Generic placeholder image

Recent Advances in Computer Science and Communications

Editor-in-Chief

ISSN (Print): 2666-2558
ISSN (Online): 2666-2566

Review Article

Buffer Management Techniques in Delay Tolerant Networks: A Comprehensive Survey

Author(s): Savita Singh and Ankita Verma*

Volume 16, Issue 8, 2023

Published on: 06 September, 2023

Article ID: e170823219888 Pages: 7

DOI: 10.2174/2666255816666230817101831

Price: $65

Abstract

This paper aims to provide a comprehensive study of the underlying buffer management issues and challenges in developing an efficient DTN routing protocol. Our aim is to begin with the discussion of buffer management schemes in DTNs in full generality and then dive in-depth, covering aspects of buffer management. Buffer strategies are used to determine which packets need to be forwarded or dropped. This paper will focus on the variety of buffer management strategies available, providing a comprehensive survey and analysis. We have also conducted an empirical analysis using simulator ONE to analyze the buffering time in various primary routing protocols such as Epidemic, Spary-and-wait (SNW), Prophet, Encounter based Routing (EBR) and Inter-Contact Delay and Location Information based Routing (ICDLIR). For these algorithms, it is also observed how varying the buffer size effect the delivery probability and overhead.

Keywords: Buffer management, delay tolerant network, survey, storage management, energy, inter-contact delay.

