Advertisement

Social Aspects to Support Opportunistic Networks in an Academic Environment

  • Radu Ioan Ciobanu
  • Ciprian Dobre
  • Valentin Cristea
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7363)

Abstract

As wireless and 3G networks become more crowded, users with mobile devices have difficulties in accessing the network. Opportunistic networks, created between mobile phones using local peer-to-peer connections, have the potential to solve such problems by dispersing some of the traffic to neighboring smartphones. Recently various opportunistic routing or dissemination algorithms were proposed and evaluated in different scenarios emulating real-world phenomena as close as possible. In this paper we present an experiment performed at the Politehnica University of Bucharest in which we collected social and mobiltity data to evaluate opportunistic routing and dissemination algorithms. We present an analysis of our findings, highlighting key social and mobility behavior factors that can influence such opportunistic solutions. Most importantly, we show that by adding knowledge such as social links between participants in an opportunistic network routing and dissemination algorithms can be greatly improved.

Keywords

Mobile Device Community Detection External Device Delay Tolerant Network Opportunistic Network 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    McNett, M., Voelker, G.M.: Access and mobility of wireless PDA users. SIGMOBILE Mob. Comput. Commun. Rev. 7, 55–57 (2003)CrossRefGoogle Scholar
  2. 2.
    Henderson, T., Kotz, D., Abyzov, I.: The changing usage of a mature campus-wide wireless network. In: Proc. of the 10th Annual Int. Conf. on Mobile Computing and Networking, MobiCom 2004, pp. 187–201. ACM, New York (2004)CrossRefGoogle Scholar
  3. 3.
    Hui, P., Chaintreau, A., Scott, J., Gass, R., Crowcroft, J., Diot, C.: Pocket switched networks and human mobility in conference environments. In: Proc. of the 2005 ACM SIGCOMM Workshop on Delay-tolerant Networking, WDTN 2005, pp. 244–251. ACM, New York (2005)CrossRefGoogle Scholar
  4. 4.
  5. 5.
    Musolesi, M., Mascolo, C.: Designing mobility models based on social network theory. SIGMOBILE Mob. Comput. Commun. Rev. 11, 59–70 (2007)CrossRefGoogle Scholar
  6. 6.
    Boldrini, C., Passarella, A.: HCMM: Modelling spatial and temporal properties of human mobility driven by users’ social relationships. Comput. Commun. 33, 1056–1074 (2010)CrossRefGoogle Scholar
  7. 7.
    Karamshuk, D., Boldrini, C., Conti, M., Passarella, A.: Human mobility models for opportunistic networks. IEEE Comm. Magazine 49(12), 157–165 (2011)CrossRefGoogle Scholar
  8. 8.
    Conti, M., Giordano, S., May, M., Passarella, A.: From opportunistic networks to opportunistic computing. Comm. Mag. 48, 126–139 (2010)CrossRefGoogle Scholar
  9. 9.
    Hui, P., Crowcroft, J., Yoneki, E.: BUBBLE Rap: social-based forwarding in delay tolerant networks. In: Proc. of the 9th ACM Int. Symp. on Mobile ad Hoc Networking and Computing, MobiHoc 2008, pp. 241–250. ACM, New York (2008)CrossRefGoogle Scholar
  10. 10.
    Nguyen, H.A., Giordano, S., Puiatti, A.: Probabilistic routing protocol for intermittently connected mobile ad hoc network (propicman). In: 2007 IEEE Int. Symp. on a World of Wireless Mobile and Multimedia Networks, pp. 1–6 (2007)Google Scholar
  11. 11.
    Boldrini, C., Conti, M., Jacopini, J., Passarella, A.: HiBOp: a History Based Routing Protocol for Opportunistic Networks. In: IEEE Int. Symp. on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2007, pp. 1–12 (2007)Google Scholar
  12. 12.
    Yoneki, E., Hui, P., Chan, S., Crowcroft, J.: A socio-aware overlay for publish/subscribe communication in delay tolerant networks. In: Proc. of the 10th ACM Symp. on Modeling, Analysis, and Simulation of Wireless and Mobile Systems, MSWiM 2007, pp. 225–234. ACM, New York (2007)CrossRefGoogle Scholar
  13. 13.
    Lenders, V., May, M., Karlsson, G., Wacha, C.: Wireless ad hoc podcasting. SIGMOBILE Mob. Comput. Commun. Rev. 12, 65–67 (2008)CrossRefGoogle Scholar
  14. 14.
    Pop, F.: A fault tolerant decentralized scheduling in large scale distributed systems. In: Antonopoulos, N., Exarchakos, G., Li, M., Liotta, A. (eds.) Handbook of Research on P2P and Grid Systems for Service-Oriented Computing: Models, Methodologies and Applications. Info. Science Ref., pp. 566–589 (2010)Google Scholar
  15. 15.
    Boldrini, C., Conti, M., Passarella, A.: Exploiting users’ social relations to forward data in opportunistic networks: The HiBOp solution. Pervasive Mob. Comput. 4, 633–657 (2008)CrossRefGoogle Scholar
  16. 16.
    Ciobanu, R., Dobre, C.: Data dissemination in opportunistic networks. In: 18th Int. Conf. on Control Systems and Computer Science, CSCS-18, pp. 529–536 (2011)Google Scholar
  17. 17.
    Bigwood, G., Rehunathan, D., Bateman, M., Henderson, T., Bhatti, S.: Exploiting self-reported social networks for routing in ubiquitous computing environments. In: Proc. of the 2008 IEEE Int. Conf. on Wireless & Mobile Computing, Networking & Comm., pp. 484–489. IEEE Computer Society, Washington, USA (2008)CrossRefGoogle Scholar
  18. 18.
    Boldrini, C., Conti, M., Delmastro, F., Passarella, A.: Context- and social-aware middleware for opportunistic networks. J. Netw. Comput. Appl. 33(5), 525–541 (2010)CrossRefGoogle Scholar
  19. 19.
  20. 20.
    Ferro, E., Potorti, F.: Bluetooth and Wi-Fi wireless protocols: a survey and a comparison. IEEE Wireless Comm. 12(1), 12–26 (2005)CrossRefGoogle Scholar
  21. 21.
    Chaintreau, A., Hui, P., Crowcroft, J., Diot, C., Gass, R., Scott, J.: Pocket Switched Networks: Real-world mobility and its consequences for opportunistic forwarding. Technical report, University of Cambridge, Computer Lab (2005)Google Scholar
  22. 22.
    Hui, P., Yoneki, E., Chan, S.Y., Crowcroft, J.: Distributed community detection in delay tolerant networks. In: Proc. of 2nd ACM/IEEE Inter. Workshop on Mobility in the Evolving Internet Architecture, MobiArch 2007, pp. 7:1–7:8. ACM, New York (2007)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Radu Ioan Ciobanu
    • 1
  • Ciprian Dobre
    • 1
  • Valentin Cristea
    • 1
  1. 1.Faculty of Automatic Control and ComputersUniversity Politehnica of BucharestRomania

Personalised recommendations