PDF  PubReader

Li , Song , Yang , and Ul: A Reliable and Efficient Forwarding Strategy in Vehicular Named Data Networking

Danxia Li , Tian Song , Yating Yang and Islam Rafiq Ul

A Reliable and Efficient Forwarding Strategy in Vehicular Named Data Networking

Abstract: Vehicular named data networking (VNDN) has the datacentric and in-network caching advantages that are in line with the requirements of multi-hop content retrieval in vehicular ad hoc networks (V ANETs). Some current restrictive forwarding strategies utilize single-path forwarding to mitigate the Interest broadcast storm in VNDN. However, these strategies do not provide any reliable mechanism for Interest and Data forwarding to address the problem of low performance caused by the dynamic and unreliable V ANETs communication environment. In this paper, we propose a packet forwarding strategy based on optimal and backup (PFOB) for VNDN. For Interest, PFOB establishes a single-path forwarding with high reliability and reachability by increasing the signal strength and node-degree criterion and retransmission mechanism. For Data, PFOB provides a reliable multi-path backup forwarding mechanism without additional network overhead. Simulation results show that PFOB can effectively improve the Interest satisfaction ratio, reduce the number of application retransmissions, and reduce the Interest satisfaction delay compared to the current strategies.

Keywords: named data networking , reliable forwarding strategy , vehicular ad hoc networks

I. INTRODUCTION

AS a key component of the intelligent transportation system(ITS), vehicular ad hoc networks (VANETs) have been developed rapidly in recent ten years. Wireless access in vehicular environments (WAVE) protocol stack takes into account the characteristics of vehicular radio communication and can realize efficient information transmission under the condition of high speed movement, therefore, it is currently the most promising vehicular radio communication standard [1]. However, WAVE specializes in providing short-distance safety applications, road charge and other similar services without the TCP/IP overhead [2]. In addition to these short-range emergency traffic information, the traffic situation in the moving direction of the vehicle has received more attention to facilitate driving planning. Moreover, some audio, video and other entertainment information are needed for driving comfort. In order to transmit these application information, a multi-hop protocol stack needs to be established. A large number of routing algorithms based on the traditional TCP/IP network architecture are proposed, but the end-to-end and host-centric approach of TCP/IP is obviously inadequate in the highly dynamic VANETs environment [3]. As discussed in [4]-[7], VANETs need a distributed non-center and content-based network architecture.

Named data networking (NDN) is a new design for future network evolution based on a content-driven model [8], [9]. In NDN, the two communicating parties that interact asynchronously do not need to establish and maintain an end-toend connection, and the location-independent naming makes it unnecessary to assign a host identifier for a mobile node, such as IP address. With in-network caching, when the content consumer sends an Interest packet identified by the data name as a data request, any node in the network that has cached this data can reply with a Data packet identified by the same data name. The feature of NDN that requests data by sending Interest packet provides flexibility to maintain communication in highly dynamic environment [3]. Additionally, in NDN, a security mechanism for digital signature verification of the data itself is used to prevent malicious nodes from forging data instead of relying on the encryption of transmission nodes and channels. More broadly, all these advantages are in line with the requirements of VANETs. The combination of the VANETs and NDN is a good network architecture, such networks are called as vehicular NDN (VNDN) [10].

There are many advantages of applying NDN architecture in VANETs, but there are still many problems to be solved when applying the original NDN, such as naming, caching, forwarding, security and so on. In this paper, we solve the issue of multi-hop forwarding in VNDN. NDN can easily support the movement of content consumers [3], and also can support the movement of providers [2]. However, it is impossible to establish a relatively stable routing for VANETs with all vehicles to be moved at any time, so the original NDN forwarding strategy is not feasible in VNDN. The easiest way is to take advantage of VANETs’s wireless broadcast feature, that is, each intermediate node forwards the received Interest packets and Data packets upon they received them. However, this simple flooding mechanism leads to a large amount of packet redundancy and collisions which leads to the severe performance degradation of the network.

In order to mitigate the broadcast storm caused by flooding mechanism, some restrictive forwarding strategies have been proposed at present. In these strategies [11], [12], the Interest packet is forwarded along a single-path formed by designated forwarding nodes, and the Data packet is returned along the reversed path. As shown in Fig. 1, the node beginning with the letter A is the designated forwarding node per-hop through which the Interest and Data packets are forwarded. However, due to the link disconnection caused by high-speed mobility of vehicle and the random packet loss feature of wireless fading channel, packet loss could also occur at the specified forwarding node [13]. If transmitting the Interest packet in a single-path is unreliable, having the Data packet return along the reversed path of the Interest packet transmission could be even more difficult.

Fig. 1.

The nodes beginning with the letter A are the designated forwarding nodes, and the dotted circle is the wireless transmission range. Due to the frequent link disconnection and random packet loss feature of VANETs, transmitting the Interest packet and Data packet in a single-path is unreliable.
1.png

In this paper, we propose a packet forwarding strategy based on optimal and backup (PFOB) for the highway scenario in VNDN. In PFOB, the Interest packet is reliably transmitted in both directions of highway along the single-path formed by optimal forwarding nodes, and the Data packet is returned along the backup multi-path. It aims not only to solve the redundancy caused by flooding, but also to achieve reliable and effective Interest and Data forwarding. The main contributions of our work are threefold.

When selecting the optimal forwarding node, PFOB not only uses distance and link duration as selection criteria like other restrictive forwarding strategies to provide a relatively stable and efficient connection, but also uses signal strength and node-degree as selection criteria to improve link reliability and reachability

When Interest packet loss occurs at the selected optimal node, we adopt a lightweight retransmission mechanism, which increases the reliability of the Interest packet transmission without incurring additional control messages.

