SpringerOpen Newsletter

Receive periodic news and updates relating to SpringerOpen.

Open Access Highly Accessed Research

Delay tolerant firework routing: a geographic routing protocol for wireless delay tolerant networks

Anna Sidera1* and Stavros Toumpis2

Author Affiliations

1 Department of Electrical and Computer Engineering, 75 Kallipoleos Avenue, 1678 Nicosia, Cyprus

2 Department of Informatics, Athens University of Economics and Business, 76 Patision Avenue, 10434 Athens, Greece

For all author emails, please log on.

EURASIP Journal on Wireless Communications and Networking 2013, 2013:23  doi:10.1186/1687-1499-2013-23

The electronic version of this article is the complete one and can be found online at: http://jwcn.eurasipjournals.com/content/2013/1/23


Received:23 October 2011
Accepted:7 January 2013
Published:7 February 2013

© 2013 Sidera and Toumpis; licensee Springer.

This is an Open Access article distributed under the terms of the Creative Commons Attribution License ( http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract

We present the Delay Tolerant Firework Routing (DTFR) protocol, a protocol designed for use in disconnected Delay Tolerant Networks (DTNs) that consist of a very large number of location-aware, highly mobile nodes. Networks with these properties appear frequently in many settings, notably in vehicular networks. Under DTFR, each data packet travels from the source to the estimated location of the destination using high-priority transmissions and a delay-tolerant variant of geographic forwarding. Once there, a number of packet replicas are created, and the replicas proceed to travel through the area where the destination is expected to be. Using simulations in an urban setting, we compare DTFR with two baseline protocols (Flooding and Spray and Wait), one recently proposed state-of-the-art protocol (GeoDTN+Nav), and an idealistic protocol of our design which we term Bethlehem Routing (BR). For a wide range of environmental parameters, DTFR performs significantly better than the other realistic protocols, in terms of throughput and delay, and close to the upper performance bounds of BR. We also develop an analytical framework based on stochastic geometry tools, a number of simplifying assumptions, and a small number of judiciously chosen approximations. Using this framework, we develop approximate closed form expressions for the average end-to-end throughput and delivery delay of DTFR and BR.

1 Introduction

In Delay Tolerant Networks (DTNs), the delay in the delivery of the data is much larger than typically expected, and in fact it is comparable to the time it takes the topology to change. A number of DTN applications have recently been proposed in various wireless settings [1,2] and the Internet [3]. Furthermore, a number of theoretical studies have shown that a tradeoff exists between the packet delay and the throughput [4,5]. A significant amount of work has also been devoted to the design of practical routing protocols [6-8].

In this study, we present Delay Tolerant Firework Routing (DTFR), a protocol for performing routing in DTNs. DTFR is designed for use in networks where the number of nodes is very large (in the orders of thousands and tens of thousands) and where nodes move with large speeds. It requires that nodes are capable of knowing their location, and the location of their destinations (possibly with an error) through the combined use of GPS receivers (or a similar technology) and a location service. DTFR is superior to other protocols we compare it with when the network is disconnected but not very sparse. A notable domain where all these assumptions frequently hold is vehicular ad hoc networks (VANETs) [9-11].

Broadly speaking, DTFR works as follows: When a packet is created, the source uses information about the location of its destination, provided from a location service and/or previously received data packets, to create an estimate about the destination’s current location, which we call the Firework Center (FC). The source sends a single copy of the packet to the FC, using high-priority transmissions and a novel delay-tolerant geographic forwarding rule, which we term Greedy Lazy Forwarding (GLF). Under GLF, if the current holder of a packet sees another node closer to the destination, it forwards the packet to that node, otherwise the current holder takes no action, and just waits for one such node to appear. Once the packet arrives at the FC, a number of replicas are created, which proceed to propagate in various directions, again using GLF, systematically covering the area where the destination might be.

In Figure 1, we plot an example trajectory of a packet while it is traveling to the FC, and the trajectories of the replicas created after the FC is reached. In the figure, we have denoted a transmission from a transmitter to a receiver with a line segment connecting their two locations. Observe that the line segments do not form a continuous trajectory; rather, the trajectory appears disconnected. Such disconnections are due to the fact that, under GLF, nodes do not have to transmit immediately a packet they receive. Therefore, such disconnections represent extended sojourns of the packet at a node while the packet waits for a suitable relay to appear. Observe that, collectively, these trajectories trace a pattern similar to the pattern created by a ‘palm tree’ firework [12], hence the name of our protocol.

thumbnailFigure 1. Example trajectory of a packet and its replicas, being routed with DTFR. The source is outside the figure.

The remainder of this study is organized as follows: in Section 2, we discuss DTN and VANET protocols related to this study. In Section 3, we discuss our basic assumptions on the network. In Section 4, we present the DTFR protocol in detail. Section 5 focuses on the performance evaluation of DTFR by simulation, and its comparison with two baseline protocols [Spray and Wait (SW) [7] and Flooding], a state-of-the-art protocol (GeoDTN+Nav [11]), and Bethlehem Routing (BR), an idealized protocol of our own design. In Section 6, we provide approximate closed form expressions for the average throughput and delay under DTFR and BR. We conclude in Section 7. The more technical parts of the analysis are placed in the Appendix.

2 Related work

In [7], the Spray and Wait (SW) protocol is proposed. SW consists of two phases. In the Spray Phase, the source distributes L copies to L distinct relays. In the Wait Phase, the relays move around the network, until eventually one of them meets the destination and hands over its replica of the packet. Our protocol also employs replicas, however, here, the replicas are created not at the location of the source, but at a location estimated to be close to the destination, in order to conserve bandwidth. In addition, nodes make use of geographic information.

The Mobility-centric approach for Data Dissemination in Vehicular networks (MDDV) protocol [13] is based on two phases. During the Forwarding Phase, the message travels to the destination region, and then, in the Propagating Phase, it is distributed to all nodes there. In the Forwarding Phase, a group of nodes are forwarding the message along a trajectory consisting of road segments chosen by the protocol. The group consists of the nodes that estimate that they are near the message head which is the node closest to the destination region along the trajectory. The members of the group change as the message propagates or the vehicles move. Nodes estimate the position of the message head based on information that is inserted in the copies of the packet, by nodes that estimate they might be the message head. In DTFR, the packet also travels to the location of the destination, during a Homing Phase, but using GLF and high-priority transmissions. In addition, during the Homing Phase, there is only a single copy of the packet at any time, and if the node that has that copy moves away from the FC, it still has to forward the copy. Finally, our use of replicas is more efficient than the Propagating Phase of MDDV, which distributes the packet to all nodes in the destination region.

Greedy Perimeter Stateless Routing (GPSR) [14] uses a combination of greedy forwarding on the full network graph and perimeter forwarding on a planarized network graph, i.e., a subgraph of the original graph with no crossing links. Initially, the packet is forwarded on the full network graph using the greedy mode; if, at some point, there is no neighbor closer to the destination than the node holding the packet, the packet enters the perimeter mode, traversing the faces of the planarized network graph using the right-hand rule [14]. If the packet, while in perimeter mode, reaches a node closer to the destination than the point at which the packet entered the perimeter mode, the packet switches back to the greedy mode.

Lochert et al. [9] propose Greedy Perimeter Coordinator Routing (GPCR), a protocol designed for use in vehicular networks. GPCR is based on the observation that the road network creates a naturally planar graph that can be exploited for communication purposes. Both greedy routing and perimeter routing are executed using that graph. However, GPCR suffers from the problem that when there is no node at a junction, packets will be forwarded across that junction, and this might lead to a routing loop.

To alleviate this problem, the GeoCross protocol is introduced in [10]. GeoCross is similar in its operation to GPCR, but its perimeter mode is enhanced and capable of detecting and removing crossing links and creating a planar graph.

