A delay-tolerant network architecture for challenged internets
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
CoolSpots: reducing the power consumption of wireless mobile devices with multiple radio interfaces
Proceedings of the 4th international conference on Mobile systems, applications and services
Proceedings of the 2006 SIGCOMM workshop on Challenged networks
Proceedings of the second ACM workshop on Challenged networks
ACM SIGMOBILE Mobile Computing and Communications Review
Searching for content in mobile DTNs
PERCOM '09 Proceedings of the 2009 IEEE International Conference on Pervasive Computing and Communications
IEEE Internet Computing
Floating content: Information sharing in urban areas
PERCOM '11 Proceedings of the 2011 IEEE International Conference on Pervasive Computing and Communications
WiFi-Opp: ad-hoc-less opportunistic networking
CHANTS '11 Proceedings of the 6th ACM workshop on Challenged networks
Establishing mobile ad-hoc networks in 802.11 infrastructure mode
CHANTS '11 Proceedings of the 6th ACM workshop on Challenged networks
Social networking in a disconnected network: fbDTN: facebook over DTN
CHANTS '11 Proceedings of the 6th ACM workshop on Challenged networks
Opportunistic content sharing applications
Proceedings of the 1st ACM workshop on Emerging Name-Oriented Mobile Networking Design - Architecture, Algorithms, and Applications
SCAMPI: service platform for social aware mobile and pervasive computing
Proceedings of the first edition of the MCC workshop on Mobile cloud computing
Hi-index | 0.00 |
Opportunistic networking between mobile devices relies on the capabilities of those devices to establish ad-hoc communication among each other. While the two dominant wireless interface technologies, IEEE 802.11 wireless LAN and Bluetooth, offer such capabilities in theory, limitations of the protocol specification, chipsets, and operating systems in mobile devices render those features largely unusable in practice. Researchers have recognized these shortcomings and devised mechanisms in which mobile devices act as WLAN access points to simulate WLAN infrastructure-based operation. In this paper, we complement these approaches by instrumenting commercial WLAN APs that do not employ L2 security to serve as link layer packet relays without requiring the mobile nodes to authenticate with the WLAN hot-spot. We present different mechanisms for peer discovery, evaluate their feasibility for a set of commercial hot-spots, and discuss operational considerations for fair use of commercial access points.