Age matters: efficient route discovery in mobile ad hoc networks using encounter ages
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Wearable Computers as Packet Transport Mechanisms in Highly-Partitioned Ad-Hoc Networks
ISWC '01 Proceedings of the 5th IEEE International Symposium on Wearable Computers
Probabilistic routing in intermittently connected networks
ACM SIGMOBILE Mobile Computing and Communications Review
Routing in a delay tolerant network
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
Practical routing in delay-tolerant networks
Proceedings of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking
DTN routing in a mobility pattern space
Proceedings of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking
Prioritized epidemic routing for opportunistic networks
Proceedings of the 1st international MobiSys workshop on Mobile opportunistic networking
Experiences from measuring human mobility using Bluetooth inquiring devices
MobiEval '07 Proceedings of the 1st international workshop on System evaluation for mobile platforms
Impact of Human Mobility on Opportunistic Forwarding Algorithms
IEEE Transactions on Mobile Computing
DTN routing as a resource allocation problem
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
Social network analysis for routing in disconnected delay-tolerant MANETs
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
Diversity of forwarding paths in pocket switched networks
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
Efficient routing in intermittently connected mobile networks: the single-copy case
IEEE/ACM Transactions on Networking (TON)
Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing
Controlling resource hogs in mobile delay-tolerant networks
Computer Communications
Routing for disruption tolerant networks: taxonomy and design
Wireless Networks
Summary-invisible networking: techniques and defenses
ISC'10 Proceedings of the 13th international conference on Information security
Hi-index | 0.00 |
Effective forwarding in mobile opportunistic networks is a challenge, given the unpredictable mobility of nodes, short contact durations between nodes, wireless interference and limited buffer sizes. Most forwarding algorithms aim at decreasing costs (relative to flooding the network) by forwarding only to nodes which are likely to be good relays. While it is non-trivial to decide if an encountered node is a good relay or not at the moment of encounter, it is harder still to prioritize which messages to transmit under the presence of short contact durations and which messages to drop when buffers become full. The main objective of this paper is to study different message prioritization schemes using real measurements. Such schemes can be broadly divided into two categories - schemes which do not use any network information, and schemes which do. Examples of the former set of schemes include FIFO/LIFO etc. For the latter set of schemes, there is a key design choice: On one hand, we have the following scheme: when a forwarding opportunity presents itself, assign high priorities to messages which are relatively close to their intended destination. On the other hand, we can assign high priorities to messages which are farther away from their destination than closer messages. In order to decide if messages are close to their destination or not, we have to rely on a forwarding algorithm. For this, we use delegation forwarding schemes which have been shown to be efficient in terms of cost incurred in the network. We develop a new set of prioritization schemes based on delegation schemes. We consider these schemes in our empirical study.