GeoDTN+Nav[11] consists of the greedy and perimeter modes of GeoCross and a third mode, termed the DTN mode, which can deliver packets even in the absence of end-to-end routes. In GeoDTN+Nav, packets are first forwarded using the greedy mode and, when this fails, using the perimeter mode. If the perimeter mode also fails, the protocol finally switches to the DTN mode and relies on mobility to deliver packets. To decide when to switch to the DTN mode, a node uses a cost function related to network partition detection and to the navigation information of its neighbors. When a packet is in the DTN mode, it returns to the greedy mode whenever it encounters a node that is closer to the expected location of the destination than the point where the perimeter mode started.

DTFR and GeoDTN+Nav are related, as they both employ a geographic routing mode and a DTN mode. However, they have a number of key differences. First, GeoDTN+Nav makes use of a perimeter mode, which DTFR avoids, in order to conserve bandwidth, and in order to avoid the routing loops associated with running a perimeter mode in a network of highly mobile nodes. Second, GeoDTN+Nav was designed without taking into account links between nodes that are not on the same road and so makes no use of potentially useful links between nodes lying on different roads. Third, in GeoDTN+Nav, the packet only travels to the expected destination position inserted in the packet by the source, whereas, in DTFR, if the destination is not found when the packet reaches its expected position, replicas are employed to find it. Also, the rules for entering the greedy mode from other modes are different. Finally, DTFR uses a set of priority rules for gaining access to the medium. As we show in the simulation section, all these differences lead to significant deviations in the performance of the two protocols.

More recently, in [15], Location-Aided ROuting for DTNs (LAROD) has been proposed. Like DTFR, LAROD makes use of a delay tolerant geographic routing protocol. In particular, each node carrying a packet (termed a custodian) periodically broadcasts it to its neighborhood. Nodes closer to the destination that overhear the transmission set up a timer that depends on their location. After its timer expires, a node broadcasts a reply informing its own neighborhood that it is the new custodian. If the original custodian, or a node that received the packet and waits for its timer to expire, listens to a reply from a node in its neighborhood announcing that it is the new custodian, it discards the packet. This algorithm is related but different from our GLF algorithm, notably allowing the packet to be propagated along multiple paths. Another fundamental difference between LAROD and DTFR is that DTFR creates multiple replicas once the FC is reached. This makes DTFR more robust to destination localization errors.

We note that the term ‘Firework’ has also been used in Peer-to-Peer Networking [16,17] where a content-based ‘Firework Query Model’ is proposed. Also, in [18] a multicast protocol called ‘Fireworks Routing’ is presented, for use in a general, non-DTN, multicast wireless ad hoc setting. This protocol organizes multicast group members into cohorts. One group member in each cohort is selected to be a cohort leader. Cohort leaders establish a sparse multicast tree among themselves and the source and they use broadcasting to deliver the packets to other group members in their cohort. Although Fireworks Routing and DTFR have a number of similarities, they also have key differences. DTFR applies a delay tolerant version of geographic routing, avoids broadcasting in order to conserve bandwidth, and prioritizes transmissions. Also, in DTFR no multicast structure is maintained and the packet is not given to nodes near a cohort leader but to nodes in a geographic region where the destination is estimated to be. As the works in [16-18] appear in very different contexts, a meaningful comparison with them is not possible.

We note that a preliminary version of this study appeared, in conference version, in [19]. With respect to [19], this study introduces the analytical framework of Section 6 and a larger set of simulation results.

3 Basic network assumptions

In this section, we outline our fundamental assumptions on the network. Although these assumptions are satisfied in a variety of settings, a good example are large vehicular DTNs [11,20].

3.1 Nodes

We assume a very large number of nodes, on the orders of thousands and tens of thousands. We assume that the nodes move in a region independently of each other, and independently of their communication needs, with potentially very high speed. These assumptions imply that any protocol used must be scalable and robust, and preclude, for example, proactive routing, as well as the use of mechanisms that are sensitive to frequent topology changes, such as perimeter routing [14].

3.2 Communication needs

Nodes are executing one or more applications that depend on the communication between node pairs. (One member of the pair could be an Access Point, or similar entity, communicating with multiple nodes.) The application(s) running at each node are delay tolerant; however, there is a maximum acceptable delay for the delivery of the packets.

3.3 Localization

Each node is capable of knowing its own location, either directly (e.g., through GPS) or indirectly (e.g., using beacons). We assume that there is a mechanism available to the nodes that provides the location of their destination, possibly with error. The design of such a mechanism is of great practical interest, but, as the issues of routing and localization are not tightly related, we choose to focus only on the issue of routing. However, we do take into account the fact that localization information may have errors, and any routing algorithm should be robust with respect to these.

3.4 Neighborhood awareness

Each node is aware of the network topology in its local neighborhood. At the very least, this means that the node is aware of all nodes close enough for direct communication with them to be possible. In the more general case, each node might also have location information about some of the nodes a small number of hops away. Neighborhood awareness is achieved through the use of eavesdropping packets and/or beaconing [21].

3.5 Connectivity level

In [22], wireless ad hoc networks are classified in four categories: (i) end-to-end paths exist almost always, (ii) end-to-end paths exist for some fraction of the time, (iii) the network is always partitioned, (iv) multi-hop paths are rare. DTFR is designed for use in categories (ii) and (iii) of the above classification.

To clarify this point, Figure 2 shows simulation results for networks of 10,000 and 100,000 nodes. The nodes are placed randomly, according to the uniform distribution, on a square area. Nodes that are separated by a distance of at most R can communicate directly with each other. The nodes are divided randomly and uniformly in pairs and each node is the destination for the packets of its counterpart. In the figure, we plot the average Reachability, which is defined as the proportion of nodes that have a path to their destination, versus the expected node degree. (We trace different values of the expected node degree by varying the communication range R.) As the figure shows, for values of the average node degree below a threshold, an end-to-end path to the destination does not always exist. Therefore, traditional ad hoc routing protocols such as greedy-face-greedy protocols [14] are not suitable and DTN solutions are needed. We will show that for a large range of average node degrees at this case, for some values of the maximum acceptable delay for the delivery of the packets, DTFR performs better than SW and the other protocols we simulate.

thumbnailFigure 2. Reachability versus node degree.

4 The DTFR protocol

The DTFR protocol consists of four mechanisms: (1) a Dissemination Rule, responsible for disseminating a number of replicas in the vicinity of the destination, (2) a forwarding rule, responsible for node-to-node packet forwarding, which we term Greedy Lasy Forwarding (GLF), (3) a Priorities Policy, for assigning priorities to nodes contending for access to the wireless medium, and (4) a Buffer Policy. We now discuss each of these. We stress that some implementation details of these mechanisms will depend on the details of the application, and so are left undefined here.

4.1 Dissemination rule

The dissemination rule of DTFR consists of four phases:

1. Homing Phase: The packet travels to a point called the Firework Center (FC), at the center of a region where the source estimates the destination to be.

2. Explosion Phase: Then, the packet is replicated and given to L relays.

3. Spread Phase: Then, the packet replicas travel, using GLF, to L different points called the Firework Endpoints (FEs), that are symmetrically placed around the FC, at a distance D from it. Once there, the replicas are discarded. The distance D is chosen to be such that the destination will be between the FC and the FEs with high probability.

4. Lock Phase: At any time during the first three phases, if a packet comes near enough to the destination to discover a multihop route, it enters the Lock Phase wherein it is forwarded to the destination using that route, in the usual, non-DTN manner.

4.2 Greedy Lazy Forwarding (GLF)

GLF is used in the Homing and Spread phases, when packets travel toward the FC and FEs, respectively. Consider a node A holding a packet P, destined for some distant location D. Let the forwarding areaF be the set of points closer to the destination D than point A, and also with a distance of at most R from A. (Note that when D is far away from A, F becomes a semicircle.) Node A uses the following rule for choosing the next relay of P:

1. (Greedy part) If there is at least one node within F, then A forwards the packet to one of the nodes in F. (Details of the choice are left to the particular implementation.)

