bound, is simple to implement, and thus might be a candidate for a common benchmark. This new method called EPO2, does not suffer from bottlenecks that limit the performance of epidemic flooding, even when bandwidth is scarce. Our analysis shows that networks are not suffering congestion as suggested by flooding, giving a better insight in the underlying network.<br />Since most of the practical routing protocols rely on history to profile devices, these profiles are used to compute the routes in the network. We found that history is either not able to predict device behavior accurately or history looses the details about the device behavior due to aggregation of metrics. We have therefore analyzed opportunistic network with max-flow to see the throughput of the network. We afterwards compared the outcome of this max-flow with a modified max-flow that uses history for its throughput computations. We have found that it is not possible to obtain an accurate history based max-flow, since it is not easy to find the link in path that can be considered to be responsible if history gives an unreliable path.</dcterms:abstract> <dspace:hasBitstream rdf:resource="https://kops.uni-konstanz.de/bitstream/123456789/12967/2/ThesisIslam_MuhammadA.pdf"/> </rdf:Description> </rdf:RDF>
Internal note
xmlui.Submission.submit.DescribeStep.inputForms.label.kops_note_fromSubmitter
Examination date of dissertation
March 30, 2011
Method of financing
Comment on publication
Alliance license
Corresponding Authors der Uni Konstanz vorhanden
International Co-Authors
Bibliography of Konstanz
Yes