As the optimal Interest packet forwarding node is specified, some backup nodes for the return of the Data packet are specified at the same time. The backup node with higher link stability has the higher priority to forward Data packet. This backup mechanism provides reliable multi-path forwarding of Data packets without additional network overhead.

With the combination of optimal based Interest forwarding, lightweight Interest retransmission and backup based Data multi-path forwarding, PFOB can significantly improve the content retrieval ratio, and reduce the content retrieval delay with low overhead.

The remainder of this paper is organized as follows. In Section II, we introduce the background of VANETs and NDN and review the related work of forwarding mechanism in VNDN. In Section III, we give a detailed description of PFOB. In Section IV, simulation results and analysis are presented. Finally, the conclusions are drawn in Section V.

II. BACKGROUND AND RELATED WORK

A. Vehicular Ad Hoc Networks

As a special kind of mobile ad hoc network, VANETs inherit the characteristics of decentralized control, equal status of nodes with independent routing and distributed self-organizing management. Besides these, it also has some unique characteristics.

Highly dynamic network topology: Due to the high-speed mobility of the vehicle and the frequent departure and entry of vehicles into the network, the topology of the vehicle network changes very rapidly.

Unstable link connection: High dynamic topology, limited wireless communication range and surrounding environment such as building blockage, wireless interference, etc., make the communication between vehicles unstable and unreliable.

Non-random movement: Behavior information such as the speed, direction, and position of the vehicle can be obtained through auxiliary equipment such as GPS, sensors, etc. Due to the restrictions of roads, traffic rules and other vehicles, vehicle has a certain moving model instead of random movement.

Unlimited energy and storage space: In VANETs, communication equipment is generally mounted on the vehicle. As its energy and storage space is provided by the vehicle, energy, storage space, and computing power are not major problems.

VANETs have attracted lots of attention from both the academia and the industry. The related multi-hop routing protocols are mainly based on the traditional TCP/IP architecture, and the two basic routing protocols are topology-based and position-based routing. However, due to these characteristics of VANETs, the traditional TCP/IP architecture cannot adapt to the rapid network changes, so a new VNDN architecture was introduced, as discussed in Section I.

B. Named Data Networking

NDN uses a pull-based model to retrieve content. There are two types of packets in NDN, namely Interest packets (abbreviated Interest) and Data packets (abbreviated Data). Both types of packets carry a name identifier to identify the content. Consumer sends the Interest which contains the name of the requested content, and any node in the network that has cached the requested content can return the Data according to the reverse path of the Interest forwarded.

Each NDN node maintains three data structures, namely forwarding information base (FIB), pending interest table (PIT) and content store (CS). The function of the FIB is similar to that of the routing table in the TCP/IP architecture. Unlike the routing table in TCP/IP, it allows packets to be forwarded through multiple interfaces. The PIT records information of Interest that has been forwarded, including the name prefix of the Interest and the corresponding interface. The CS is used to store data generated by a node itself or retrieved from other nodes.

Fig. 2.

Forwarding process at an NDN node [ 9]
2.png

Fig. 2 shows the forwarding process of the Interest and Data. The NDN router nodes process the received Interest as follows: 1) It checks its CS first. If CS has content that matches the name in the Interest, the corresponding Data is sent from the incoming face. 2) If no matching content is found in CS, the PIT is checked. If a record exists in the PIT entry, the current incoming face is added to the PIT entry and the Interest is discarded. 3) If there are no records in the PIT entry, it looks for FIB. If there is a corresponding face in the FIB entry, the Interest is forwarded from the face, and the corresponding information of the Interest are recorded in the PIT. 4) If no corresponding entry is found in the FIB, the Interest is discarded. The NDN router nodes process the received Data as follows: 1) It finds whether there is a corresponding entry in the PIT. If there is, the Data is cached in the CS and the Data is forwarded according to all incoming face recorded in the PIT entry. 2) If not, the Data is discarded.

C. Related Work of Forwarding Strategy in VNDN

According to whether the transmitted information is urgent traffic information or not, the applications of VANETs can be divided into two categories: Safety and unsafety. For the safety application, we can use DSRC to transmit some emergent traffic information in the range of one hop; for the unsafety application, it can be further divided into two types: One is locationdependent, such as the traffic situation of some roads, the other is location-independent, such as entertainment information. Bian et al. [14] proposed a forwarding strategy that can select the geographically nearest and intersection nodes to forward the Interest according to the geographical location of requested content. However, this strategy [14] cannot address the content retrieval problem of location-independent application. Grassi et al. [15] proposed Navigo which maps data names to data locations and forwards the Interest along the shortest geographical path. However, for location-dependent application, Navigo can append the geographic location of data to the prefix of the name before sending the Interest. For location-independent application, Navigo needs to discover the geographic location of the data through initial flooding procedure. In addition, Navigo needs an additional mechanism for mapping data names to data locations.

In VANETs, proactive and reactive forwarding are the most commonly used strategies. Yu et al. [16] developed a proactive routing protocol in which a node proactive sends advertisements to form a routing table. Bloom filters are used to reduce the larger overhead. However, this management faces some challenges such as data source mobility, dynamic data catalogues and frequency of updates. Varvello et al. [17] proved that the cost of maintaining routing information may overwhelm the benefits of proactive solutions in content-centric MANETs. Amadeo et al. [3] argued that the dynamics of connectivity among moving vehicles makes it difficult, if not completely infeasible, to run a routing protocol to build and maintain the FIB. These studies [3], [17] have illustrated that it is not feasible to form FIB in VNDN by exchanging name-prefixes announcements among routers. The routing and forwarding in NDN are smart, so each node can perform hop-by-hop intelligent forwarding of the Interest and Data according to the decision of the policy layer in VNDN.