2. (Lazy part) If there is no node within F, then A waits until a node appears on the boundary of F, and then immediately sends the packet to that node.

This rule is being executed continuously: when a packet arrives at a node, the node checks the appropriate forwarding area for potential relays. If the area contains one or more nodes, the packet gets forwarded to one them. Otherwise, the packet waits for one such node to appear. Observe that, as with all other geographic routing protocols, our forwarding protocol is greedy, in the sense that it provides an immediate improvement if this is possible. However, in contrast to them, it is also lazy: upon failure to achieve an immediate improvement, it just waits for the topology to get better.

4.3 Firework center and firework edges calculation

The locations of the FC and the FE are specified by the packet source when the packet is created, and inserted to the packet’s header.

As with other aspects of DTFR, the precise method for calculating the FC depends on the details of the environment and the application, and notably the localization mechanism that is assumed to exist (see Section 3). The overriding principle is that the FC should be as close as possible to the destination, when the packet arrives at the FC. Therefore, if the localization mechanism provides to the packet source an estimate of the location of the destination at a recent time instant, then this estimate should be used as an FC. If, however, the localization mechanism also provides estimates of the location of the destination at future instances (e.g., by revealing the route of the destination and its basic travel characteristics), then the FC can be selected so that it approximately intercepts the destination some time in the future [23]. If the source and destination participate in a regular exchange of packets, then they can provide to each other all the information about their location and future trajectory that is available to them.

The L FEs are placed uniformly on the circumference of a circle of radius D centered at the FC. D is selected to be, with a high degree of confidence, large enough so that one of the replicas will have the opportunity to overtake the destination. Clearly, the larger D is selected, the larger L should also be, in order for the circular region bounded by the FEs to be covered adequately. Note that using excessively large values for L and D means that bandwidth will be wasted. The precise rule for selecting the values of L and D will depend on the environment, and notably on the mobility model, and so is omitted here.

4.4 Priorities policy

In order to access the medium, packets are given different priorities, depending on the phase they are in. Lock Phase transmissions have priority over transmissions of all other phases. This is because when a packet goes near its destination we do not want to loose the opportunity to deliver it, given the changing topology. Homing Phase transmissions have priority over Spread Phase transmissions and Explosion Phase transmissions, as we do not want to delay the only copy of a packet from reaching the FC and so delay the search in the whole region near its destination. Explosion Phase transmissions have priority over Spread Phase transmissions, as we want to create all replicas quickly.

4.5 Buffer policy

The buffer of each node has a finite size B. Once a buffer is full, the node cannot receive any packet unless it is destined for that node, and must discard the packets its user creates. Packets are discarded when they reach the FEs. Also, the packets have a time-to-live (TTL) equal to the maximum acceptable delay for the delivery of the packets.

4.6 Bethlehem routing

Under Bethlehem Routing (BR), each packet is continuously aware of the location of its destination, and moves towards it by continuously staying in the Homing Phase with the actual location of the destination chosen as the FC. Once near enough to the destination to discover a route, the packet will enter the Lock Phase. Excluding this (crucial) modification, BR is identical to DTFR. Clearly, BR can only work when a fast location service is available to the system. In relatively small networks, such a location service has been shown to exist: Kuiper and Nadjm-Tehrani [15] found no significant difference between an oracle location service and the practical location service LoDiS introduced there, for networks with approximately 100 nodes. This indicates that BR might be a practical and better routing protocol than DTFR, when the number of nodes is on that order. Note, however, that networks with 10,000 nodes are within the scope of this study, and the performance of BR we report here, for networks of this size, should be viewed as an upper bound only.

5 Simulations

5.1 Simulations tool

In order to evaluate our protocol, we have developed Very Large DTN Simulator (VL-DTN-S), a simulation tool specifically designed for DTNs, and written in C. The tool is available online [24].

We have refrained from using NS-3 [25], OMNeT++ [26], or a similar general purpose simulation tool, because such tools were designed for routing in traditional networks and so are not best adapted to the unique challenges appearing in DTNs (e.g., the need for very large buffers), particularly in the case where there are many thousands of nodes. We also refrained from using ONE [27], DTNSim2, or any other JAVA-based DTN simulation tool, as the use of JAVA necessarily slows down the execution of the simulation when the number of nodes is very large. Discussions on the relative merits of the various simulators for use in DTN environments can be found in [27,28], and references therein.

Efforts have been made to make VL-DTN-S as accurate as possible. Among others, (i) full buffer information for all nodes is kept, (ii) realistic physical layers are used, and (iii) contention in the channel is taken into account. At the same time, efforts have been made so that the simulator is as fast as possible and, as a result, the tool is capable of detailed simulations of networks of more than 104 nodes on a desktop computer, and for a variety of routing protocols. Challenging simulations with 104 nodes take at most a few hours.

5.2 Simulation setting

5.2.1 Mobility model

Nodes move on a square grid composed of vertical and horizontal roads. Initially, each node is placed at random on the grid, and then proceeds to travel, using the road network, to a randomly chosen location, using a constant speed, uniformly distributed between 0 and vmax. Then, it chooses another random location, and another speed, moves to that location, and so on.

5.2.2 Traffic pattern

All nodes are divided in pairs, each node communicating with its counterpart. Pairs do not change for the whole duration of the simulation.

5.2.3 Channel model

We assume an urban environment where both Line Of Sight (LOS) and Non-LOS (NLOS) communication are possible, however the power of signals received through a LOS attenuates slower with distance. In particular, LOS communication is only possible between nodes lying on the same road. However, if a node is within a threshold distance RT from the intersection between two roads, we assume that this node belongs to both roads. (RT is essentially the radius of the junction.)

In the case of LOS transmissions, the signal power Pr received at distance d from a transmitter is

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M1','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M1">View MathML</a>

and, for NLOS transmissions,

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M2','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M2">View MathML</a>

where P0 is the received power at a small reference distance d0 from the transmitter and αLOS and αNLOS are exponents that describe the environment, typically 2–6 [29], with αLOS < αNLOS, so that NLOS signals attenuate faster.

5.2.4 Transmitter model

While transmitting, a node cannot listen to the transmissions of other nodes. If node k is not a transmitter, a packet from node i is received successfully at node k if

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M3','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M3">View MathML</a>

(1)

where N is the background noise, γT is the minimum Signal-to-Interference plus Noise Ratio (SINR) required at the receiver, Pjk is the received power at node k from node j, and S is the set of all transmitters.

5.2.5 Slotted time

We slot time, and at the start of each timeslot each node creates a packet with a predefined probability λ. The packet is immediately stored in the buffer if it is not full. The transmission of each packet takes one timeslot. Timeslots are assumed to be so short, that the topology cannot change appreciably for a timeslot duration, and hence channel gains are constant throughout each of them. As the networks we simulate have many thousands of node, for such a slotted system to work it is necessary to employ GPS receivers or, alternatively, a sophisticated distributed clock synchronization system [30]. Further discussion on this topic goes beyond the scope of this study.

5.2.6 Medium Access Control

At the start of each slot, nodes employ a MAC scheme to decide who will transmit at that slot, what packet, and to whom. At any given time during the execution of this scheme, the state of a node can be either available or reserved. At the start of the slot, all nodes are available, but progressively attempt to make reservations, according to their priorities (see Section 4.4). For a node A to be able to send a packet to another node B, both A and B must not be reserved. If this is the case, nodes A, B and all the nodes within distance K · dAB from A or B become reserved. K is a constant greater than 1, which we term the Reservation Radius Constant. As we are not interested in the evaluation of the MAC layer, we assume that the reservations are all arranged instantaneously, at the start of each slot, and no MAC control messages are simulated. As our focus is on routing, we refrain from using a more detailed MAC protocol. We note, however, that our MAC protocol allows the use of priorities and realistically captures the capabilities of the wireless channel, notably modeling congestion.

