skip to main content
10.1145/2811587.2811592acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
research-article

Two Hops or More: On Hop-Limited Search in Opportunistic Networks

Published: 02 November 2015 Publication History

Abstract

While there is a drastic shift from host-centric networking to content-centric networking, how to locate and retrieve the relevant content efficiently, especially in a mobile network, is still an open question. Mobile devices host increasing volume of data which could be shared with the nearby nodes in a multi-hop fashion. However, searching for content in this resource-restricted setting is not trivial due to the lack of a content index, as well as, desire for keeping the search cost low. In this paper, we analyze a lightweight search scheme, hop-limited search, that forwards the search messages only till a maximum number of hops, and requires no prior knowledge about the network. We highlight the effect of the hop limit on both search performance (i.e., success ratio and delay) and associated cost along with the interplay between content availability, tolerated waiting time, network density, and mobility. Our analysis, using the real mobility traces, as well as synthetic models, shows that the most substantial benefit is achieved at the first few hops and that after several hops the extra gain diminishes as a function of content availability and tolerated delay. We also observe that the return path taken by a response is on average longer than the forward path of the query and that the search cost increases only marginally after several hops due to the small network diameter.

References

[1]
L. A. Adamic, R. M. Lukose, and B. A. Huberman. Local search in unstructured networks. Handbook of graphs and networks, 2006.
[2]
A. Al Hanbali, P. Nain, and E. Altman. Performance of ad hoc networks with two-hop relay routing and limited packet lifetime. Performance Evaluation, 65(6):463--483, 2008.
[3]
S. Bayhan, E. Hyytiä, J. Kangasharju, and J. Ott. Seeker-assisted information search in mobile clouds. In ACM SIGCOMM workshop on Mobile cloud computing, 2013.
[4]
S. Bayhan, E. Hyytiä, J. Kangasharju, and J. Ott. Analysis of hop limit in opportunistic networks by static and time-aggregated graphs. In IEEE ICC, 2015.
[5]
S. Bayhan, E. Hyytiä, J. Kangasharju, and J. Ott. Two hops or more: On hop-limited search in opportunistic networks. Technical report, University of Helsinki, Finland, Aug. 2015.
[6]
C. Boldrini, M. Conti, and A. Passarella. Less is more: long paths do not help the convergence of social-oblivious forwarding in opportunistic networks. In ACM Int. workshop on Mobile Opportunistic Networks, 2012.
[7]
A. Chaintreau, P. Hui, J. Crowcroft, C. Diot, R. Gass, and J. Scott. Impact of human mobility on opportunistic forwarding algorithms. IEEE Trans. on Mobile Comp., 6(6):606--620, 2007.
[8]
A. Chaintreau, A. Mtibaa, L. Massoulie, and C. Diot. The diameter of opportunistic mobile networks. In ACM CoNEXT, 2007.
[9]
K. Fall. A delay-tolerant network architecture for challenged internets. In ACM SIGCOMM, 2003.
[10]
M. Faloutsos, P. Faloutsos, and C. Faloutsos. On power-law relationships of the Internet topology. In ACM SIGCOMM Computer Communication Review, volume 29, pages 251--262, 1999.
[11]
J. Fan, J. Chen, Y. Du, P. Wang, and Y. Sun. Delque: A socially aware delegation query scheme in delay-tolerant networks. IEEE Transactions on Vehicular Technology, 60(5):2181--2193, Jun 2011.
[12]
W. Gao, Q. Li, and G. Cao. Forwarding redundancy in opportunistic mobile networks: Investigation, elimination, and exploitation. IEEE Transactions on Mobile Computing, 2014.
[13]
P. Gill, M. Arlitt, Z. Li, and A. Mahanti. Youtube traffic characterization: a view from the edge. In ACM SIGCOMM Conf. on Internet measurement, 2007.
[14]
M. Grossglauser and D. Tse. Mobility increases the capacity of ad hoc wireless networks. IEEE/ACM Trans. on Networking, 10(4):477--486, Aug 2002.
[15]
R. Guérin and A. Orda. Computing shortest paths for any number of hops. IEEE/ACM Transactions on Networking (TON), 10(5):613--620, 2002.
[16]
M. A. Hoque, X. Hong, and B. Dixon. Efficient multi-hop connectivity analysis in urban vehicular networks. Vehicular Comm., 1(2):78--90, April 2014.
[17]
E. Hyyti\"a, S. Bayhan, J. Ott, and J. Kangasharju. Searching a needle in (linear) opportunistic networks. In ACM MSWiM, 2014.
[18]
E. Hyytiä and J. Ott. Criticality of large delay tolerant networks via directed continuum percolation in space-time. In IEEE INFOCOM, 2013.
[19]
A. Keränen, J. Ott, and T. Kärkkäinen. The ONE Simulator for DTN Protocol Evaluation. In Proc. of Int. Conf. on Simulation Tools and Techniques, 2009.
[20]
J. Leskovec, J. Kleinberg, and C. Faloutsos. Graphs over time: densification laws, shrinking diameters and possible explanations. In ACM KDD, 2005.
[21]
J. Ott and M. Pitkänen. DTN-based Content Storage and Retrieval. In The First IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications (AOC), June 2007.
[22]
M. Piorkowski, N. Sarafijanovic-Djukic, and M. Grossglauser. CRAWDAD data set epfl/mobility (v. 2009-02--24), Feb. 2009. Downloaded from http://crawdad.org/epfl/mobility/.
[23]
M. Pitkänen, T. Kärkkäinen, J. Greifenberg, and J. Ott. Searching for content in mobile DTNs. In IEEE PerCom, 2009.
[24]
F. Qian, K. S. Quah, J. Huang, J. Erman, A. Gerber, Z. Mao, S. Sen, and O. Spatscheck. Web caching on smartphones: ideal vs. reality. In ACM MobiSys, 2012.
[25]
R Core Team. R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, Vienna, Austria, 2013.
[26]
J. Scott, R. Gass, J. Crowcroft, P. Hui, C. Diot, and A. Chaintreau. CRAWDAD data set cambridge/haggle (v. 2006-01-31). http://crawdad.org/cambridge/haggle/, Jan. 2006.
[27]
M. Vojnovic and A. Proutiere. Hop limited flooding over dynamic networks. In IEEE INFOCOM, 2011.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
MSWiM '15: Proceedings of the 18th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems
November 2015
358 pages
ISBN:9781450337625
DOI:10.1145/2811587
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 November 2015

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. hop neighborhood.
  2. mobile opportunistic networks
  3. opportunistic search

Qualifiers

  • Research-article

Funding Sources

Conference

MSWiM'15
Sponsor:

Acceptance Rates

MSWiM '15 Paper Acceptance Rate 34 of 142 submissions, 24%;
Overall Acceptance Rate 398 of 1,577 submissions, 25%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)1
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media