Due to the absence of FIB table, flooding is the simplest forwarding strategy in the native VNDN. However, Flooding forwarding leads to a lot of conflicts, packet loss and retransmission, and the network performance will deteriorate quickly or even not provide services. There have been some restrictive mechanisms to reduce the redundant forwarding. These restrictive forwarding strategies can be divided into two categories: The competitive forwarding strategy of receiver-oriented and the initiative assignment strategy of sender-oriented.

In the sender-oriented strategy, each node periodically sends its own status information through the hello packet. According to the received status information of neighbors, a sender node specifies the best node to forward packet. Ahmed et al. [11] proposed a scheme named robust forwarder selection (RUFS) to mitigate the Interest broadcast storm. RUFS selects a single forwarder for each hop on the basis of multiple criteria, i.e., relative velocity, the Interest satisfaction rate, and the minimum number of hops that Interest is satisfied. However, the biggest shortcoming of RUFS is that the selected forwarding node may be in the opposite direction of the content provider.

In receiver-oriented strategy, when an intermediate node receives an Interest or a Data, it can decide either to forward it or not. Wang et al. [18] proposed a mechanism in which each receiver node calculates its distance with the sender, and the farthest one has the smallest waiting time for forwarding packets. However, due to the fading feature of wireless channels, the farther the node is, the more likely the packet will be lost. Moreover, this strategy [18] cannot support location-independent applications, the geo-location information of the requested content is embedded into Interest. Ahmed et al. [12] proposed a distributed interest forwarder selection (DIFS) scheme that mitigates the Interest broadcast storm. In DIFS, according to multiple criteria, the Interest is forwarded in a single-path in both directions. DIFS can be applied to location-independent and location-dependent applications, and solves RUFS’s shortcoming of single-direction selection of forwarding nodes. However, an important issue is that DIFS does not provide any reliability guarantee mechanism for Interest and Data forwarding in the dynamic and unreliable VANETs environment.

III. PROPOSED STRATEGY: PFOB

A. Strategy Overview

PFOB specifies optimal node to forward Interest by jointly considering distance, relative velocity, link duration, signal strength and node-degree. The non-optimal node does not forward the received Interest. These optimal Interest forwarding (OIF) nodes are abbreviated as OIF nodes. The consumer specifies the left and right OIF nodes in the Interest to be forwarded. When the right OIF node receives the Interest, it continues to specify a next-hop OIF node in the direction where the abscissa is greater than its own. For the left OIF node, it continues to specify a next-hop OIF node in the direction where the abscissa is less than its own. This process continues until the content provider is found. For vertical highway, it will not be repeated here.

These selected OIF nodes have better stability and reliability than their neighbors. However, due to the mobility of the vehicles and the wireless random packet loss characteristics, the transmission of Interest through OIF nodes is still unreliable. For the Interest, we adopt a lightweight retransmission mechanism to improve the reliability of the transmission without increasing the ACK control packet overhead.

The use of unreliable Interest single-path reverse transmission of Data is even more unreliable, and Data packets are large and retransmission costs are too high. In PFOB, while selecting OIF node for each hop, we select some nodes with relatively stable link status as backup Data forwarding nodes. These backup Data forwarding (BDF) nodes are abbreviated as BDF nodes. These BDF nodes form multiple backup paths so that when the Data cannot be successfully forwarded through the OIF nodes, these backup paths provide reliable multi-path forwarding.

The selection of OIF node, the lightweight retransmission of Interest, the selection of BDF node and the whole forwarding process of PFOB are described in details as follows.

Fig. 3.

The format of neighbor table.
3.png

Fig. 4.

Extensions on Internet packet format. Internet packets contain three additional fields to store the forwarder position, Next-hop OIF ID and BDF list.
4.png
B. OIF Node Selection

In PFOB, each node sends its status information through a one-hop hello packet. The status information includes current position, velocity, driving direction and node-degree represented by [TeX:] $$\left(x_{n}, y_{n}\right), v_{n}, \theta_{n}, \text { and } d_{n}$$, respectively. According to our experimental scenario, the sending frequency of hello packets is set to 2 Hz.

Each node collects the state information of neighbor nodes and the signal strength of the corresponding hello packet to form a neighbor table (NT). The format of NT is shown in Fig. 3, where node-degree contains two items, |RNT| and |LNT|. |RNT| and |LNT| denote the number of nodes in RNT and LNT respectively. The calculation method of the right neighbor table (RNT) or left neighbor table (LNT) is shown in (1) and (2). For the current right OIF node m, it sorts the nodes in its RNT through a multi-criteria selection method (the same applies to the left OIF node). In other words, the current OIF node only selects the next-hop OIF from the neighbor nodes that are in its forwarding direction. The criteria and methods for OIF node selection are described as below.

(1)
[TeX:] $$R N T_{m}(n)=\left\{n \in N T_{m} \mid x_{n}>x_{m}\right\}$$

(2)
[TeX:] $$\operatorname{LNT}_{m}(n)=\left\{n \in N T_{m} \mid x_{n}<x_{m}\right\}$$

Fig. 5.

The format of BDF List.
5.png

Fig. 6.

Extensions on PIT format. PIT contain two additional fields to store the corresponding type and waiting time.
6.png
B.1 Selection Criteria

1) Distance: [TeX:] $$D(m, n)$$ represents the distance between the current OIF node [TeX:] $$m$$ and the neighbor node [TeX:] $$n$$

(3)
[TeX:] $$D(m, n)=\sqrt{\left(x_{m}-x_{n}\right)^{2}+\left(y_{m}-y_{n}\right)^{2}}$$

2) Relative velocity: [TeX:] $$V(m, n)$$ represents the relative velocity between the current OIF node [TeX:] $$m$$ =and the neighbor node [TeX:] $$n$$.

(4)
[TeX:] $$V(m, n)=\sqrt{a^{2}+c^{2}}$$

where, [TeX:] $$a=v_{m} \cos \theta_{m}-v_{n} \cos \theta_{n}, c=v_{m} \sin \theta_{m}-v_{n} \sin \theta_{n}$$.