5.2.7 Power control

If node A has decided to transmit a packet to another node B, A uses a power level Pt such that the transmission will be successful if the interference from competing transmissions turns out to be at most (If − 1) times the thermal noise, where If is a constant we call the Power Control Safety Margin. Also, there is a maximum allowed transmission power P0max.

5.2.8 Local routing table

As already discussed, nodes maintain a routing table that can be used for routing in their immediate neighborhood. To conserve bandwidth and improve robustness, nodes do not use local routes that minimize the number of hops. Rather, a link cost is introduced, and nodes try to use paths with minimum total link cost. In particular, each LOS transmission from a node A to another node B is associated with a cost <a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M4','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M4">View MathML</a>, where dAB is the distance between nodes A and B. Each NLOS transmission is associated with a cost <a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M5','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M5">View MathML</a>. The routing table includes destinations for which there is a path with total link cost at most equal to a threshold value CT, which we term the Local Routing Threshold.

We do not simulate control messages for the creation of the local routing table. Therefore, interference experienced by data packets comes only from data packets. We believe that, as we are interested in the more challenging case of communication across large distances, these assumptions, that essentially remove local routing issues from the picture, are justified.

5.2.9 Firework Center

In the case of DTFR, GeoDTN+Nav, and GeoCross, we assume that when a packet is created the source is informed of the location of its destination and uses that as the FC. Unless stated otherwise, we assume that this location is reported with no error.

5.2.10 Routing protocols

We simulate DTFR, BR, GeoDTN+Nav, GeoCross, SW, and Flooding. We also simulate a protocol that we call Bethlehem GeoDTN+Nav (BetGeo), which is identical to GeoDTN+Nav except from one point: whenever a routing decision is made that involves the location of the destination, instead of using the position that the destination occupied at the time of the packet’s creation, its current position is used. As with the Bethlehem protocol, this is an idealization, however the performance of this protocol allows us to evaluate the cost on the performance of GeoDTN+Nav of using location information that is not current. Under the flooding protocol, each node sends copies of all packets it has in its buffer to all nodes it meets, and all transmissions have the same priority.

In our implementation of SW, and in order to have a more fair comparison to DTFR, nodes make use of the local routing table. Lock Phase transmissions have priority over Spray Phase transmissions.

In our implementation of GeoCross and GeoDTN+Nav, nodes are given access to the local routing table. Lock Phase transmissions have priority over all other transmissions. Greedy mode transmissions, perimeter mode transmissions, and DTN mode transmissions are equal in priority, but transmissions from junction nodes have priority over transmissions from street nodes.

Unless otherwise stated in each particular case, the parameters used are those of Table 1. For each point in the plots, we simulate each protocol for different values of its various parameters, and select the values that produce the best results. The results shown are for the steady state of the simulation. We also run the mobility model until it reaches its steady state, before starting creating packets.

Table 1. Default simulation parameters

5.3 Results

In Figure 3a, we show the packet delivery ratio versus the packet arrival rate for all protocols. Even with very small arrival rates, no protocol manages to deliver all packets within the TTL. This is due to the fact that the network is often partitioned for periods of time comparable to or larger than the TTL. In addition, quite often the network is not partitioned but bottlenecks are formed due to the topology, leading to queueing delays.

thumbnailFigure 3. Comparison of DTFR with other protocols. The legend of Plot (c) applies to all plots. Therefore, for example, the + marker denotes the Flooding protocol in all six plots.

Observe that the delivery rate of GeoDTN+Nav is significantly smaller than the delivery rate of DTFR. There is a number of reasons for this. First of all, DTFR uses the Explosion, Spread, and Lock Phases to counter the fact that the destination is moving. No similar mechanisms exist in GeoDTN+Nav. (Note, however, that even with Bethlehem GeoDTN+Nav, where GeoDTN+Nav is enhanced so that the packets have continuous perfect knowledge of the position of their destination, the delivery ratio improves modestly over GeoDTN+Nav.) Second, under GeoDTN+Nav it is possible that packets leave the perimeter mode and enter the DTN mode at a node that is further away from the destination than the node they were when they entered the perimeter mode. In between, they were transmitted multiple times, wasting precious bandwidth in the process. DTFR, on the other hand, never transmits a packet away from the destination. Third, under GeoDTN+Nav packets stay in the DTN mode even when there are neighbors of the current holder closer to the destination, because their distance to the destination is greater than the distance between the destination and the point where the packet entered the perimeter mode. Under DTFR, on the other hand, nodes always send packets to neighbors closer to the destination than themselves.

In Figure 3b, we show the packet delivery ratio versus the network size. We change the network size by changing the number of nodes and the dimensions of the area, keeping the number of nodes per unit road length constant. Note that the performance of all protocols diminishes with the network size. This is due to the facts that the TTL counter remains fixed, that with larger network sizes partitions are more frequent, and that with larger network sizes more bandwidth is consumed for the transmission of each packet.

In Figure 3c, we show the packet delivery ratio versus the transmission range. We change the transmission range by changing the value of <a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M7','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M7">View MathML</a>. All protocols gain by an increase in the transmission range; however, the two protocols that do not depend on the fast forwarding of the packets to the area where the destination is expected, SW and Flooding, benefit the least. On the other hand, SW is slightly superior to the rest (except Flooding) in the case of small transmission ranges. The performance of GeoCross and GeoDTN+Nav increases fast as the transmission range increases, because the perimeter mode becomes more efficient for larger transmission ranges.

In Figure 3d, we show the packet delivery ratio versus the maximum speed of the nodes. For high speeds, SW gives good performance. Clearly, when the node mobility is too high, the best strategy for the source is to get out as many replicas as possible. Also observe that, in the other extreme, when nodes are immobile, GeoCross gives better results than DTFR. This is expected: when a packet reaches a local optimum, and nodes are immobile, waiting is futile, and the only alternative is going into perimeter mode. However, for all the cases in the middle, DTFR is surpassed only by BR. Note that to obtain the points in Figure 3d for 0 velocity, we averaged multiple runs of the simulation, each of them for a different network topology chosen randomly from steady state topologies.

In our simulations, we place the FC at the location of the destination at the time of the creation of the packet. By the time the packet arrives at the FC, the destination has moved away. In order to keep packet losses at small levels, it is important that the distance D between the FC and the FEs is large enough. In Figure 4, we plot the empirical cumulative distribution function of the distance x between the FC and the destination at the time of the arrival of a packet at the FC. The plot was created using a simulation with the parameters of Table 1 and 104 packets. Packets that entered the Lock Phase or expired before arriving at the FC were disregarded. The average distance is a little over 200 m, and the distance is less than 1000 m for around 95% of the packets. Most importantly, the distribution of the distance had a very thin tail, which means that D does not have to be set excessively large to accommodate a wide range of distances x. In this simulation, the number of FEs was 16, and they were placed 2000 m from the FC.

thumbnailFigure 4. Empirical Cumulative Distribution Function of the distance between the FC and the destination at the time of the arrival of the packet at the FC.

Until now, we have assumed that the source obtains the exact location (x0,y0) of the destination at the time the packet is created using a location service, and inserts that location in the packet. Assume now that the X and Y coordinates inserted in the packet by the source are uniformly distributed in the intervals [x0 E,x0 + E] and [y0 E,y0 + E], respectively, where E is called the Maximum Location Error. The performance metrics as a function of E are shown in Figure 5. Note that the performance of all protocols using the location of the destination decreases as E increases, but the performance of DTFR is superior to that of the others even for large values of E.

thumbnailFigure 5. Performance versus maximum location error. The legend of Figure 3c applies. Therefore, for example, the + marker denotes the Flooding Protocol.

