BS-5-12 Sticky Transfers for Opportunistic Networks(BS-5. Network and Service Design, Control and Management)
スポンサーリンク
概要
- 論文の詳細を見る
In this paper, we propose the sticky transfer model to enhance successful message transfers in opportunistic networks where hosts transfer buffered messages opportunistically. In the proposed model,'stick' means two mobile devices remain within the communication range of each other beyond the contact duration that would naturally exist between them. To 'stick', nodes may modify movement behavior based on mutual agreements using movement status and preference information when the natural contact duration is not enough. Simulation results show that the network delivery ratio increased by as much as 38%, while the latency decreased by as much as 38% when using sticky transfers. However, using sticky transfers with high probability reduces the performance improvement for flooding based routing protocols due to higher overhead and decreased number of node encounters.
- 2012-08-28
著者
-
Yasmeen Farzana
Department Of Informatics The Graduate University For Advanced Studies
-
Yamada Shigeki
National Inst. Informatics (nii) Tokyo Jpn
-
Huda Nurul
National Institute of Informatics
-
Borcea Cristian
Department of Computer Science, New Jersey Institute of Technology
関連論文
- BS-4-16 Distributing Akaroa2 on PlanetLab(BS-4. System, control and design technologies for emerging network)
- Pricing to Stimulate Node Cooperation in Wireless Ad Hoc Networks(Network)
- Design, Analysis, and Evaluation of Mobile Agent based Privacy Protection Scheme for Multi-party Computation Problems(Selected Papers from ICMU 2006(Third International Conference on Mobile Computing and Ubiquitous Networking))
- An Efficient and Privacy-Aware Meeting Scheduling Scheme Using Common Computational Space(Distributed Cooperation and Agents)
- CoMoRoHo: Cooperative Mobile Router-Based Handover Scheme for Long-Vehicular Multihomed Networks(Mobile Multimedia Communications)
- BS-15-23 Solving Multi-party Collaborative Problems with Privacy Protection(BS-15.Network Planning, Control, and Management,ENGLISH SESSION)
- BS-15-20 Schemes for Network Mobility Management(BS-15.Network Planning, Control, and Management,ENGLISH SESSION)
- Pricing to Improve Cooperation in Wireless Ad Hoc Networks
- Privacy Protection with Customized Java Sandbox Architecture
- Pricing to Improve Cooperation in Wireless Ad Hoc Networks
- Privacy Protection with Customized Java Sandbox Architecture
- BS-8-15 iCOP Model for Personal Privacy Protection(BS-8. Technology and Architecture for Ubiquitous Network Systems,ENGLISH SESSION)
- BS-8-7 Local Route Optimization for Network Mobility (NEMO) Support(BS-8. Technology and Architecture for Ubiquitous Network Systems,ENGLISH SESSION)
- MoRaRo : Mobile Router-Assisted Route Optimization for Network Mobility (NEMO) Support(Mobile Technologies, New Technologies and their Applications of the Internet III)
- Architectural Design of Next-Generation Science Information Network(Advanced Transfer Technologies for the Next Generation Network)
- BS-7-14 On the Risk Measurement for Shared Personal Data(BS-7. Network Planning, Control and Management)
- BS-10-18 On Secondary Uses of Personal Health Records
- BS-4-23 Privacy Issues Related to Smart Health Card Systems(BS-4. System, control and design technologies for emerging network)
- A handover scheme for long-vehicular-multihomed mobile networks (モバイルNWとインターネット/家電NWはどう融合するか?--標準化(DLNA等),モバイルNW,家電NW,情報家電,及び一般)
- BS-10-18 Modelling Incentive for Cooperation in Wireless Ad Hoc Networks(BS-10. Network Planning, Control, and Management)
- BS-10-17 A Framework of Graceful Vertical Handover(BS-10. Network Planning, Control, and Management)