3) Link duration: [TeX:] $$L(m, n)$$ represents the link duration between the current OIF node [TeX:] $$m$$ and the neighbor node [TeX:] $$n$$ [19]. [TeX:] $$R$$ represents the transmission range of node.

(5)
[TeX:] $$L(m, n)=\frac{\left(\sqrt{\left(a^{2}+c^{2}\right) R^{2}-(a d-b c)^{2}}\right)-(a b+c d)}{a^{2}+c^{2}}$$

where, [TeX:] $$a=v_{m} \cos \theta_{m}-v_{n} \cos \theta_{n}, b=x_{m}-x_{n}, c=v_{m} \sin \theta_{m} v_{n} \sin \theta_{n}, \text { and } d=y_{m}-y_{n}$$.

4) Signal strength: [TeX:] $$S(n)$$ represents the exponentially weighted moving average signal strength of neighbor node [20]. [TeX:] $$s_{n}$$ is the received signal strength of neighbor node [TeX:] $$n, s_{t h r}$$ is the threshold value of the signal strength that can be received.

(6)
[TeX:] $$S(n) \leftarrow(1-\alpha) S(n)+\alpha\left(1-\frac{s_{t h r}}{s_{n}}\right)$$

5) Node-degree: [TeX:] $$N(n)$$ represents the exponentially weighted moving average node-degree of neighbor node [TeX:] $n d_{n}$$ is the node-degree of [TeX:] $$n$$ as shown in (7), where the current OIF node [TeX:] $$m$$ selects [TeX:] $$\left|R N T_{n}\right| \text { or }\left|L N T_{n}\right|$$ as the node-degree of [TeX:] $$n$$ according to its forwarding direction. Each neighbor in the forwarding direction of the current OIF node [TeX:] $$m \text { has a } n d_{n} \text { value, and } n_{\max }$$ is the largest of these values.

(7)
[TeX:] $$n d_{n}=\left|R N T_{n}\right| \vee\left|L N T_{n}\right|$$

(8)
[TeX:] $$N(n) \leftarrow(1-\alpha) N(n)+\alpha\left(\frac{n d_{n}}{n d_{\max }}\right)$$

[TeX:] $$S(n) \text { and } N(n), \alpha$$ is a weighting factor whose value is set as 0.8. The smaller the relative velocity and the longer the link duration, the better the link stability of the nodes. Selecting the node with a larger distance can reduce the number of forwarding hops, but it is not that the greater the distance, the better, because the larger the distance, the greater the signal fading and the greater the possibility of packet loss. More importantly, in PFOB, signal strength is used as a selection criterion, and those nodes with higher signal strength can provide a better packet reception probability. Nodes with higher node-degree have more choices when selecting OIF and BDF nodes, and when the network density is uneven, these nodes have better connectivity and reachability.

B.2 Multi-Criteria Selection Method

Multi criteria decision making (MCDM) method is used to rank neighbors to select the OIF node. TOPSIS [21] method is one of the most commonly used methods in MCDM. An evaluation matrix containing [TeX:] $$m$$ evaluation objects and [TeX:] $$n$$ criteria is created. [TeX:] $$A=\left\{A_{1}, A_{2}, \cdots, A_{m}\right\}$$ is the the evaluation object set, that is the neighbor node set. [TeX:] $$B=\left\{B_{1}, B_{2}, B_{3}, B_{4}, B_{5}\right\}$$ is the criteria set, that is corresponding to distance, relative velocity, link duration, signal strength and node-degree, respectively. Therefore the decision matrix is [TeX:] $$F=\left[f_{i j}\right]_{m \times n}$$ represents the value of the [TeX:] $$i$$th neighbor node at the [TeX:] $$j$$th criteria. The ranking method is executed as follows:

1) Construct a normalized decision matrix [TeX:] $$H=\left[h_{i j}\right]_{m \times n}$$

(9)
[TeX:] $$h_{i j}=\frac{f_{i j}}{\sqrt{\sum_{i=1}^{m} f_{i j}^{2}}}, i=1,2, \cdots, m ; j=1,2, \cdots, n$$

2) Construct the weighted normalized decision [TeX:] $O=\left[o_{i j}\right]_{m \times n}$$ For simplicity, the [TeX:] $$w_{j}$$ for all criteria is equally distributed.

(10)
[TeX:] $$O_{i j}=w_{j} h_{i j}, i=1,2, \cdots, m ; j=1,2, \cdots, n$$

3) Determine the positive and negative ideal solution.

(11)
[TeX:] $$I^{+}=\left(o_{1}^{+}, o_{2}^{+}, \cdots, o_{n}^{+}\right), I^{-}=\left(o_{1}^{-}, o_{2}^{-}, \cdots, o_{n}^{-}\right)$$

(12)
[TeX:] $$o_{j}^{+}=\max _{i} o_{i j}, \quad o_{j}^{-}=\min _{i} \mathrm{o}_{i j}$$

[TeX:] $$B_{1}, B_{3}, B_{4}, \text { and } B_{5}$$ are the positive criteria, and [TeX:] $$B_{2}$$ is the negative criteria.

4) Calculate the Euclid distance between each solution and the positive and the negative ideal solution, their values are [TeX:] $$k_{i}^{+}$$ and [TeX:] $$k_{i}^{-}$$.

(13)
[TeX:] $$k_{i}^{+}=\sqrt{\sum_{j=1}^{m}\left(o_{i j}-o_{j}^{+}\right)^{2}}, k_{i}^{-}=\sqrt{\sum_{j=1}^{m}\left(o_{i j}-o_{j}^{-}\right)^{2}}$$

5) Calculate the closeness of each solution to the positive ideal solution.