We also simulated GeoCross using the parameters of Table 1 but with a very low arrival rate of 10−4 packets/s/node, immobile nodes, and a very large number of permitted hops in the perimeter mode, hmax = 104. It was found that only 36% of the packets reached their destination, although an end-to-end path existed for 45% of the node pairs. Therefore, although GeoCross is a major breakthrough over GPCR, it does not altogether eradicate routing loops.

6 Analysis

In this section, we present a succinct analysis of DTFR and BR, and in particular calculate the average delay and per node throughput achieved by DTFR and BR. Due to the complexity of these protocols, it is necessary to make a number of simplifying assumptions and approximations. Therefore, the aim of this section is not to arrive at accurate values for the performance metrics, as was done using simulations in Section 5. Rather, our analysis has the following goals: (i) to verify the fundamental effects of the basic parameters of the environment (such as the node density and node speed) on the performance of the protocols, that were observed in the simulations, and (ii) to shed light on the fundamental reasons for its superior performance to protocols such as SW for a wide range of node degrees. The notation used in the analysis is summarized in Table 2.

Table 2. Notation of Section6

6.1 Network model

Node placement and mobility

6.1.1 The nodes are placed on an infinite region according to a spatial Poisson process with density λ(therefore, there is an infinity of nodes). All nodes move with a velocity of magnitude v0, each one on its own direction, which is kept constant. Movement directions are independent and uniformly distributed in [−Π,Π].

6.1.2 Data traffic

Each node sends data to another node chosen randomly among the rest, so that the distance between a source and its destination is a random variable with first moments E(Dod) and <a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M8','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M8">View MathML</a>.

6.1.3 Channel access

All nodes are equipped with a transceiver of data rate rD bps, and the maximum distance of direct communication is R. As we are interested in modeling very large delays, comparable to the time needed for the topology to change substantially, we assume that the packet transmission time is 0.

To capture the contention among the nodes for the shared channel we assume that, for a transmission from a transmitter A to a receiver B to be successful, there must be no transmitter or receiver C closer to receiver B than transmitter A. Therefore, we associate with each successful transmission across distance Di a disk-shaped footprint of radius Di centered at the receiver. The footprints are not allowed to overlap, in order for the transmissions not to interfere, hence the condition above. This model for channel access contention is simple, and ignores many aspects of wireless communication, notably the fact that interference is additive. However, it captures the fact that there is a tradeoff between the number of transmissions and the distances they cover [4,5,31]. A similar model was used in [31]. We define the cost of a transmission across distance d to be Πd2.

6.1.4 Other assumptions

Under BR, each packet is constantly aware of the destination location. Under DTFR, each packet becomes aware of the destination location at the moment of its creation, but receives no update after that point. Nodes are equipped with buffers of infinite size. Also, nodes do not maintain any local routing protocol, and only know the location of the nodes currently within their communication range R.

6.2 Delay, progress, and cost of first hop

Let node A create, at time t = 0, a packet destined for location Z. We assume that A is at the origin, and the destination Z on the positive x-axis, and sufficiently far away so that the forwarding region F is a semicircle. We also assume that if there are more than one nodes in F the next hop is chosen at random. (This choice of next hop was used in [32].)

Let D1be the delay until the packet is forwarded to its first relay, B, and let (XA,YA) and (X1,Y1) be the coordinates of A and B at time D1. Finally, let XT = X1XA, YT = Y1YA, and <a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M9','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M9">View MathML</a> be the transmission cost. Observe that X1, which we will call progress, represents the net reduction of the distance to the destination achieved at the conclusion of the first hop.

Let the event M that when A creates the packet, F is empty. Conditioning on M,

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M10','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M10">View MathML</a>

(2)

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M11','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M11">View MathML</a>

(3)

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M12','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M12">View MathML</a>

(4)

As F has an area ΠR2/2, it follows that P(M) = exp[−λΠR2/2].

Observe that if F is empty, the first relay B is the first node to enter it. In the Appendix, we show that

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M13','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M13">View MathML</a>

(5)

where I1 ≃0.4817, I2 ≃0.3890, I3 ≃2.3317.

Now assume that Mholds. We first note that, as transmission do not take time, we have E(D1|M) = 0. As the first relay B is chosen randomly among those available, it follows that its location is uniformly distributed in F. Therefore

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M14','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M14">View MathML</a>

Therefore, we know all quantities appearing on the right-hand sides of Equations (2), (3), and (4).

6.3 Packet speed and normalized cost in greedy/lazy routing

Let P be a packet traveling from node A to node B, along a sequence of hops i = 1,…. Let Di, Xi, and Ci be the delay, progress, and cost of hop i. We make the following assumptiona:

Basic Assumption: The {Di} are i.i.d., the {Xi} are i.i.d., and the {Ci} are i.i.d.

The law of large numbers applies and we have, as n ,

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M15','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M15">View MathML</a>

Taking quotients,

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M16','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M16">View MathML</a>

The first limit expresses the fact that the speed of the packet, averaged over the whole duration of its journey, will converge to the packet speed

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M17','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M17">View MathML</a>

(6)

The packet speed equals the rate with which the packet approaches the destination, and its value is not affected by any move that the packet does perpendicularly to the direction to the destination. In other words, it is the magnitude of the projection of the average velocity vector of the packet on the line connecting the current location of the packet to the destination. It is taken to be positive when the packet moves toward the destination.

The second limit expresses the fact that the total cost over the total progress converges to the normalized cost

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M18','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M18">View MathML</a>

We make the approximation that the speed with which packets move is vp, and the cost per unit of distance is cp, even when the number of hops n does not approach infinity.

Observe that vp is proportional to v0, and depends on the node density λ and communication range R only through the average number of neighbors, λΠR2. In Figure 6, we plot vp/v0 as a function of λΠR2. The speed vp is an increasing function of λΠR2 and becomes larger than v0for λΠR2≃1.64. The plot reveals that the packet speed is significantly larger than the node speed for a wide range of node degrees for which the network is not connected (compare Figure 6 with Figure 2).

thumbnailFigure 6. Normalized packet speed,vp/v0, versus the average number of neighbors,λΠR2.

6.4 Delay and throughput of DTFR

We have defined Dod as the random distance between an origin and a destination of a packet. Let RX be the distance covered by the destination during the time it takes the packet to reach the destination. Clearly,

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M19','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M19">View MathML</a>

Let DDTFR be the delay in the delivery of the packet. It follows that

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M20','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M20">View MathML</a>

(7)

Next, we calculate approximately the maximum throughput per node pair TDTFR that DTFR can support. To this end, we first calculate the average of the total cost CDTFR (in square meters) for the delivery of a packet to the destination. CDTFR is comprised of two terms: the cost CA up until the delivery of the packet to the FC, and the cost CB due to the transmissions taking place during the explosion and spread phases. The first term equals cpDod. To calculate the second term, we first assume that the distance between the FC and the FEs is set to RX, i.e., to the minimum that guarantees delivery of the packet given that nodes move with speed v0 and the packet moves with speed vp. Therefore, the cost of transmitting a single replica is cpRX. The cost of transmitting L replicas consecutively is LcpRX. However, the replicas are not transmitted consecutively, but simultaneously. Therefore, many transmissions, particularly at locations close to the FC, can be combined, as they involve replicas of the same packet being transmitted from the same transmitter to the same receiver. Therefore, a more accurate approximation for the total cost during the spread and explosion phases is the total area that the replicas must cover during these phases, i.e., <a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M21','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M21">View MathML</a>. Combining the two terms,

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M22','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M22">View MathML</a>

Taking expectations,

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M23','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M23">View MathML</a>

(8)

This average cost represents the average aggregate area of the footprints needed for the transmission of a single packet from the source to the destination.