Graphical Abstract
[1]
S. Jain, K. Fall, and R. Patra, "Routing in a delay tolerant network", Comput. Commun. Rev., vol. 34, no. 4, pp. 145-158, 2004.
[http://dx.doi.org/10.1145/1030194.1015484]
[2]
J. Shen, S. Moh, and I. Chung, Routing protocols in delay-tolerant networks: A comparative survey. Proceedings of the 23rd International Technical conference on circuits/systems, computers and communications, 2008, p. 1577-1580.
[3]
C.C. Sobin, "An efficient buffer management policy for DTN", Proceedings of the 6th International Conference on Advances in Computing & Communications ICACC Procedia Computer Science, Cochin, India, 2016, pp. 309-314.
[http://dx.doi.org/10.1016/j.procs.2016.07.215]
[4]
L.M. Feeney, "An energy consumption model for performance analysis of routing protocols for mobile ad hoc networks", Mob. Netw. Appl., vol. 6, no. 3, pp. 239-249, 2001.
[http://dx.doi.org/10.1023/A:1011474616255]
[5]
E. Altman, A.P. Azad, T. Basar, and F. De Pellegrini, "Combined optimal control of activation and transmission in delay-tolerant networks", IEEE/ACM Trans. Netw., vol. 21, no. 2, pp. 482-494, 2013.
[http://dx.doi.org/10.1109/TNET.2012.2206079]
[6]
D.R. Silva, A. Costa, and J. Macedo, Energy impact analysis on DTN Routing Protocols., ACM ExtremeCom: Switzerland, 2012, pp. 1-6.
[7]
S. Dimitriou, and V. Tsaoussidis, "Vassilis Tsaoussidis, Effective buffer and storage management in DTN nodes", 2009 International Conference on Ultra Modern Telecommunications & Workshops, St. Petersburg, Russia, 2009.
[8]
V. Mahendran, and C.S.R. Murthy, "Buffer dimensioning of DTN replication-based routing nodes", IEEE Commun. Lett., vol. 17, no. 1, pp. 123-126, 2013.
[http://dx.doi.org/10.1109/LCOMM.2012.120312.122262]
[9]
L. Tang, Y. Chai, Y. Li, and B. Weng, "Buffer management policies in opportunistic networks", J. Comput. Inf. Syst., vol. 8, no. 12, pp. 5149-5159, 2012.
[10]
X. Zhang, G. Neglia, J. Kurose, and D. Towsley, "Performance modeling of epidemic routing", Comput. Netw., vol. 51, no. 10, pp. 2867-2891, 2007.
[http://dx.doi.org/10.1016/j.comnet.2006.11.028]
[11]
D. Kim, H. Park, and I. Yeom, Minimizing the impact of buffer overflow in DTN. Proc. of International Conference on Future Internet Technologies (CFI), vol. 2008. 2008.
[12]
E. Wang, Y. Yang, and J. Wu, A Knapsack-based message scheduling and drop strategy for delay-tolerant networks. Proc. of EWSN, 2015, pp. 120-134.
[http://dx.doi.org/10.1007/978-3-319-15582-1_8]
[13]
J.F. Naves, I.M. Moraes, and C. Albuquerque, LPS and LRF: Efficient buffer management policies for delay and disruption tolerant networks. 37th Annual IEEE Conference on Local Computer Networks.
2012 Clearwater Beach, FL, USA, 22-25 October 2012 [http://dx.doi.org/10.1109/LCN.2012.6423649]
[14]
A. Vahdat, and D. Becker, "Epidemic routing for partially connected ad hoc networks", Handbook of Systemic Autoimmune Diseases, vol. 2000, 2000.
[15]
A. Lindgren, A. Doria, and O. Schelén, "Probabilistic routing in intermittently connected networks", Mob. Comput. Commun. Rev., vol. 7, no. 3, pp. 19-20, 2003.
[http://dx.doi.org/10.1145/961268.961272]
[16]
T. Spyropoulos, K. Psounis, and C. Raghavendra, Spray and wait: An efficient routing scheme for intermittently connected mobile networks. Proceedings of the 2005 ACM SIGCOMM Workshop on Delay-tolerant Networking, 2005, pp. 252-259.
[http://dx.doi.org/10.1145/1080139.1080143]
[17]
E. Wang, Y. Yang, J. Wu, and W. Liu, A buffer management strategy on spray and wait routing protocol in DTNs. 44th International Conference on Parallel Processing.
2015 Beijing, China, 01-04 September 2015,pp 799, 808 [http://dx.doi.org/10.1109/ICPP.2015.89]
[18]
S. Nelson, M. Bakht, and R. Kravets, Encounter-based routing in DTN.IEEE INFOCOM, 2009.Rio de Janeiro, Brazil, .
[http://dx.doi.org/10.1109/INFCOM.2009.5061994]
[19]
R. Popovich Ramanathan, R. Hansen, P. Basu, R. Rosales-Hain, and R. Krishnan, "Prioritized epidemic routing for opportunistic networks", Proc. First Int, 2007. San Juan, 11 June 2007 pp 62-66
[20]
J. Burgess, B. Gallagher, D. Jensen, and B.N. Levine, MaxProp: Routing for vehiclebased disruption-tolerant networks. Proceedings of the 25th IEEE International conference on computer communications INFOCOM. 23-29 April 2006, Barcelona, pp 23, 29