(14)
[TeX:] $$E_{i}=\frac{k_{i}^{-}}{k_{i}^{+}+k_{i}^{-}}$$

Finally, the [TeX:] $$E_{i}$$ are sorted and the neighbor node with the largest [TeX:] $$E_{i}$$ value is selected as the next-hop OIF node.

Fig. 7.

The node beginning with the letter A is the OIF nodeOIF. According to the extended Interest packet format, the Interest packet is forwarded through the OIF nodes. The node starting with the letter B is the BDF node. According to the extended PIT, the Data packet is forwarded through multiple backup paths formed by BDF nodes.
7.png
C. Lightweight Interest Retransmission

The OIF node may not receive the Interest forwarded by the previous-hop OIF node. Due to the loss of Interest, the consumer does not receive a corresponding Data within the application retransmission expiration time, and it will resend the Interest, so the end-to-end delay of the entire request increases. In the MAC layer of IEEE 802.11, there is no confirmation and retransmission mechanism for broadcasting.

Therefore, in order to improve the reliability of Interest transmission, a lightweight acknowledgement retransmission mechanism is adopted in the PFOB, which implements a lightweight retransmission of the Interest without additional acknowledgement information. When an OIF node sends the Interest, it will start the corresponding acknowledgement timer [TeX:] $$T_{\mathrm{ack}}$$. If the OIF node does not receive the same Interest sent by the upstream OIF node before the timer expires, the OIF node considers the transmission as failed and retransmits this Interest. In PFOB, the expire time of [TeX:] $$T_{\mathrm{ack}}$$ is set to 30 ms by default.

D. BDF Node Selection

When an OIF node receives Interest, it has two important steps to perform. The first step is to specify the next-hop OIF node in the Interest to be forwarded, this step is described in Section III.B above. The second step is to specify BDF nodes in the Interest to be forwarded.

In PFOB, a simple extension is made on Interest packet format. As shown in Fig. 4, Interest packet include Forwarder Position, Next-hop OIF ID and BDF List in additional field. There are two steps for the BDF node selection. One is how to select the BDF nodes, and the other is to determine the waiting timer [TeX:] $$T_{\mathrm{wait}}$$ for each BDF node. The consumer node does not establish its BDF node. When an OIF node receives the Interest, the following steps are taken to select the BDF node:

1) Find out the corresponding value in the Forwarder Position field of the received Interest, that is, the position of the previoushop OIF node.

2) Calculate the next-hop OIF node using the method in Section III.B.

3) Find the common neighbors of the previous-hop OIF node and the next-hop OIF node as the BDF nodes. The method of finding common neighbors is shown in (15), where [TeX:] $$m, x, \text { and } y$$ represent the current OIF node, the previous-hop OIF node and the next-hop OIF node, respectively. BL represents the BDF List of [TeX:] $$m$$.

(15)
[TeX:] $$B L_{m}(i)=\left\{i \in N T_{m} \mid D(i, x)<R \wedge D(i, y)<R\right\}$$

4) Calculate the expire time of [TeX:] $$T_{\text {wait }}$$ for each BDF node. For a BDF node [TeX:] $$i, L(i, x)$$ is the link durations of [TeX:] $$i$$ and the previoushop OIF node [TeX:] $$x, \text { and } L(i, y)$$ is the link durations of [TeX:] $$i$$ and the next-hop OIF node [TeX:] $$y . \text { The } T_{\text {wait }}$$ of a BDF node can be computed using (16), where [TeX:] $$T_{\max }$$ is the maximum link duration, and [TeX:] $$T_{\text {transmit }}$$ is a minimum delay for a node that is next to the previous hop. The ID of each BDF node and the corresponding [TeX:] $$T_{\text {wait }}$$ are stored in BL. The format of BL is shown in Fig. 5. At this point, the current OIF node replaces the Forwarder Position, Next-hop OIF ID and BDF List fields of the received Interest, then forwards the new Interest.

As shown in Fig. 6, two fields of Type and [TeX:] $$T_{\mathrm{wait}}$$ are added to the PIT format. When an OIF node receives Interest, the corresponding type in PIT entry is set to A, and the [TeX:] $$T_{\mathrm{wait}}$$ is set to 0. When BDF node receives Interest, the corresponding type in PIT entry is set to B, and its waiting time is recorded in [TeX:] $$T_{\text {wait }}$$ field.

When the Data is returned, some backup path can be provided by the BDF nodes. In order to prevent redundancy and conflicts caused by multiple BDF nodes forwarding the same Data, When a BDF node receives a Data, [TeX:] $$T_{\mathrm{wait}}$$ is started. If a BDF node receives the same Data before the timer expires, the Data forwarding is cancelled, otherwise Data is forwarded. Due to the communication link is easy to disconnect, the node with higher link stability can provide relatively stable services. According to (16) the BDF node with higher link stability has shorter waiting time than a lower one.

(16)
[TeX:] $$T_{\mathrm{wait}}(i)=T_{\mathrm{transmit}}\left(1-\frac{\min (L(i, x), L(i, y)}{T_{\mathrm{max}}}\right)$$

E. Forwarding Process of PFOB

In this subsection, the PFOB strategy is described as a whole in terms of the forwarding process of Interest and Data.

When receiving Interest from the application layer, the consumer specifies OIF nodes in right and left directions respectively in the received Interest, and then new Interest will be forwarded. When an intermediate node receives Interest, it performs the following steps.

1) First, it checks its CS. If there is a matching content, Data will be sent from the incoming face; otherwise, the PIT will be checked.

2) In the PIT, if a matching entry exists, the Interest will be discarded; if not, the ID of this node will be compared with the Next-hop OIF ID in received Interest.

3) If the ID of this node is equal to the Next-hop OIF ID, firstly, a new entry is added to the PIT, where its type is set to A and the waiting time is 0. Then, the node calculates the new Next-hop OIF ID and BDF List and replaces them with the corresponding fields in Interest. Finally, the node forwards this Interest; otherwise, the node checks the BDF List in received Interest.

