3. Each mobile robot scans its message buffer
for the “garbage” messages. Garbage
Messages are:
a) the messages, which are too old, e.g.
messages which are not valid, because they
exist longer than the Maximum Delivery
Time parameter dwfines,
b) the messages which cannot be copied
anymore; the message cannot be copied
anymore if the Copy Counter in the message
is equal to the Maximum Number of Message
Copying parameter.
All the garbage messages are moved to the log file
and removed from the mobile robot message buffer.
3. End of Logging. The network scanning is ended
by the human user on demand.
2.2.5 Node Reachability Model
Node Reachability Model is constructed from the
data collected during the network scanning. Node
Reachability Model is defined on the MxMxCl,
where M is the set of the autonomous network nodes
(autonomous robots) and Cl is the union of all the
observation symbols used in HMM Robot Mobility
Models. The elements of the Node Reachability
Model are values of the probability function. Each
value represents the probability than the message
sent from the i-th source node in k-th cluster reaches
the j-th destination node in time less than tmax and
the number of message copying will not be higher
than cmax.
2.3 Routing Algorithm Alpha 09
We proposed the novel opportunistic networking
routing algorithm called ALPHA09. ALPHA09
improves the basic opportunistic networking routing
algorithm by application of HMM Autonomous
Robot Mobility Models described in section 2.2. and
Node Reachability Model described in section 2.3.5.
The detailed description of the algorithm needs more
space than is available in this paper. The next
section presents the most important parts of the
ALPHA09.
2.3.1 How the ALPHA09 Works
Let A be the source node and Z be the destination
node and m be a message generated by the node A.
Let tmax be a maximum delivery time. Let cmax be
a maximal number of a message copying, e.g.
message m sent from the source node A can be most
highly cmax times copyied on its way through the
network until it reaches the destination node Z.
If the source node A meets an unknown node X,
the following steps are done:
1. Node A asks unknown node X for its Id Number;
1a. if IdX IS IdZ, the message m is copied
directly from the node A to the node Z. The
message m was delivered. The acceptation
message is copied from Z to A and m is
removed from the node A memory.
1b. if IdX IS NOT IdZ, then
2. Node A asks node X if it already carries the
message m.
2a if node X carries a message m, the Copy
Count of message m in node X is set to 1.
2b if node X does not carry a message, node A
asks node X for its HMM mobility model.
Node A computes a combined probability of
message m delivery on assumption the
message is copied to the node X. This
combined probability PAX is computed using
the Node Reachability Model and the HMM
Mobility Model of the node X as a sum of the
all probabilities over the set of output
symbols of the HMM Mobility Model of the
node X.
3. Node A compares PAX to Pe;
3a. if PAX >= Pe, the message is copied from
node A to node X.
3b. if PAX < Pe, the message is not copied from
node A to node X. The continue with the step
4.
4. Node A stops the active communication.
Let M be a node, which carries a k-th copy of the
message m generated by the source node A.
If the node M meets an unknown node X, the
following steps are done:
1. Node M asks unknown node X for its Id
Number;
1a if IdX IS IdZ, the message m is copied
directly from the node M to the node Z. The
message m is delivered. The acceptation
message is copied from Z to A and m is
removed from the node A memory.
1b if IdX IS NOT IdZ,
2 Node M compares k and the cmax.
2a If k=cmax-1, the message is not copied and
M stops the active communication.
2b k<cmax-1; the node M asks node X for its
HMM mobility model. Node M computes a
combined probability of message m delivery
on assumption the message is to the node X.
This combined probability PMX is computed
using the Node Reachability Model and the
HMM Mobility Model of the Node X as a
ICPRAM2014-InternationalConferenceonPatternRecognitionApplicationsandMethods
774