[21]
A. Balasubramanian, B.N. Levine, and A. Venkataramani, "Replication routing in DTN: A resource allocation approach", IEEE/ACM Trans. Netw., vol. 18, no. 2, pp. 596-609, 2010.
[http://dx.doi.org/10.1109/TNET.2009.2036365]
[22]
J. Li, Y.G. Qu, Q.Y. Li, and B.H. Zhao, A queue management MAC protocol for delay-tolerant mobile sensor networks. Proceedings of 2nd International Conference on Advanced Computer Control (ICACC).
27-29 March 2010, Shenyang, China, vol. 1, pp 426-430 [http://dx.doi.org/10.1109/ICACC.2010.5486972]
[23]
M.C. Chuah, and W.B. Ma, Integrated buffer and route management in a DTN with message ferry. Proceedings of IEEE Military Communications Conference (MILCOM’06).
23-25 October 2006, Washington, DC, USA, pp 1-7 [http://dx.doi.org/10.1109/MILCOM.2006.302288]
[24]
P. Das, K. Dubey, and T. De, Priority aided scheduling of pigeons in homing-pigeon-based delay tolerant networks. Proceedings of IEEE 3rd International Advance Computing Conference.
22-23 February 2013, Ghaziabad, India, pp 212, 217 [http://dx.doi.org/10.1109/IAdCC.2013.6514223]
[25]
Y. Li, M. Qian, D. Jin, L. Su, and L. Zeng, Adaptive optimal buffer management policies for realistic DTN. Proceedings of Global Telecommunications Conference (GLOBECOM ’09).
30 November 2009 - 04 December 2009, Honolulu, HI, USA, pp 1-5 [http://dx.doi.org/10.1109/GLOCOM.2009.5426161]
[26]
L. Yin, H.M. Lu, Y.D. Cao, and J.M. Gao, Buffer scheduling policy in DTN routing protocols. Proceedings of 2nd International Conference on Future Computer and Communication (ICFCC).
2010 21-24 May 2010, Wuhan, China, vol. 2, pp 808-813 [http://dx.doi.org/10.1109/ICFCC.2010.5497636]
[27]
A. Krifa, C. Barakat, and T. Spyropoulos, "Message drop and scheduling in DTN: Theory and practice", IEEE Trans. Mobile Comput., vol. 11, no. 9, pp. 1470-1483, 2012.
[http://dx.doi.org/10.1109/TMC.2011.163]
[28]
A. Krifa, C. Barakat, and T. Spyropoulos, An optimal joint scheduling and drop policy for delay tolerant networks. in Proc. IEEE Int. Symposium on a World of Wireless, Mobile and Multimedia Networks.
23-26 June 2008, Newport Beach, CA, USA, pp 1, 6 [http://dx.doi.org/10.1109/WOWMOM.2008.4594889]
[29]
Q. Ayub, and S. Rashid, "Efficient buffer management policy DLA for DTN routing protocols under congestion", Int. J. Comput. Netw. Secur., vol. 2, no. 9, pp. 118-122, 2010.
[30]
A.T. Prodhan, R. Das, H. Kabir, and G.C. Shoja, "TTL based routing in opportunistic networks", J. Netw. Comput. Appl., vol. 34, no. 5, pp. 1660-1670, 2011.
[http://dx.doi.org/10.1016/j.jnca.2011.05.005]
[31]
Q. Liu, G. Li, Y. Li, and Z. Zhang, "Cache scheduling policy for opportunistic networks based on message priority", J. Comput. Inf. Syst., vol. 10, no. 2, pp. 621-632, 2013.
[32]
K. Shin, and S. Kim, "Enhanced buffer management policy that utilises message properties for delay-tolerant networks", IET Commun., vol. 5, no. 6, pp. 753-759, 2011.
[http://dx.doi.org/10.1049/iet-com.2010.0422]
[33]
A. Lindgren, and K.S. Phanse, Evaluation of queuing policies and forwarding strategies for routing in intermittently connected networks. Proceedings of First International Conference Communication System Software and Middleware. 08-12 January 2006, New Delhi, India, pp 1-10
[34]
Savita, and D.K. Lobiyal, "Location information in inter-contact based routing approach in delay tolerant network’, Proceedings of the 3rd international conference on recent trends in computing", IRCTC Procedia Computer Science., vol. 57, no. 1, pp. 1367-1375, 2015.
[35]
"Savita, and D.K. Lobiyal, “Inter-contact delay and location information-based routing with adaptive threshold buffer management for delay tolerant networks”", Int. J. Inf. Commun. Technol., vol. 17, no. 4, pp. 307-328, 2020.
[36]
Savita, and D.K. Lobiyal, "Location based contact time energy efficient routing (LCTEE) approach for delay tolerant networks", Wirel. Pers. Commun., vol. 108, no. 4, pp. 2639-2662, 2019.
[37]
M.Y.S. Uddin, H. Ahmadi, T. Abdelzaher, and R. Kravets, "Intercontact routing for energy constrained disaster response networks", IEEE Trans. Mobile Comput., vol. 12, no. 10, pp. 1986-1998, 2013.
[http://dx.doi.org/10.1109/TMC.2012.172]
[38]