4) If the node finds itself in BDF List, a new entry is added to the PIT, where its type is B and the waiting time is [TeX:] $$T_{\mathrm{wait}}$$. The Interest is discarded.

Algorithm 1
Received Interest in the Proposed PFOB
pseudo1.png

The Interest forwarding process is shown in Algorithm 1. For example, in Fig. 7, the next-hop OIF nodes specified by consumer C are A1 and A3. It needs to be emphasized here that the BDF List field in the Interest sent by the consumer is null. When A1 receives an Interest from C, it first calculates the next-hop OIF node as A2. Then A1 finds the common neighbors of C and A2, such as B1 and B2, and calculates their [TeX:] $$T_{\mathrm{wait}}$$ to form a new BDF List. Then A1 replaces the Forwarder position field with A1’s position, the Next-hop OIF ID field with A2 and the BDF list field with [TeX:] $$\left(\mathrm{B} 1, T_{\mathrm{wait}}(\mathrm{B} 1) ; \mathrm{B} 2, T_{\mathrm{wait}}(\mathrm{B} 2)\right)$$ in received Interest. At this point, A1 forms a new Interest and forwards it out. After receiving the Interest from A1, A2 becomes a new nexthop OIF node, and B1, B2 become the BDF node of A1. The same procedure is followed by A2 until the provider receives the Interest.

Algorithm 2
Received Data in the Proposed PFOB
pseudo2.png

When a Data arrives, an intermediate node performs the following steps, as shown in Algorithm 2.

1) First, it checks PIT, if a matching entry does not exists, the Data is discarded; otherwise, a further check will be performed in Type field of PIT entry.

2) If the Type is A, Data is immediately forwarded; if not, the node starts [TeX:] $$T_{\text {wait }}$$.

3) If the same Data is received before [TeX:] $$T_{\mathrm{wait}}$$ expires, the node will not forward Data; otherwise, it will forward Data.

For example, in Fig. 7, when the provider sends Data, because A2 node fails to forward Data, the B3 node will get the priority to forward Data as a BDF node. Similarly, when the next-hop OIF node A1 fails to forward Data, the B2 node will get the priority to forward Data as a BDF node. This process continues until the Data is sent to the consumer.

IV. EVALUATION RESULTS

We used an NDN simulator ndnSIM [22] (version 2.3) to conduct simulations. ndnSIM offers a common, user-friendly, and open-source simulation platform based on the NS-3. Simulation environments of this paper are shown in Table 1. We carry out the traffic vehicle mobility model generated by [23] built over SUMO [24]. The highway consists of two lanes in each direction, and the length of all lanes is 3000 m. The average vehicle velocity is 20 m/s. The transmission range is 250 m. In the initial state, 10,000 contents are randomly and evenly distributed to all nodes in the network. The Data packet size is 1024 bytes. The simulation duration is 500 s. During the running duration, each node in the network randomly generates 4 Interests. We conducted comparative experiments under different packet loss probabilities and network sizes. The maximum packet loss probability is set as 0.24 because we want to model a moderate fading channel on highway, different from a dramatically fading channel in urban communities [25]. We plotted the graphs from the average value of 50 different simulation runs and the confidence interval is 95%.

Table 1.

Simulation environment.
parameter Value
Topology 3000 m, 4 lanes
Average vehicle velocity 20 m/s
Number of Interest 4 packet per consumer
Data packet size 1024 bytes
Communication range 250 m
MAC protocol IEEE 802.11p
Propagation model Nakagami model
Simulation duration 500 s

Like aforementioned, PFOB has three mechanisms: OIF, lightweight retransmission and BDF. In order to better evaluate each mechanism of PFOB and compare with DIFS [12]. PFOB was compared with “PFOB-W/O-BDF”, “PFOB-W/O-BDF+Retr”, and DIFS. “PFOB-W/O-BDF” represents PFOB without BDF mechanism. “PFOB-W/O-BDF+Retr” represents PFOB without BDF and lightweight retransmission. In comparison, the following quality metrics were employed:

Interest satisfaction ratio: The average ratio of satisfied Interests to all requested Interests.

Interest satisfaction delay: The average delay from the first time the consumer forwards Interest to the corresponding Data response.

Number of application retransmissions: The average number of application layer retransmission for per satisfied Interest.

A. Interest Satisfaction Ratio

Fig. 8.

Interest satisfaction ratio for various packet loss probabilities and number of nodes.
8.png

Figs. 8(a) and 8(b) show the average Interest satisfaction ratio for various packet loss probabilities and number of nodes, respectively. In Fig. 8(a), DIFS shows the lowest satisfaction ratio at different packet loss probabilities. The reason is, DIFS forwards Interest and Data according to the specified singlepath. The establishment of this single-path only takes into account the distance and movement factors of the vehicles. There is no mechanism to guarantee transmission reliability, thus causing the failure of a large number of requests. In addition, DIFS is a receiver-oriented strategy, in which each node determines whether to forward or not in an autonomous manner, as a result, redundant broadcasts cannot be eliminated entirely. The PFOB-W/O-BDF+Retr works better than DIFS, because it takes into account not only distance and movement factors, but also signal strength and node-degree. It has relatively high connection reliability and reachability in unreliable networks and in different network sizes. The PFOB-W/O-BDF works better than PFOB-W/O-BDF+Retr, because it adds the retransmission mechanism of Interest on the basis of OIF mechanism, improving the success rate of Interest reaching the provider. PFOB adds the BDF mechanism on the basis of PFOB-W/O-BDF and improves the success rate of Data returning to the consumer. Therefore, PFOB can achieve 33.1%, 72%, and 114.2% higher satisfaction ratio than PFOB-W/O-BDF, PFOB-W/O-BDF+Retr and DIFS respectively in various packet loss probabilities. In Fig. 8(b), the satisfaction ratio of these four methods increases as the number of nodes, and PFOB is better than the other three. It is observed that PFOB achieves 35.7%, 75.7%, and 116% higher satisfaction ratio than other three under different network sizes. This shows that PFOB can still achieve a high Interest satisfaction ratio in the environment with small network size and poor connectivity.

