Improving Message Delivery Performance in Opportunistic Networks Using a Forced-Stop Diffusion Scheme

The performance of mobile opportunistic networks strongly depends on contact duration. If the contact lasts less than the required transmission times, some messages will not get delivered, and the whole diffusion scheme will be seriously affected.

[1]  Tzu-Chieh Tsai,et al.  NCCU Trace: social-network-aware mobility trace , 2015, IEEE Communications Magazine.

[2]  Stefano Ferretti,et al.  Shaping opportunistic networks , 2013, Comput. Commun..

[3]  Ronaldo Moreira Salles,et al.  Modeling message diffusion in epidemical DTN , 2014, Ad Hoc Networks.

[4]  Juan-Carlos Cano,et al.  Power consumption evaluation in vehicular opportunistic networks , 2015, 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC).

[5]  Marco Conti,et al.  Modelling data dissemination in opportunistic networks , 2008, CHANTS '08.

[6]  Mehul Shah,et al.  Performance Evaluation of Efficient Routing Protocols in Delay Tolerant Network under Different Human Mobility Models , 2015 .

[7]  R.S.D. Wahidabanu,et al.  Buffer Management For Preferential Delivery In Opportunistic Delay Tolerant Networks , 2011 .

[8]  Vijay Erramilli,et al.  Forwarding in opportunistic networks with resource constraints , 2008, CHANTS '08.

[9]  Juan-Carlos Cano,et al.  Evaluating the Impact of Data Transfer Time in Contact-Based Messaging Applications , 2015, IEEE Communications Letters.

[10]  Floriano De Rango,et al.  Epidemic Strategies in Delay Tolerant Networks from an Energetic Point of View: Main Issues and Performance Evaluation , 2015, J. Networks.

[11]  V. V. Neena,et al.  Performance analysis of epidemic routing protocol for opportunistic networks in different mobility patterns , 2013, 2013 International Conference on Computer Communication and Informatics.

[12]  Kwan-Wu Chin,et al.  A Unified Study of Epidemic Routing Protocols and their Enhancements , 2012, 2012 IEEE 26th International Parallel and Distributed Processing Symposium Workshops & PhD Forum.

[13]  Ahmed Helmy,et al.  On the efficacy of mobility modeling for DTN evaluation: Analysis of encounter statistics and spatio-temporal preferences , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.

[14]  Eyal de Lara,et al.  User mobility for opportunistic ad-hoc networking , 2004, Sixth IEEE Workshop on Mobile Computing Systems and Applications.

[15]  Norman M. Sadeh,et al.  Predict and spread: An efficient routing algorithm for opportunistic networking , 2011, 2011 IEEE Wireless Communications and Networking Conference.

[16]  Valeria Loscrì,et al.  Controlled mobility in mobile sensor networks: advantages, issues and challenges , 2013, Telecommun. Syst..

[17]  Anna Förster,et al.  On context awareness and social distance in human mobility traces , 2012, MobiOpp '12.

[18]  Marco Conti,et al.  Opportunistic networking: data forwarding in disconnected mobile ad hoc networks , 2006, IEEE Communications Magazine.

[19]  Jörg Ott,et al.  The ONE simulator for DTN protocol evaluation , 2009, SIMUTools 2009.

[20]  Vassilis Tsaoussidis,et al.  Exploiting the potential of DTN for energy-efficient internetworking , 2014, J. Syst. Softw..

[21]  Timothy Sohn,et al.  A large scale study of text-messaging use , 2010, Mobile HCI.

[22]  Daeyoung Park,et al.  Coordinating transmit power and carrier phase for wireless networks with multi-packet reception capability , 2013, EURASIP J. Wirel. Commun. Netw..

[23]  Daru Pan,et al.  A comprehensive-integrated buffer management strategy for opportunistic networks , 2013, EURASIP J. Wirel. Commun. Netw..