T. Spyropoulos, K. Psounis, and C. Raghavendra, Spray and focus: Efficient mobility-assisted routing for heterogeneous and correlated mobility. Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom- W'07), White Plains.
NY, USA, 2007, pp. 79-85 [http://dx.doi.org/10.1109/PERCOMW.2007.108]
[39]
Ze. Li, and Haiying Shen, "SEDUM: Exploiting social networks in utility-based distributed routing for DTN", IEEE Trans. Comput., vol. 62, no. 1, pp. 83-97, 2013.
[http://dx.doi.org/10.1109/TC.2011.232]
[40]
B. Pasztor, M. Musolesi, and C. Mascolo, "Opportunistic mobile sensordata collection with scar",
[41]
J. LeBrun, C.N. Chuah, D. Ghosal, and M. Zhang, Knowledgebased opportunistic forwarding in vehicular wireless ad hoc networks., IEEE VTC ’05-Spring: Stockholm, Sweden., 2005.
[http://dx.doi.org/10.1109/VETECS.2005.1543743]
[42]
H.Y. Huang, P.E. Luo, M. Li, D. Li, X. Li, W. Shu, and M.Y. Wu, "Performance evaluation of suvnet with real-time traffic data", IEEE Trans. Vehicular Technol., vol. 56, no. 6, pp. 3381-3396, 2007.
[http://dx.doi.org/10.1109/TVT.2007.907273]
[43]
W. Zhao, M. Ammar, and E. Zegura, A Message ferrying approach for data delivery in sparse mobile ad hoc networks. Proceedings of the 5th ACM international symposium on mobile ad hoc networking and computing, 2004, pp. 187-198.
[http://dx.doi.org/10.1145/989459.989483]
[44]
E.M. Daly, and M. Haahr, "Social network analysis for routing in disconnected delay-tolerant MANETs", In Proceedings of the 8th ACM international symposium on mobile ad hoc networking and computing, 2007, pp. 32-40
[http://dx.doi.org/10.1145/1288107.1288113]
[45]
M. Musolesi, and C. Mascolo, "Car: Context-aware adaptive routing for delay-tolerant mobile networks", IEEE Trans. Mobile Comput., vol. 8, no. 2, pp. 246-260, 2009.
[http://dx.doi.org/10.1109/TMC.2008.107]
[46]
A. Karami, and N. Derakhshanfard, BMRTD: Buffer Management policy based on Remaining Time to encounter nodes with the Destination node in delay tolerant networks., Res. Sq, 2023.
[http://dx.doi.org/10.21203/rs.3.rs-2522936/v1]
[47]
M. Ababou, R.E. Kouch, and M. Bellafkih, "Dynamic utility-based buffer management strategy for delay-tolerant networks", Int. J. Ad Hoc Ubiquitous Comput., vol. 30, no. 2, p. 114, 2019.
[http://dx.doi.org/10.1504/IJAHUC.2019.097640]
[48]
G.Y. Théophile, K.K. Prosper, T. Yves, and T.K. Augustin, "“Proposed message transit buffer management model for nodes in vehicular delay-tolerant network”, IJCSNS Int", J Computer Science and Network Security, vol. 23, no. 1, 2023.
[49]
U.R. Obaid, A.A. Irshad, H. Hythem, S. Khalid, F.M. Muhammad, A. Sikandar, and S. Khalid, "A novel message drop policy to enhance buffer management in delay tolerant networks", Wirel. Commun. Mob. Comput., p. 12, 2021.
[http://dx.doi.org/10.1155/2021/9773402]
[50]
C. Nanau, MaxDelivery: A new approach to a DTN buffer management. International Symposium on "A World of wireless Mobile and Multimedia networks.
31 August 2020 - 03 September 2020, Cork, Ireland pp 60, 61 [http://dx.doi.org/10.1109/WoWMoM49955.2020.00023]
[51]
A. Babazadeh Nanehkaran, and M.H. Rezvani, "An incentive-compatible routing protocol for delay-tolerant networks using second-price sealed-bid auction mechanism", Wirel. Pers. Commun., vol. 121, no. 3, pp. 1547-1576, 2021.
[http://dx.doi.org/10.1007/s11277-021-08684-w]
[52]
Z. Ghafouri-ghomi, and M.H. Rezvani, "An optimized message routing approach inspired by the landlord-peasants game in disruption-tolerant networks", Ad Hoc Netw., vol. 127, p. 102781, 2022.
[http://dx.doi.org/10.1016/j.adhoc.2022.102781]
[53]
S. Esfandiari, and M.H. Rezvani, "An optimized content delivery approach based on demand–supply theory in disruption-tolerant networks", Telecomm. Syst., vol. 76, no. 2, pp. 265-289, 2021.
[http://dx.doi.org/10.1007/s11235-020-00711-8]
[54]
A. Keranen, J. Ott, and T. Karkkainen, The ONE Simulator for DTN protocol evaluation. Proceedings of the 2nd International Conference on Simulation Tools and Techniques.
2009 March 2009, ICST, New York, NY, USA, pp 1, 10 [http://dx.doi.org/10.4108/ICST.SIMUTOOLS2009.5674]
[55]
A. Verma, "Savita, and S. Kumar, “Routing protocols in delay tolerant networks: Comparative and empirical analysis”", Wirel. Pers. Commun., vol. 118, no. 1, pp. 551-574, 2021.
[http://dx.doi.org/10.1007/s11277-020-08032-4]

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy