吉林大学学报(工学版) ›› 2014, Vol. 44 ›› Issue (01): 149-157.doi: 10.13229/j.cnki.jdxbgxb201401026

• paper • Previous Articles     Next Articles

Congestion control strategy based on Markov meeting time span prediction model

YANG Yong-jian, WANG En, DU Zhan-wei   

  1. College of Computer Science and Technology, Jilin University, Changchun 130012, China
  • Received:2012-11-28 Online:2014-01-01 Published:2014-01-01

Abstract:

In order to solve the problem of the low delivery ratio caused by the limited resources in Delay-Tolerant Networking (DTN), the routing mechanism based on multiple copies is usually used to improve the delivery ratio. However, it may lead to the problem of the overload of node buffer caused by the excessive numbers of copies, then network congestion happens. This paper proposes the congestion control strategy based on Markov meeting time span prediction model CCSMP. It mainly specifies the line method and discarding mechanism of nodes buffer. The predicted messages meeting earlier with destination node are lined in the first, and the messages with lower utility values are discarded as far as possible. Then the congestion problem caused by the limited node buffer is solved. Simulation in ONE environment is carried out to compare the proposed strategy with the two congestion control strategies, Drop-Front(DF) and Drop-Oldest(DO). Simulation results show that the congestion control strategy proposed by this paper improves the message delivery ratio, reduces the average network delay, and to a certain extend reduces the overhead ratio and packet dropped rate.

Key words: computer application, congestion, Markov meeting time span, line method, discarding mechanism

CLC Number: 

  • TP393

[1] Burleigh S, Hooke A, Torgerson L, et al. Delay tolerant networking: An approach to interplanetary internet[J]. IEEE Communications Magazine, 2003, 41(6):128-136.

[2] Akyildiz I, Su W, Sankarasubramaniam Y, et al. A survey on sensor networks[J].IEEE Communications Magazine, 2002, 40(8):102-114.

[3] Fall K. A delay-tolerant network architecture for challenged Internets[C]//Proc Conf Appl Technol Architecture Protocols For Computer Commun, Karlsruhe, Germany, 2003:27-34.

[4] Cao Jian-nong, Zhang Yang, Xie Li. Consistency of cooperative caching in mobile peer-to-peer systems over MANET[J].International Journal of Parallel, Emergent and Distributed Systems, 2006, 21(3):151-168.

[5] Fall K, Hong W, Madden S. Custody transfer for reliable delivery in delay tolerant networks[EB/OL].[2010-03-28]. http://www.dtnrg.org/papers/custody-xfer-tr.pdf.

[6] 张文柱, 孙勇发, 王炫. 基于马尔科夫决策的容迟网络路由算法[J]. 西安电子科技大学学报, 2011, 38(2):18-22. Zhang Wen-zhu, Sun Yong-fa, Wang Xuan. Study of the DTN routing algorithm based on the Markov decision[J]. Journal of Xidian University, 2011, 38(2):18-22.

[7] 邓甦, 李晓毅. 马尔科夫链在呼吸道传染病预测中的应用[J]. 中国卫生统计, 2011(6): 615-616. Deng Su, Li Xiao-yi. Markov chain in the prediction of respiratory infectious diseases[J]. Chinese Journal of Health Statistics, 2011 (6):615-616.

[8] Krifa A, Baraka C, Spyropoulos T. Optimal buffer management policies for delay tolerant networks[C]//The 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, IEEE, 2008: 260-268.

[9] 熊永平, 孙利民, 牛建伟. 机会网络[J]. 软件学报, 2009, 20(1):127-134. Xiong Yong-ping, Sun Li-min, Niu Jian-wei. Opportunistic networks[J]. Journal of Software, 2009, 20(1):127-134.

[10] Ramanathan R, Hansen R, Basu P, et al. Prioritized epidemic routing for opportunistic networks[C]//International Conference on Mobile Systems, Applications and Services, Proceedings of the 1st International MobiSys Workshop on Mobile Opportunistic Networking, 2007, 11(11): 62-66.

[11] Pawelczak P, Venkatesha Prasad R, Xia L, et al. Cognitive radio emergency networks -requirements and design[C]//New Frontiers in Dynamic Spectrum Access Networks, IEEE, 2005: 601-606.

[12] Lindgren A, Phanse K S. Evaluation of queueing policies and forwarding strategies for routing in intermittently connected networks[C]//Communication System Software and Middleware, 2006: 1-10.

[13] 王贵竹, 徐正欢, 李晓峰. DTN中依据报文质量的拥塞控制策略[J]. 计算机工程与应用, 2012, 48(9):74-77. Wang Gui-zhu, Xu Zheng-huan, Li Xiao-feng. Congestion control strategy based on quality of message in DTN[J]. Computer Engineering and Applications, 2012, 48(9):74-77.

