An Effective Buffer Management Policy for Opportunistic Networks

  • Yin Chen
  • Wenbin YaoEmail author
  • Ming Zong
  • Dongbin Wang
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 201)


Opportunistic networks are wireless networks where disruptions may occur frequently due to the challenging environments. Multiple message replicas have to be propagated to improve delivery probability; combining long-term storage with replication gives rise to a high storage overhead. Many forward/drop policies have been proposed to achieve high delivery ratio, low latencies and low overheads. These policies have improved the performance of opportunistic networks to some extent. However, they all have their own disadvantages. Therefore, an efficient buffer management policy based on the average encounter frequency and the average encounter duration of nodes is proposed in this paper. Simulation results show that our buffer management policy has better performance than the existing DO, DF, MDC-SR and the ACF-based policy.


Opportunistic networks Forward policy Drop policy Average encounter frequency Average encounter duration 



This work was partly supported by the NSFC-Guangdong Joint Found(U1501254) and the Co-construction Program with the Beijing Municipal Commission of Education and the Ministry of Science and Technology of China(2012BAH45B01) and the Fundamental Research Funds for the Central Universities (BUPT2011RCZJ16, 2014ZD03-03) and China Information Security Special Fund (NDRC).


  1. 1.
    Xiong, Y.P., Sun, L.M., Niu, J.W., et al.: Opportunistic networks. J. Softw. 20, 124–137 (2009)CrossRefGoogle Scholar
  2. 2.
    Tekdas, O., Bhadauria, D., Isler, V.: Efficient data collection from wireless nodes under the two-ring communication model. Int. J. Robot. Res. 31, 774–784 (2012)CrossRefGoogle Scholar
  3. 3.
    Wang C., Wang W., Sohraby K., et al.: QoS optimized and energy efficient power control for deep space multimedia communications in InterPlaNetary networks. In: International Conference on Wireless for Space and Extreme Environments, pp. 1–3. IEEE (2013)Google Scholar
  4. 4.
    Burgess, J., Gallagher, B., Jensen, D., et al.: MaxProp: Routing for vehicle-based disruption-tolerant networks. In: Proceedings - IEEE INFOCOM, pp. 1–11 (2006)Google Scholar
  5. 5.
    Krishnan, R., Basu, P., Mikkelson, J.M., et al.: The SPINDLE disruption-tolerant networking system. In: Military Communications Conference, pp. 1017–1023. IEEE (2007)Google Scholar
  6. 6.
    Rashid, S., Ayub, Q., Zahid, M.S.M., et al.: Impact of mobility models on DLA (Drop Largest) optimized DTN epidemic routing protocol. Int. J. Comput. Appl. 18, 35–39 (2011)Google Scholar
  7. 7.
    Jain, S., Chawla, M.: Survey of buffer management policies for delay tolerant networks. J. Eng. (2014)Google Scholar
  8. 8.
    Zhang, X., Neglia, G., Kurose, J., et al.: Performance modeling of epidemic routing. Comput. Netw. 51, 827–839 (2006)zbMATHGoogle Scholar
  9. 9.
    Krifa, A., Barakat, C., Spyropoulos, T.: An optimal joint scheduling and drop policy for delay tolerant networks. In: World of Wireless, Mobile and Multimedia Networks, pp. 1–6. IEEE, California (2008)Google Scholar
  10. 10.
    Lindgren, A., Phanse, K.S.: Evaluation of queueing policies and forwarding strategies for routing in intermittently connected networks. In: International Conference on Communication System Software and Middleware, pp. 1–10. IEEE (2006)Google Scholar
  11. 11.
    Rashid, S., Ayub, Q., Zahid, M.S.M., et al.: Message drop control buffer management policy for DTN routing protocols. Wireless Pers. Commun. 72, 653–669 (2013)CrossRefGoogle Scholar
  12. 12.
    Rashid, S., Ayub, Q., Soperi, M.Z.M., et al.: E DROP an effective drop buffer management policy for DTN routing protocols. Int. J. Comput. Appl. 13, 8–13 (2010)Google Scholar
  13. 13.
    Rashid, S., Abdullah, A.H., Soperi, M., et al.: Mean drop an effectual buffer management policy for delay tolerant network (2012)Google Scholar
  14. 14.
    Ayub, Q., Rashid, S., Zahid, M.S.M.: Buffer scheduling policy for opportunitic networks (2013)Google Scholar
  15. 15.
    Ayub, Q., Rashid, S.: T-Drop: An optimal buffer management policy to improve QOS in DTN routing protocols. J. Comput. 2, 46–50 (2010)Google Scholar
  16. 16.
    Tang, L., Chai, Y., Li, Y., et al.: Buffer management policies in opportunistic networks. J. Comput. Inf. Syst. 8, 5149–5159 (2012)Google Scholar
  17. 17.
    Keränen, A., Ott, J., et al.: The ONE simulator for DTN protocol evaluation. In: International Conference on Simulation TOOLS and Techniques for Communications, Networks and Systems, Simutools, Rome, Italy (2009) Google Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2017

Authors and Affiliations

  1. 1.Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia, School of Computer ScienceBeijing University of Posts and TelecommunicationsBeijingChina
  2. 2.Yingcai Honors CollegeUniversity of Electronic Science and Technology of ChinaChengduChina
  3. 3.National Engineering Laboratory for Mobile Network SecurityBeijing University of Posts and TelecommunicationsBeijingChina

Personalised recommendations