B. Number of Application Retransmissions

Fig. 9.

Number of application retransmissions for various packet loss probabilities and number of nodes.
9.png

Figs. 9(a) and 9(b) show the average number of application retransmissions for various packet loss probabilities and number of nodes, respectively. In ndnSIM, when consumer sends Interest, a retransmission timer is started. If the related Data is not received before retransmission timer expires, consumer will retransmit the Interest. In this experiment, the initial application retransmission timer of consumer is the default value of ndnSIM 2.3. In Fig. 9(a), DIFS shows the highest number, because in the unreliable single-path, each hop transmission failure will lead to the final application layer retransmission. As described in Section IV.A, DIFS has a lower Interest satisfaction ratio, thus increasing the number of retransmissions per request. Under different packet loss probabilities, the number of application retransmissions of PFOB is 25.1%, 28.2%, and 41.9% lower than those of PFOBW/O-BDF, PFOB-W/O-BDF+Retr and DIFS respectively. In Fig. 9(b), when the number of nodes increases, the number of retransmissions of the four methods decreases, and PFOB is better than the other three. PFOB achieves 31.5%, 42.3%, and 45.8% less number of application retransmissions than other three in various network sizes.

C. Interest Satisfaction Delay

Fig. 10.

Interest satisfaction delay for various packet loss probabilities and number of nodes.
10.png

Figs. 10(a) and 10(b) show the average Interest satisfaction delay for various packet loss probabilities and number of nodes, respectively. In Fig. 10(a), as the packet loss probability increases, PFOB shows the lowest delay. The reasons are as follows: 1) Due to the OIF and lightweight retransmission mechanism of PFOB, the reliability of Interest transmission per hop increases, and the loss of the Interest can be discovered and retransmitted earlier, instead of waiting for the consumer’s retransmission timer to expire. Therefore, the delay for Interest to reach the provider is reduced. 2) The BDF node with longer link duration has higher forwarding priority. This mechanism allows the backup path to have better transmission reliability and avoids the simultaneous forwarding of Data, thus reducing the delay due to collisions and retransmission, thus reducing the delay of the entire request. PFOB achieves 58.3%, 59.8%, and 75.5% less delay than other three under different packet loss probabilities. In Fig. 10 (b), we find that when the packet loss probability is fixed and number of nodes decreases, the delay of PFOB does not increase significantly with the decrease of network size as DIFS does, that is to say, PFOB can still maintain a good delay performance when the network size is small. It is observed that PFOB achieves 69.8%, 82%, and 85.5% less delay than other three in various network sizes.

V. CONCLUSIONS

In this paper, we have identified the redundancy and unreliability challenges faced by VNDN forwarding, and proposed PFOB. In PFOB, by considering the signal strength, nodedegree and light retransmission of Interest, the Interest forwarding path with more reliability and accessibility is established. In particular, while establishing the Interest path, some backup multi-path is established to realize the reliable return of Data. Due to the reliable single-path forwarding of Interest and backup multi-path forwarding of Data, PFOB not only solves the flooding problem, but also realizes reliable and effective forwarding of packets in unreliable VANETs environment. Simulation results show that PFOB can significantly improve the content retrieval performance, which achieves 119% higher Interest satisfaction ratio, 46.5% lower number of application retransmissions, and 86% lower Interest satisfaction delay compared with DIFS in the case with moderate wireless reception and network connectivity.

Biography

Danxia Li

Danxia Li is a Ph.D. Candidate of Computer Science of Beijing Institute of Technology. She received the M.S. degree from Xidian University in 2010. She is now working at School of Mathematics and Computer Science of Yan’an University. Her research interests include information-centric networks, wireless ad hoc networks, and vehicular networks.

Biography

Tian Song

Tian Song is an Associate Professor of Computer Science of Beijing Institute of Technology. He received the B.Eng. degree in computer department from Northeastern University, China, in 2002. He obtained his Ph.D. degree from Tsinghua University in 2008. His research interests include network content security, next generation internet and computer architecture.

Biography

Yating Yang

Yating Yang received the B.Eng. degree in Computer Science from the Beijing Institute of Technology, China, in 2016, where she is currently pursuing the Ph.D. degree with the School of Computer Science. Her research interests include next generation Internet architecture, information centric network, edge caching and high-speed network processing. Powered by TCPDF (www.tcpdf.org)

Biography

Islam Rafiq Ul

Islam Rafiq Ul received the Bachelor degree in Computer Science from the University of Science and Technology, Lahore Pakistan, in 2015, Now he is currently pursuing the Master degree in Computer Science and Technology from Beijing Institute of Technology, China. His research interests include next generation Internet architecture, NDN and information centric network, edge computing using NDN as a processing phenomenon.