To convert the average cost to the maximum throughput per node pair TDTFR, we proceed as follows: as the node density is λ, each node is allocated on the average an area <a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M24','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M24">View MathML</a>. As the area required for the transmission of a packet is E(CDTFR), it follows that each node can occupy the channel for a percentage of time equal to <a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M25','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M25">View MathML</a>, therefore

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M26','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M26">View MathML</a>

(9)

6.5 Delay and throughput of BR

BR operates similarly to DTFR, with the exception that the packet travels toward the destination, and never enters the explosion phase. Therefore, the trajectory that the packet follows is not a straight line. Finding its precise average length goes beyond the scope of this study. Noting that if Dod RX then this average length is approximately equal to E(Dod), we approximate it as E(Dod). It follows that

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M27','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M27">View MathML</a>

6.6 Discussion

The effects that the basic environmental parameters have on the average delay and throughput of DTFR, as these were evaluated in the simulations, are consistent with the basic results of this section, i.e., (7) and (9). Indeed, (9) predicts that the average throughput will decrease when the size of the network, and hence E(Dod) and <a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M28','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M28">View MathML</a>, increase. Equation (7) also predicts that the average throughput will decrease when the size of the network increases, and so the average delay increases, but the TTL remains fixed. These predictions are consistent with Figure 3b. Equation (9) shows that increasing the transmission range R increases the average throughput, because the second term in the brackets diminishes; this is verified by Figure 3c. Finally, (7) predicts that the delay decreases as the node speed increases, and this is consistent with Figure 3d which shows that, as the speed increases, the delivery rate increases, because more nodes arrive at their destinations before the TTL expires.

Furthermore, the analysis, in particular (6) and Figure 6, shows that there is a wide range of node degrees for which the network is not connected, and so traditional routing protocols cannot be used, but for which GLF ensures that the packet travels to the destination with a speed much larger than the node speed, and so can catch up with the destination quickly, while the cost of the Spread Phase remains manageable.

This last finding explains why the performance of DTFR is superior to that of SW. In more detail, for some values of the distance between the source and the destination, the maximum acceptable delay for the delivery of the packets, and the velocity of the nodes, the distance between the source and the destination cannot be covered by transport before the packet expires. SW spreads a number of copies in the area in which the nodes move, and one of the relays has to travel near the destination and transfer the packet there. A part of the distance between the source and the destination has to be covered by transport. A part of the distance between the source and the destination is covered by transmission, but if the packet travels distance, say x, by transmission, in one direction, due to symmetry the packet covers distance x by transmission in all directions, and this has a large cost, at least Πx2, regardless if the distance x is covered using many small or a few large hops. If the distance between the source and the destination is s1, the delay in the above case is at least (s1x)/v0. This bound on the delay-cost tradeoff of SW is very weak, but it gives an intuition as to why SW does not perform well for certain environment parameters. SW is designed to give a number of copies to relays in order to maximize the probability that a relay goes near the destination and delivers the packet, not to cover distance by transmission. In the above case, DTFR has delay s1/(vpv0) and cost <a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M29','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M29">View MathML</a>. Assume that the delay constraint is equal to the delay that DTFR can achieve. If we set s1/(vpv0) = (s1x)/v0 it follows that x = s1(vp − 2v0)/(vp v0). In this case, the cost of SW is at least <a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M30','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M30">View MathML</a>, while the cost of DTFR is less than this, for a number of values of the node degree. (For example, λΠR2 = 4.7, which gives vp = 13.75v0and cp = 0.4294R.)

7 Conclusions

Our simulations reveal that DTFR performs better that SW in a variety of environment settings, that, notably, include VANETs. It also performs better than GeoCross and GeoDTN+Nav, two state-of-the-art routing protocols recently proposed specifically for use in VANETs. Our approximate analysis establishes how the packet delay and the per node throughput of DTFR scale with respect to various system parameters. We also show that in intermittently connected networks that are not very disconnected, DTFR can deliver packets faster than SW. We believe that both our simulation tool and the methods used in our analysis have wider applicability and may be of independent interest.

One case where the performance of DTFR is expected to suffer is when the road map has extensive local minima. Imagine, for example, the case of a city with the shape of a horseshoe (or, equivalently, the shape of a circular chain link missing a small sector). Any packet created at the one end of the horseshoe with its destination at the other end will be stuck at the Homing Phase, continuously using GLF; whenever, a node carries it far away from the end where it originated, a new node, lying towards the wrong end of the horseshoe, will soon appear to be closer to the destination, and the packet will be send toward the wrong end of the horseshoe. This problem has been identified early on in the context of geographic routing, and a number of solutions have been proposed. One solution is to use Trajectory-Based Forwarding (TBF) [33]. Using TBF, nodes employ geographical routing using, as a measure of the distance to the destination, not the Euclidean distance to the destination, but rather the progress along a trajectory. The trajectory stays within the bounds of the network, and thus local minima are avoided. Blažević et al. [34] propose Anchored Geodesic Packet Forwarding (AGPF); instead of the packet traveling directly to the destination using geographic routing, it travels to the destination by going through a sequence of anchors. Both TBF and AGPF can be integrated to DTFR: in the homing phase, instead of traveling along the straight line to the destination, a packet can travel along either a trajectory or a sequence of line segments created by anchors. Specifying the trajectory or the anchors can be achieved by an agent having access to a static map of the city, and the design is orthogonal to the various mechanisms of DTFR.

Although we have presented DTFR in the context of unicast traffic between nodes, we note that it can also support other types of traffic. Notably, it can be used for cooperative content sharing [20,35]. We now briefly elaborate on thisb. In [20], a node A disseminates information about data it has via k-hop broadcasting. A node B that receives this information can send a query to A about data it needs. Then A can send the data to B. The query and the data are sent using AODV. This could be a possible application of DTFR. In the case of first time communication, no knowledge of the destination location is needed, as the message is send using limited flooding. After this, nodes have an estimate of the location of their destinations, and so can exchange the rest of the messages using DTFR.

Appendix

Let C be a non-empty, convex, and compact subset of <a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M31','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M31">View MathML</a>. We define the projection function<a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M32','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M32">View MathML</a> as follows: if <a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M33','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M33">View MathML</a>, then pC(χ) > 0 is the minimum width that an infinite closed strip, inclined with respect to the x-axis by an angle χ, can have and at the same time have C as its subset, as depicted in Figure 7. Observe that pC(χ) = pC(χ + Π) for all <a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M34','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M34">View MathML</a>. For the semicircular forwarding region F of our analysis, straightforward geometry shows that

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M35','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M35">View MathML</a>

(10)

thumbnailFigure 7. The definition of the projection function pC(χ) of a set C.

Lemma 1

Let C be a non-empty, convex, and compact subset of<a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M36','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M36">View MathML</a>with projection function pC(χ). Let<a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M37','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M37">View MathML</a>be uniformly covered by nodes distributed, at time 0, according to a spatial Poisson process of density λ, all moving with a common speedv of magnitude v0 and direction with respect to the x axis equal to χ. Then, nodes enter C through its boundary according to a Poisson process with rate equal to γ(χ) = v0pC(χ)λ.

Proof

Consider Figure 8 and focus on a time instant t0 and a time interval [t0,t0 + T]. The nodes that enter the lightly shaded set C during this interval are exactly those that at time t0 are on the darker shaded set D, whose nonlinear boundaries are parallel to each other and are on a distance of v0T from each other. Since the nodes follow a spatial Poisson distribution at time t = 0, they will also follow a spatial Poisson distribution, with the same density, at time t0. Therefore, the nodes within D are Poisson distributed, with mean equal to λ multiplied by the area of D. Note, however, that this area equals the area pC(χ)v0T covered by the rectangle E. Therefore, the average number of nodes entering C in the time interval [t0,t0 + T] is v0pC(χ)λT. Finally, also note that the numbers of nodes arriving at non-overlapping time intervals are independent, because they are due to the existence of nodes, at time t = 0, at non-overlapping subsets of <a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M38','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M38">View MathML</a>. It follows that the arrival process of nodes in C satisfies the definition of a Poisson process [36] with rate γ(χ) = v0pC(χ)λ.

thumbnailFigure 8. Proof of Lemma 1.

