Proceedings of the 10th international conference on Architectural support for programming languages and operating systems
Routing in a delay tolerant network
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
Pocket switched networks and human mobility in conference environments
Proceedings of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking
Theory, Volume 1, Queueing Systems
Theory, Volume 1, Queueing Systems
Data collection, storage, and retrieval with an underwater sensor network
Proceedings of the 3rd international conference on Embedded networked sensor systems
Practical Routing in Delay-Tolerant Networks
IEEE Transactions on Mobile Computing
DTN routing as a resource allocation problem
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
Crossing over the bounded domain: from exponential to power-law inter-meeting time in MANET
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Power law and exponential decay of inter contact times between mobile devices
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Study of a bus-based disruption-tolerant network: mobility modeling and impact on routing
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Social network analysis for routing in disconnected delay-tolerant MANETs
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
Characterizing pairwise inter-contact patterns in delay tolerant networks
Proceedings of the 1st international conference on Autonomic computing and communication systems
Bubble rap: social-based forwarding in delay tolerant networks
Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing
Threshold based locking routing strategy for delay tolerant network
Wireless Networks
Contact quality based forwarding strategy for delay tolerant network
Journal of Network and Computer Applications
Secure Multi-copy Routing in Compromised Delay Tolerant Networks
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
Opportunistic forwarding protocols take advantage of contact opportunities to route data in intermittently connected environments. In these environments, a fully connected path between the source and destination may not always exist and the contact schedules of all the nodes are not known in advance. Hence, one of the key challenges for a node is to make effective forwarding decisions using only a limited knowledge of the contact behavior of the nodes in the network. Based on an analysis of human mobility traces that we collected from our office environment, we introduce a new link metric, conditional residual time, that accurately estimates the time remaining for a pair of nodes to meet using only the local knowledge of their past contacts. We then propose a distributed protocol called CREST, that uses the conditional residual time to opportunistically forward messages between pairs of nodes. Experimental results show that CREST has a lower end-to-end delay compared to protocols that depend on future contact schedules and global knowledge of the contact behavior across the network. Furthermore, by disseminating only a few additional copies of the message, the delivery ratio of CREST improves significantly and is comparable to that of the flooding protocol.