An efficient data packet iteration and transmission algorithm in opportunistic social networks

Effective data transmission is a key technology in researching opportunistic networks. Increased data packet transmission among nodes can easily cause the death of nodes, especially in social networks environment. However, effective packet transmission is seldom discussed in existing algorithms in opportunistic networks research. In this study, an efficient data packet iteration and transmission (EDPIT) algorithm, which selects data packets via iteration, is proposed to save energy and overhead during transmission. The effective transmission among nodes in this algorithm improves the transmission rate of data packets. With satisfactory results from simulation and comparison with some existing algorithms, the EDPIT algorithm is found to not only reduce energy consumption but also improve the delivery ratio and overhead in opportunistic social networks.

[1]  Zhigang Chen,et al.  Sensor communication area and node extend routing algorithm in opportunistic networks , 2018, Peer-to-Peer Netw. Appl..

[2]  Andrew Lippman,et al.  CoCam: A collaborative content sharing framework based on opportunistic P2P networking , 2013, 2013 IEEE 10th Consumer Communications and Networking Conference (CCNC).

[3]  Ming Zhao,et al.  SECM: status estimation and cache management algorithm in opportunistic networks , 2018, The Journal of Supercomputing.

[4]  Starr Roxanne Hiltz,et al.  Supporting Opportunities for Context-Aware Social Matching: An Experience Sampling Study , 2016, CHI.

[5]  Klara Nahrstedt,et al.  Context-Aware Crowd-Sensing in Opportunistic Mobile Social Networks , 2015, 2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems.

[6]  Jia Wu,et al.  Diagnosis and Data Probability Decision Based on Non-Small Cell Lung Cancer in Medical System , 2019, IEEE Access.

[7]  Fei Hao,et al.  Social identity–aware opportunistic routing in mobile social networks , 2018, Trans. Emerg. Telecommun. Technol..

[8]  Martin L. Griss,et al.  SensOrchestra: Collaborative Sensing for Symbolic Location Recognition , 2010, MobiCASE.

[9]  Xiaoming Wang,et al.  Incentive Mechanisms for Crowdblocking Rumors in Mobile Social Networks , 2019, IEEE Transactions on Vehicular Technology.

[10]  Margaret Martonosi,et al.  SignalGuru: leveraging mobile phones for collaborative traffic signal schedule advisory , 2011, MobiSys '11.

[11]  Wei Wang,et al.  Poster: An Adaptive Copy Spraying Scheme for Data Forwarding in Mobile Opportunistic Networks , 2015, MobiHoc.

[12]  Wei-Ho Chung,et al.  Enabling Low-Latency Applications in Fog-Radio Access Networks , 2017, IEEE Network.

[13]  Hojung Cha,et al.  User context-based data delivery in opportunistic smartphone networks , 2015, Pervasive Mob. Comput..

[14]  Jia Wu,et al.  Effective Data Communication Based on Social Community in Social Opportunistic Networks , 2019, IEEE Access.

[15]  Xiaodong Liu,et al.  Recognize contextual situation in pervasive environments using process mining techniques , 2011, J. Ambient Intell. Humaniz. Comput..

[16]  Shaojie Tang,et al.  COUPON: A Cooperative Framework for Building Sensing Maps in Mobile Opportunistic Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.

[17]  Guizhu Wang,et al.  Dynamic Spray and Wait Routing Algorithm with Quality of Node in Delay Tolerant Network , 2010, 2010 International Conference on Communications and Mobile Computing.

[18]  Vincenzo Piuri,et al.  Hierarchical-granularity holonic modelling , 2010, J. Ambient Intell. Humaniz. Comput..

[19]  Ramesh Govindan,et al.  Medusa: a programming framework for crowd-sensing applications , 2012, MobiSys '12.

[20]  Fei Hao,et al.  An on-demand coverage based self-deployment algorithm for big data perception in mobile sensing networks , 2018, Future Gener. Comput. Syst..

[21]  Zhigang Chen,et al.  Information cache management and data transmission algorithm in opportunistic social networks , 2018, Wireless Networks.

[22]  Marc Cheong,et al.  A microblogging-based approach to terrorism informatics: Exploration and chronicling civilian sentiment and response to terrorism events via Twitter , 2011, Inf. Syst. Frontiers.

[23]  Stefan Poslad,et al.  Routing algorithm based on social relations in opportunistic networks , 2015 .

[24]  Aravind Srinivasan,et al.  Mobile Data Offloading through Opportunistic Communications and Social Participation , 2012, IEEE Transactions on Mobile Computing.

[25]  Jean-Yves Le Boudec,et al.  Traps and pitfalls of using contact traces in performance studies of opportunistic networks , 2012, 2012 Proceedings IEEE INFOCOM.

[26]  Jia Wu,et al.  Interest Characteristic Probability Predicted Method in Social Opportunistic Networks , 2019, IEEE Access.

[27]  Peng Li,et al.  The impact of node velocity diversity on mobile opportunistic network performance , 2015, J. Netw. Comput. Appl..

[28]  Jia Wu,et al.  Reducing Energy Consumption and Overhead Based on Mobile Health in Big Data Opportunistic Networks , 2017, Wirel. Pers. Commun..

[29]  Karin Anna Hummel,et al.  Preventing spam in opportunistic networks , 2014, Comput. Commun..

[30]  Zhigang Chen,et al.  Effective information transmission based on socialization nodes in opportunistic networks , 2017, Comput. Networks.

[31]  Zhipeng Cai,et al.  A novel approach for inhibiting misinformation propagation in human mobile opportunistic networks , 2017, Peer-to-Peer Netw. Appl..

[32]  Zhigang Chen,et al.  Human Activity Optimal Cooperation Objects Selection Routing Scheme in Opportunistic Networks Communication , 2017, Wirel. Pers. Commun..

[33]  Jia Wu,et al.  Hospital evaluation mechanism based on mobile health for IoT system in social networks , 2019, Comput. Biol. Medicine.

[34]  Jia Wu,et al.  Weight distribution and community reconstitution based on communities communications in social opportunistic networks , 2019, Peer Peer Netw. Appl..