Lemma 2

Let L be a linear segment of length l, parallel to the y-axis. Let L move with a velocityvLof magnitude v0, forming an angle θ ∈ [0,Π] with the positive x-axis. Let<a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M39','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M39">View MathML</a>be covered with nodes placed, at time t = 0, according to a spatial Poisson process of density λ, and moving with velocity vectors of magnitude v0and directions uniformly distributed in [0,2Π], independently of each other. Then, the process with which nodes cross L through its side L1looking at the positive x-axis is Poisson, with rate

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M40','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M40">View MathML</a>

(11)

Proof

Assume, for now, that all nodes have the same velocity vector vN, and travel toward the same angle ϕ ∈ [0,2Π]. Using phasor notation, vN = v0eand vL = v0e. The setting appears in Figure 9. We will specify the process with which nodes cross L (entering from side L1) in this case.

thumbnailFigure 9. The setting of Lemma 2.

Observe, first, that we must have ϕ ∈ [θ,2Πθ], otherwise the nodes arrive at L from the other side, L2. Also observe that the relative velocity of the nodes with respect to L is

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M41','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M41">View MathML</a>

Let us move to the coordinate system where L remains stationary and parallel to the y-axis. Consider a time interval [t0,t0 + T]. The nodes crossing L from L1 are exactly those that at t0 are in the shaded rectangle of Figure 9. The number of those is a Poisson random variable with average λ multiplied by the area of the rectangle <a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M42','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M42">View MathML</a>. To conclude, the nodes arriving in the interval [t0,t0 + T] are Poisson distributed with average <a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M43','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M43">View MathML</a>. Furthermore, the arrivals at non-overlapping time intervals are independent, because they are caused by the existence of nodes, during time t0, at non-overlapping subsets of <a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M44','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M44">View MathML</a>. It follows [36] that the arrival process is Poisson with rate <a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M45','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M45">View MathML</a>.

However, nodes do not have a fixed direction ϕ, but rather the direction of each is uniformly distributed and independent of the directions of the rest. It follows from the previous case that the arrivals of nodes with direction in the incremental range [ϕ,ϕ + ] form a Poisson process with incremental rate <a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M46','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M46">View MathML</a>. As the summation of multiple Poisson processes is a Poisson process with rate equal to the sum of the rates, it follows that the arrival process from all angles is a Poisson process with rate given by the integral

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M47','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M47">View MathML</a>

Calculating the integral, we arrive at (11). □

We are now ready to proceed with the proof of Equations (5), which is organized in three parts.

Part 1: Assume, for now, that F is moving with a constant velocity vF of magnitude v0 and direction (with respect to the x-axis) equal to ϕ, where ϕ ∈ [−Π,Π]. Let also <a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M48','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M48">View MathML</a> be filled with nodes, all with a common velocity vN of magnitude v0 and direction, with respect to the x-axis, equal to θ, where θ ∈ [−Π,Π]. At time t = 0, nodes are placed on <a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M49','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M49">View MathML</a> according to a spatial Poisson process with density λ. The setting appears in Figure 10. In this setting, the arrival process of nodes in F through its boundary is a Poisson process with rate equal to

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M50','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M50">View MathML</a>

(12)

thumbnailFigure 10. The semicircle used in the proof of Equation (5).

Indeed, in phasor notation, vN = v0eand vF = v0e, and the relative velocity of the nodes as perceived by F is

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M51','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M51">View MathML</a>

Therefore, the magnitude of the relative velocity is <a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M52','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M52">View MathML</a>, and the angle of incidence of the nodes on F is either <a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M53','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M53">View MathML</a> or <a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M54','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M54">View MathML</a>, depending on the sign of <a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M55','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M55">View MathML</a>. As the two possibilities for the angle of incidence differ by Π, they give the same value of the projection function. It follows from Lemma 1 that

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M56','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M56">View MathML</a>

and substituting pF(·) from (10) the result (12) follows.

Part 2: We now modify the setting of Part 1 to assume that each node is moving toward a direction θ that is uniformly chosen in [−Π,Π], independently of the directions of all other nodes. In this setting, the arrival process is again a Poisson process with rate equal to

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M57','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M57">View MathML</a>

(13)

This is due to the facts that, first, each incremental range of node velocity angles, [θ,θ + ] creates a Poisson arrival process and, second, the process consisting of the arrivals of any number of Poisson processes is still a Poisson process, with a rate equal to the sum of the incremental rates, i.e., the integral

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M58','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M58">View MathML</a>

(14)

After straightforward calculations, (13) follows.

Part 3: Let us now move to the setting of Equations (5): Let F be empty of nodes and at time t = 0 centered at the origin. Let the directions of both F and all nodes be randomly and uniformly distributed in [−ΠΠ, and let ϕ be the random direction of F. In this setting, the arrival process of nodes at the boundary of F is a conditional Poisson process [36]. Indeed, if we condition on ϕ, we fall into Part 2, in which the node arrival process is Poisson, with rate given by (13). Observe that conditioning on M does not affect the statistics of new arrivals, as these are coming from regions that do not overlap with the interior of F at t = 0.

To calculate E(D1|M), E(X1|M), and E(C1|M), we condition on ϕ. We start with E(D1|M), noting that

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M59','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M59">View MathML</a>

where in the last equation we used the fact that, due to symmetry, the function E(D1|Φ = ϕ,M) is even. As discussed, conditioned on Φ = ϕ, the node arrival process is a Poisson process with rate γ(ϕ) given in (13), and hence <a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M60','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M60">View MathML</a>. Combining everything, it follows that

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M61','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M61">View MathML</a>

Next, we calculate E(X1|M), noting that E(X1|M) = E(XT|M) + E(XA|M). We first note that

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M62','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M62">View MathML</a>

where the last equality is due to symmetry. Now observe that γ(ϕ) = γ(Πϕ) for all ϕ ∈ [0,Π]. It follows that E(XA|Φ = ϕ,M) = −E(XA|Φ = Πϕ,M), and therefore E(XA|M) is zero. It follows that E(X1|M) = E(XT|M).

Furthermore,

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M63','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M63">View MathML</a>

where in the last equation we used symmetry. As discussed, conditioned on Φ = ϕ, the node arrival process is a Poisson process with rate γ(ϕ) given in (13). This Poisson process can be broken down to a set of independent, incremental Poisson processes, each one corresponding to the node arrivals in the semicircle through an incremental arc [χ,χ + ] along its circumference, where χ ∈ [−Π/2,Π/2], and a last one, independent of the rest, corresponding to the arrivals through the linear part. It follows that the probability that there is an arrival through such an arc χ ∈ [−Π/2,Π/2] is equal to the incremental rate of arrivals there, (χ) over the aggregate arrival rate γ(ϕ). Therefore, and noting that arrivals through the linear part do not contribute to E(XT|Φ = ϕ,M), we have

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M64','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M64">View MathML</a>

Observe, however, that (χ) is equal to the arrival rate through a linear segment of length Rdχ and moving toward an angle |χϕ|, with respect to its vertical. Therefore, Lemma 2 applies. Taking into account that |χϕ| might be greater than Π, it follows that

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M65','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M65">View MathML</a>

Putting everything together, it follows that

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M66','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M66">View MathML</a>

To calculate <a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M67','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M67">View MathML</a>, note that

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M68','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M68">View MathML</a>

The value of <a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M69','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M69">View MathML</a> depends on whether the arriving node comes through the linear segment of the semicircle or not. The probability P(S) of the event S that the arrival will be through the linear segment equals the rate of arrivals through the linear segment, as specified by Lemma 2, over the total rate of arrivals γ(ϕ), as specified by (13). Therefore,

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M70','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M70">View MathML</a>

Having P(S), we note that

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M71','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M71">View MathML</a>

Combining everything, it follows that

<a onClick="popup('http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M72','MathML',630,470);return false;" target="_blank" href="http://jwcn.eurasipjournals.com/content/2013/1/23/mathml/M72">View MathML</a>

Endnotes

aThe interested reader is referred to [37,38], where the packet speed in a DTN is investigated without the use of this assumption (although various others are made). There, however, the focus is exclusively on the topic of the packet speed in DTNs.

bA detailed exposition is subject for future work.

Competing interests

The authors declare that they have no competing interests.

Acknowledgements

This research has been co-financed by the European Union (European Social Fund - ESF) and Greek national funds through the Operational Program “Education and Lifelong Learning” of the National Strategic Reference Framework (NSRF) Research Funding Program THALES: Investing in knowledge society through the European Social Fund. We would like to thank Pei-Chun Cheng for many useful discussions about the implementation and operation of GeoDTN+Nav, Savvas Gitzenis for suggestions on the presentation of the material, and the anonymous reviewers for their many insightful comments.

References

  1. T Small, ZJ Haas, The shared wireless infostation model—a new ad hoc networking paradigm (or where there is a whale, there is a way). Proceedings of the ACM MobiHOC (Annapolis, MD, 2003), pp. 233–244

  2. RC Shah, S Roy, S Jain, W Brunette, Data MULEs: modeling and analysis of a three-tier architecture for sparse sensor networks. Ad Hoc Netw 1(6), 215–233 (2003)

  3. N Laoutaris, G Smaragdakis, P Rodriguez, R Sundaram, Delay tolerant bulk data transfers on the internet. Proceedings of the ACM Sigmetrics 2009 (Seattle, WA, 2009), pp. 229–238

  4. M Grossglauser, D Tse, Mobility increases the capacity of ad-hoc wireless networks. Proceedings of the IEEE INFOCOM (Anchorage, AL, 2001), pp. 1360–1369

  5. S Toumpis, AJ Goldsmith, Large wireless networks under fading, mobility, and delay constraints. Proceedings of the IEEE INFOCOM (Hong Kong, China, 2004)

  6. T Spyropoulos, K Psounis, CS Raghavendra, Efficient routing in intermittently connected mobile networks: the single-copy case. IEEE Trans. Netw 16, 63–76 (2008)

  7. T Spyropoulos, K Psounis, CS Raghavendra, Efficient routing in intermittently connected mobile networks: the multiple-copy case. IEEE Trans. Netw 16, 77–90 (2008)

  8. J LeBrun, CN Chiah, D Ghosal, M Zhang, Knowledge-based opportunistic forwarding in vehicular wireless ad hoc networks. Proceedings of the IEEE VTC Spring (Florence, Italy, 2005), pp. 2289–2293

  9. C Lochert, M Mauve, H Fubler, H Hartenstein, Geographic routing in city scenarios. ACM SIGMOBILE Mob. Comput. Commun. Rev 9, 69–72 (2005)

  10. KC Lee, PC Cheng, M Gerla, GeoCross: a geographic routing protocol in the presence of loops in urban scenarios. Ad Hoc Netw 8, 474–488 (2010). Publisher Full Text OpenURL

  11. PC Cheng, KC Lee, M Gerla, J Harri, GeoDTN+Nav: geographic DTN routing with navigator prediction for urban vehicular environments. Mob. Netw. Appl 15, 61–82 (2010). Publisher Full Text OpenURL

  12. Wikipedia ([ http://en), . wikipedia.org/wiki/Fireworks#Palm webcite]

  13. H Wu, R Fujimoto, R Guensler, M Hunter, Pennsylvania Philadelphia USA., MDDV: a mobility-centric data dissemination algorithm for vehicular networks. ACM MOBICOM, 47–56 (2004)

  14. B Karp, HT Kung, GPSR: greedy perimeter stateless routing for wireless networks. MobiCom (Boston, MA, 2000), pp. 243–254

  15. E Kuiper, S Nadjm-Tehrani, Geographical routing with location service in intermittently connected MANETs. IEEE Trans. Veh. Technol 60(2), 592–604 (2011)

  16. CH Ng, KC Sia, CH Chan, Peer clustering and firework query model in the peer-to-peer network. 12th International World Wide Web Conference (2003)

  17. KC Sia, CH Ng, CH Chan, I King, P2P content-based query routing using firework query model. 2nd International Workshop on Peer-to-Peer Systems (2003)

  18. L Law, S Krishnamurthy, M Faloutsos, Fireworks: an adaptive group communications protocol for mobile ad hoc networks. IFIP Networking 2005 (Waterloo, Canada, 2005), pp. 853–868

  19. A Sidera, S Toumpis, DTFR: a geographic routing protocol for wireless delay tolerant networks. Proceedings of the IFIP MedHocNet 2011 (Favignana Island, Sicily, Italy, 2011), pp. 33–40

  20. K Lee, SH Lee, R Cheung, U Lee, M Gerla, First experience with CarTorrent in a real vehicular ad hoc network testbed. Mobile Networking for Vehicular Environments (Anchorage, AK, USA, 2007), pp. 109–114

  21. M Heissenbuettel, T Braun, M Waelchli, T Bernoulli, Evaluating the limitations of and alternatives in beaconing. Ad Hoc Netw 5, 558–578 (2007). Publisher Full Text OpenURL

  22. S Heimlicher, M Karaliopoulos, H Levy, T Spyropoulos, On leveraging partial paths in partially-connected networks. IEEE INFOCOM (Rio de Janeiro, Brazil, 2009), pp. 55–63

  23. A Sidera, S Toumpis, Delay tolerant firework routing (Technical report, [ pages), . cs.aueb.gr/~toumpis/dtns/technical_report.pdf webcite]

  24. Very Large DTN Simulator (VL-DTN-S) ([ http://pages), . cs.aueb.gr/~toumpis/dtns.html webcite]

  25. ns-3 homepage ([ http://www), . nsnam.org webcite]

  26. OMNET++ community homepage ([ http://www), . omnetpp.org webcite]

  27. A Karänen, J Ott, T Kärkkäinen, The ONE simulator for DTN protocol evaluation. Proceedings of the Simutools 2009 (Rome, Italy, 2009)

  28. OR Helgason, KV Jónsson, Opportunistic networking in OMNetT++. Proceedings of the OMNeT++ (Marseille, France, 2008)

  29. T Rappaport, Wireless Communications: Principles and Practice (Prentice Hall, Upper Saddle River, 2002)

  30. P Sommer, R Wattenhofer, Gradient clock synchronization in wireless sensor networks. Proceedings of the ACM ISPN (San Francisco, CA, 2009), pp. 37–48

  31. P Gupta, PR Kumar, The capacity of wireless networks. IEEE Trans. Inf. Theory 46(2), 388–404 (2000). Publisher Full Text OpenURL

  32. R Nelson, L Kleinrock, The spatial capacity of a slotted ALOHA, multihop packet radio network with capture. IEEE Trans. Commun COM-32(6), 684–694 (1984)

  33. D Niculescu, B Nath, Trajectory based forwarding and its applications. Proceedings of the ACM MobiCom (San Diego, CA, 2003), pp. 260–272

  34. L Blažević, S Giordano, J-Y Le Boudec, Self organized terminode routing. Cluster Comput 5, 205–218 (2002). Publisher Full Text OpenURL

  35. V Lenders, G Karlsson, M May, Wireless ad hoc podcasting. IEEE SECON (San Diego, CA, 2007), pp. 273–283

  36. SM Ross, Introduction to Probability Models (Academic Press, Boston, 2003)

  37. P Jacquet, B Mans, G Rodolakis, Information propagation speed in mobile and delay tolerant networks. Proceedings of the IEEE INFOCOM (Rio de Janeiro, Brazil, 2009), pp. 5001–5015

  38. E Baccelli, P Jacquet, B Mans, G Rodolakis, Information propagation speed in bidirectional vehicular delay tolerant networks. Proceedings of the IEEE INFOCOM (Shanghai, China, 2011)