2007 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops 2007
DOI: 10.1109/wiopt.2007.4480026
|View full text |Cite
|
Sign up to set email alerts
|

Study of two-hop message spreading in DTNs

Abstract: Abstract-In this paper, a Delay Tolerant Network environment is considered where the source is in full control of the two-hop spreading mechanism by setting key parameters such as the number of copies allowed to be spread in the network and the delay bound of the messages. The analysis allows for a differentiation between the source of the message and the intermediate nodes (in terms of e.g. transmission power or speed). Analytical expressions for the cumulative distribution function (cdf ) of the delivery del… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 22 publications
(6 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…• The file to forward has a finite lifetime (called also horizon) during which the destination is interested in its content; • For simplicity and without loss of generality, we assume that all nodes are identical and equipped with the same wireless interface; • We consider that the relay nodes use a two-hop routing policy, 21,22 which works as follows: when a relay node receives a copy of the file from the source, it stores it and forwards it to the destination node when met within the file's lifetime. The choice of this routing protocol is motivated by an energy efficiency purpose.…”
Section: Problem Formulationmentioning
confidence: 99%
“…• The file to forward has a finite lifetime (called also horizon) during which the destination is interested in its content; • For simplicity and without loss of generality, we assume that all nodes are identical and equipped with the same wireless interface; • We consider that the relay nodes use a two-hop routing policy, 21,22 which works as follows: when a relay node receives a copy of the file from the source, it stores it and forwards it to the destination node when met within the file's lifetime. The choice of this routing protocol is motivated by an energy efficiency purpose.…”
Section: Problem Formulationmentioning
confidence: 99%
“…here c, r and Q are given in (22), (23) and (24), respectively; I is an identity matrix of size f × f , and 1 is a column vector of proper size with all elements being 1.…”
Section: A State Distribution Of Local-queuementioning
confidence: 99%
“…Delay performance modeling under packet redundancy technique has also been extensively studied recently. The works [35][36][37] conducted delay modeling under a simple network scenario, where only one source-destination pair is available in the network. Later, Liu et al [9,38] explored delay modeling under more general network scenarios with multiple source-destination pairs.…”
Section: Delay Control With Packet Redundancymentioning
confidence: 99%
“…Spyropoulos et al [39] proposed a single period routing algorithm (called spray and wait) for delay control in DTNs, and Bulut et al [40] extended the algorithm in [39] and further proposed a more general multi-period spraying algorithm for delay control in DTNs. Panagakis et al [36] developed a theoretical framework for delay modeling in DTNs with packet redundancy-based delay control.…”
Section: Delay Control With Packet Redundancymentioning
confidence: 99%