• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wang En, Yang Yongjian, Li Li. Game of Life Based Congestion Control Strategy in Delay Tolerant Networks[J]. Journal of Computer Research and Development, 2014, 51(11): 2393-2407. DOI: 10.7544/issn1000-1239.2014.20130736
Citation: Wang En, Yang Yongjian, Li Li. Game of Life Based Congestion Control Strategy in Delay Tolerant Networks[J]. Journal of Computer Research and Development, 2014, 51(11): 2393-2407. DOI: 10.7544/issn1000-1239.2014.20130736

Game of Life Based Congestion Control Strategy in Delay Tolerant Networks

More Information
  • Published Date: October 31, 2014
  • In delay tolerant networks, to deal with the problems that the topology of the network changes dramatically and the disconnections between nodes are prevalent, researchers propose the store-carry-forward protocols: nodes store the messages in buffers and may carry them for a long time until they encounter the proper next hops or the destination nodes. Because of the limited buffer capacity of nodes, this way of message transmission is bound to bring buffer overflows and then lead to network congestion. A congestion control strategy based on the game of life is proposed for delay tolerant networks in this paper and it is applied to classic Epidemic routing protocol. This strategy determines the specific operations of a message stored in the local buffer of node according to the proportion of the holders of this message in all the nodes’ neighbors. Furthermore, the policies of message queuing and dropping are designed. The utility value of a certain message is calculated based on the influence of delivering or dropping this message on the delivery ratio of the whole network, and the messages stored in the buffers are queued by the utility value. The messages with large utility values have high priority to send and the messages with small utility values are dropped. Experiments under movement model (which is the build-in model in the ONE) and real trajectories are carried out in the ONE. Simulation results show that the congestion control strategy based on the game of life significantly improves the delivery ratio compared with other congestion control strategies, while the delivery latency, packet loss rate and overhead ratio are reduced at the same time.
  • Related Articles

    [1]Wu Yinghong, Huang Hao, Zeng Qingkai. Description of Service Oriented Access Control Policy Refinement[J]. Journal of Computer Research and Development, 2014, 51(11): 2470-2482. DOI: 10.7544/issn1000-1239.2014.20130973
    [2]Tang Chenghua, Yu Shunzheng. Verifying Network Security Policy Based on Features[J]. Journal of Computer Research and Development, 2009, 46(11): 1854-1861.
    [3]Sun Yong, Wu Bo, and Feng Yanpeng. A Policy-and Value- Iteration Algorithm for POMDP[J]. Journal of Computer Research and Development, 2008, 45(10): 1763-1768.
    [4]Liu Daobin, Guo Li, and Bai Shuo. A Methodology for Analyzing Security Policy in Workflow[J]. Journal of Computer Research and Development, 2008, 45(6).
    [5]Li Ji, Zeng Huaxin, Xu Dengyuan. A New Service Guaranteed Scheduling Policy for Buffered Crossbar Switches[J]. Journal of Computer Research and Development, 2007, 44(11): 1873-1880.
    [6]Li Xiaofeng, Feng Dengguo, He Yongzhong. Research on Preprocessing Policies in XACML Admin[J]. Journal of Computer Research and Development, 2007, 44(5): 729-736.
    [7]He Yongzhong, Li Xiaofeng, Feng Dengguo. Implementing Chinese Wall Policies on RBAC[J]. Journal of Computer Research and Development, 2007, 44(4): 615-622.
    [8]He Liqiang, Liu Zhiyong. A QoS Capable Fetch Policy for SMT Processors[J]. Journal of Computer Research and Development, 2006, 43(11): 1980-1984.
    [9]Li Xiangjun, Meng Luoming, and Jiao Li. Problems in Results of Policy Conflict Resolutions and Detection and Resolution Methods in Network Management Systems[J]. Journal of Computer Research and Development, 2006, 43(7): 1297-1303.
    [10]Yao Jian, Mao Bing, and Xie Li. A DAG-Based Security Policy Conflicts Detection Method[J]. Journal of Computer Research and Development, 2005, 42(7): 1108-1114.

Catalog

    Article views (945) PDF downloads (614) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return