[14] John B, Brian G, David J. Maxprop:Routing for vehicle-based disruption-tolerant networks[C]//INFOCOM, 2006:1-11.

[15] 刘期烈, 潘英俊. 延迟容忍网络中基于复制率的拥塞控制算法[J]. 北京邮电大学学报, 2010, 33(4): 88-92. Liu Qi-lie, Pan Ying-jun. Congestion control strategy based on copy rate in DTN[J]. Journal of Beijing University of Post and Telecommunications, 2010, 33(4): 88-92.

[16] 陶勇, 龚正虎. DTN 拥塞控制研究进展[J]. 计算机应用研究, 2010, 27(10):3605-3611. Tao Yong, Gong Zheng-hu. Survey on congestion control for DTN[J].Application Research of Computers, 2010, 27(10): 3605-3611.

[17] 刘席开, 刘桂开. 机会网络拥塞控制的研究[J]. 中南林业科技大学学报, 2012, 32(8):159-165. Liu Xi-kai, Liu Gui-kai. Study on congestion control for opportunistic network[J]. Journal of Central South University of Forestry & Technology, 2012, 32(8):159-165.

[18] Broch J, Maltz D A, Johnson D B, et al. A performance comparison of multi-hop wireless ad hoc network routing protocols[C]//Proceedings of the 4th Annual ACM/IEEE International Conference on Mobile Computing and Networking, ACM, 1998: 85-97.

[1] LIU Fu,ZONG Yu-xuan,KANG Bing,ZHANG Yi-meng,LIN Cai-xia,ZHAO Hong-wei. Dorsal hand vein recognition system based on optimized texture features [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1844-1850.
[2] WANG Li-min,LIU Yang,SUN Ming-hui,LI Mei-hui. Ensemble of unrestricted K-dependence Bayesian classifiers based on Markov blanket [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1851-1858.
[3] JIN Shun-fu,WANG Bao-shuai,HAO Shan-shan,JIA Xiao-guang,HUO Zhan-qiang. Synchronous sleeping based energy saving strategy of reservation virtual machines in cloud data centers and its performance research [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1859-1866.
[4] ZHAO Dong,SUN Ming-yu,ZHU Jin-long,YU Fan-hua,LIU Guang-jie,CHEN Hui-ling. Improved moth-flame optimization method based on combination of particle swarm optimization and simplex method [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1867-1872.
[5] LIU En-ze,WU Wen-fu. Agricultural surface multiple feature decision fusion disease judgment algorithm based on machine vision [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1873-1878.
[6] OUYANG Dan-tong, FAN Qi. Clause-level context-aware open information extraction [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1563-1570.
[7] LIU Fu, LAN Xu-teng, HOU Tao, KANG Bing, LIU Yun, LIN Cai-xia. Metagenomic clustering method based on k-mer frequency optimization [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1593-1599.
[8] GUI Chun, HUANG Wang-xing. Network clustering method based on improved label propagation algorithm [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1600-1605.
[9] LIU Yuan-ning, LIU Shuai, ZHU Xiao-dong, CHEN Yi-hao, ZHENG Shao-ge, SHEN Chun-zhuang. LOG operator and adaptive optimization Gabor filtering for iris recognition [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1606-1613.
[10] CHE Xiang-jiu, WANG Li, GUO Xiao-xin. Improved boundary detection based on multi-scale cues fusion [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1621-1628.
[11] ZHAO Hong-wei, LIU Yu-qi, DONG Li-yan, WANG Yu, LIU Pei. Dynamic route optimization algorithm based on hybrid in ITS [J]. 吉林大学学报(工学版), 2018, 48(4): 1214-1223.
[12] HUANG Hui, FENG Xi-an, WEI Yan, XU Chi, CHEN Hui-ling. An intelligent system based on enhanced kernel extreme learning machine for choosing the second major [J]. 吉林大学学报(工学版), 2018, 48(4): 1224-1230.
[13] FU Wen-bo, ZHANG Jie, CHEN Yong-le. Network topology discovery algorithm against routing spoofing attack in Internet of things [J]. 吉林大学学报(工学版), 2018, 48(4): 1231-1236.
[14] CAO Jie, SU Zhe, LI Xiao-xu. Image annotation method based on Corr-LDA model [J]. 吉林大学学报(工学版), 2018, 48(4): 1237-1243.
[15] HOU Yong-hong, WANG Li-wei, XING Jia-ming. HTTP-based dynamic adaptive streaming video transmission algorithm [J]. 吉林大学学报(工学版), 2018, 48(4): 1244-1253.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!