- Maximizing User Satisfaction Based on Mobility in Heterogeneous Mobile Multimedia Communication Networks(Mobile Multimedia Communications)
- Efficient Packet forwarding Strategies via Pricing in Wireless Ad Hoc Networks (日韓合同ワークショップ 1st Korea-Japan Joint Workshop on Ubiquitous Computing and Networking Systems (ubiCNS 2005))
- Evaluation of User-centric Performances to Select an Optimal Access Network in Heterogeneous Systems
- Evaluation of User-centric Performances to Select an Optimal Access Network in Heterogeneous Systems
- Securing Data in Mobile Computing Environment
- Performance Evaluation of Network Mobility (NEMO) Basic Support Protocol and Route Optimization
- Securing Data in Mobile Computing Environment
- Performance Evaluation of Network Mobility (NEMO) Basic Support Protocol and Route Optimization
- Proposal for Context-Aware Information Delivery and Personal Communication Network Architectures with Preliminary Evaluations of Their Performance(Network)
- Effect of Mobility on User Satisfaction in Heterogeneous Wireless Networks
- A Game Theorem-Based Approach to Avoid Malicious Nodes in Mobile Ad hoc Networks
- A Proposal of Context-Aware Information Delivery System in Mobile Environments
- BS-7-22 Encounter-based Routing in Very Sparse Wireless Mobile Networks(BS-7. Network Planning, Control and Management)
- BS-12-38 Effect of Retransmission Timers in Custody-enabled Delay and Disruption-Tolerant Networks(BS-12. Network Planning, Control, and Management)
- BS-10-24 Privacy loss in Multi-agent Negotiation(BS-10. Network Planning, Control, and Management)
- Ubiquitous Computing; Networks and Applications(The IEICE Transactions (publishedin Japanese) Vol. J 86-B, No.6(Communications))
- Access Control for Security and Privacy in Ubiquitous Computing Environments(Ubiquitous Networks)
- BS-4-32 A Study on the Performace of Data Delivery with Message Ferries in Sparse Delay-Tolerant Networks(BS-4. Network Design, Management and Control for Future Networked Systems)
- BS-4-26 Managing Intermittent Connectivity(IC) in Delay Tolerant Network(DTN)(BS-4. System, control and design technologies for emerging network)
- Sequence Set with Three Zero Correlation Zones and Its Application in MC-CDMA System(Sequence Design and its Application in Communications)
- General Method to Construct LS Codes by Complete Complementary Sequences(Wireless Communication Technologies)
- A sender/receiver-coupled Fuzzy Logic System for transmission power control in Wireless Sensor Networks (インターネットアーキテクチャ)
- BS-6-46 Providing Basic Communication Services in a Disaster Stricken Region(BS-6. Planning, Control and Management on Networks and Services)
- BS-6-23 A Clean Slate-based Thin Layer Approach in Delay and Disruption Tolerant Networks(BS-6. Planning, Control and Management on Networks and Services)
- BS-6-10 Using Redundancy to Improve the Performance of Message Ferries in Delay-Tolerant Networks(BS-6. Planning, Control and Management on Networks and Services)
- BS-10-34 A Probabilistic Location-based Routing Scheme for Delay-Tolerant Networks
- BS-3-7 Coping with congestion in opportunistic networks using weighted queuing(BS-3. Management and Control Technologies for Innovative Networks)
- BS-3-42 Comparison of Inter-region Routing Protocols in Delay-Tolerant Networks(BS-3. Management and Control Technologies for Innovative Networks)
- Managing Disconnected Mobile Nodes in a Delay Tolerant Network with HALF Routing Protocol
- BS-5-12 Sticky Transfers for Opportunistic Networks(BS-5. Network and Service Design, Control and Management)
- BS-1-32 On the Software Defined WAN Propagation Latency
- BS-1-10 Utilizing social phenomena and movement pattern in DTN
- An Evaluation of Link Aggregation on OpenFlow Platforms
- GICS : Group-based Internet Connection Spreading Architecture for Disaster Recovery