References

  • 1 J. B. Kenney, "Dedicated short-range communications (DSRC) standards in the United States," Proc. IEEE ., vol. 99, no. 7, pp. 1162-1182, June, 2011.custom:[[[-]]]
  • 2 C. Campolo, A. Molinaro, "Multichannel communications in vehicular ad Hoc networks: A survey," IEEE Commun. Mag., vol. 51, no. 5, pp. 158-169, May, 2013.doi:[[[10.1109/MCOM.2013.6515061]]]
  • 3 M. Amadeo, C. Campolo, A. Molinaro, "Content-centric networking: Is that a solution for upcoming vehicular networks?," in Proc. ACM VANET, pp. 99-102, 2012.custom:[[[-]]]
  • 4 B. Fan, B. Krishnamachari, "Exploiting the wisdom of the crowd: Localized, distributed information-centric V ANETs," IEEE Commun. Mag., vol. 48, no. 5, pp. 138-146, May, 2010.custom:[[[-]]]
  • 5 M. Amadeo, C. Campolo, A. Molinaro, G. Ruggeri, "Content-centric wireless networking: A survey," Comput. Netw., vol. 72, no. 7, pp. 1-13, Oct, 2014.doi:[[[10.1016/j.comnet.2014.07.003]]]
  • 6 G. Tyson, N. Sastry, I. Rimac, "A survey of mobility in informationcentric networks: Challenges and research directions," in Proc. ACM NOM, pp. 1-6, 2012.custom:[[[-]]]
  • 7 J. Wang J, R. Wakikawa, R. Kuntz, R. Vuyyuru, "Data naming in vehicle-to-vehicle communications," in Proc. IEEE INFOCOM, pp. 328-333, 2012.custom:[[[-]]]
  • 8 V. Jacobson et al., "Networking named content," in Proc. ACM CoNEXT, pp. 1-12, 2009.doi:[[[10.1145/2063176.2063204]]]
  • 9 L. X. Zhang, A. Afanasyev, J. Burke, V. Jacobson, "Named data networking," ACM SIGCOMM Comp. Commun. Review, vol. 44, no. 3, pp. 66-73, 2014.doi:[[[10.1145/2656877.2656887]]]
  • 10 G. Grassi, D. Pesavento, G. Pau, "V ANET via named data networking," inINFOCOMWKSHPS, pp. 410-415, 2014.custom:[[[-]]]
  • 11 S. H. Ahmed, S. Bouk, D. Kim, "RUFS: Robust forwarder selection in vehicular content-centric networks," IEEE Commun. Lett., vol. 19, no. 9, pp. 1619-1626, Sept, 2015.doi:[[[10.1109/LCOMM.2015.2451647]]]
  • 12 S. H. Ahmed, S. Bouk, M. A. Yaqub, "DIFS: Distributed interest forwarder selection in vehicular named data networks," IEEE Trasn. Intell. Transportation, pp. 1-5, Nov, 2017.doi:[[[10.1109/TITS.2017.2768329]]]
  • 13 C. Wu, S. Ohzahata, T. Kato, "V ANET broadcast protocol based on fuzzy logic and lightweight retransmission mechanism," IEICE Trans. Commun., vol. 95, no. (B)2, pp. 415-425, 2012.custom:[[[-]]]
  • 14 C. Y. Bian, T. Zhao, X. Li, W. Yan, "Boosting named data networking for data dissemination in urban V ANET scenarios," Veh.Commun., vol. 2, no. 4, pp. 195-207, 2015.custom:[[[-]]]
  • 15 G. Grassi, D. Pesavento, G. Pau, L. Zhang, S. Fdida, "Navigo: Interest forwarding by geolocations in vehicular named data networking," in Proc. IEEE WoWMoM, pp. 1-10, 2015.custom:[[[-]]]
  • 16 Y. T. Yu, X. Li, M. Gerla, M. Sanadidi, "Scalable V ANET content routing using hierarchical bloom filters," WirelessCommun.MobileComput., vol. 15, no. 6, pp. 1001-1014, Apr, 2015.custom:[[[-]]]
  • 17 M. Varvello, I. Rimac, U. Lee, "On the design of content-centric MANETs," inIEEE /IFIPWONS, pp. 1-8, 2011.custom:[[[-]]]
  • 18 L. Wang, A. Afanasyev, R. Kuntz, "Rapid traffic information dissemination using named data," in Proc. ACM MobiHoc NOM WRKSHOP, pp. 7-12, 2012.custom:[[[-]]]
  • 19 S. H. Bouk, I. Sasase, S. H. Ahmed, N. Javaid, "Gateway discovery algorithm based on multiple QoS path parameters between mobile node and gateway node," J. Commun. Networks, vol. 14, no. 4, pp. 434-442, Aug, 2012.doi:[[[10.1109/JCN.2012.6292250]]]
  • 20 C. Wu, S. Ohzahata, Y. Ji, "Joint fuzzy relays and network-codingbased forwarding for multihop broadcasting in V ANETs," IEEE Trans. Intell.TransportationSyst., vol. 16, no. 3, pp. 1415-1427, June, 2015.custom:[[[-]]]
  • 21 D. L. Olson, "Comparison of weights in TOPSIS models," Math.Comput. Modelling, vol. 40, no. 7-8, pp. 721-727, Oct, 2004.doi:[[[10.1016/j.mcm.2004.10.003]]]
  • 22 A. Afanasyev, I. Moiseenko, L. X. Zhang, "ndnSIM: Ndn simulator for NS-3," Tech. Rep. NDN-0005NDN Project, July, 2012.custom:[[[-]]]
  • 23 F. Bai, N. Sadagopan, A. Helmy, "IMPORTANT: A framework to systematically analyze the impact of mobility on performance of routing protocols for adhoc networks," in Proc.IEEE INFOCOM, pp. 825835-825835, 2003.custom:[[[-]]]
  • 24 D. Krajzewicz, J. Erdmann, M. Behrisch, L. Bieker, "Recent development and applications of SUMO-simulation of urban mobility," International J. Advances Syst. Mreasuremetns, vol. 5, no. 3&4, pp. 128-138, Dec, 2012.custom:[[[-]]]
  • 25 P. K. Singh, "Influences of TwoRayGround and Nakagami propagation model for the performance of adhoc routing protocol in V ANET," InternatialJ.Comput.Applicat., vol. 45, no. 22, pp. 1-6, May, 2012.custom:[[[-]]]