On the self-similar nature of Ethernet traffic (extended version)
IEEE/ACM Transactions on Networking (TON)
Generating representative Web workloads for network and server performance evaluation
SIGMETRICS '98/PERFORMANCE '98 Proceedings of the 1998 ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems
Mobility increases the capacity of ad hoc wireless networks
IEEE/ACM Transactions on Networking (TON)
A delay-tolerant network architecture for challenged internets
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
Convex Optimization
Routing in a delay tolerant network
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
User Mobility for Opportunistic Ad-Hoc Networking
WMCSA '04 Proceedings of the Sixth IEEE Workshop on Mobile Computing Systems and Applications
An In-Depth, Analytical Study of Sampling Techniques for Self-Similar Internet Traffic
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
Social Serendipity: Mobilizing Social Software
IEEE Pervasive Computing
Access and mobility of wireless PDA users
ACM SIGMOBILE Mobile Computing and Communications Review
Pocket switched networks and human mobility in conference environments
Proceedings of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking
PeopleNet: engineering a wireless virtual social network
Proceedings of the 11th annual international conference on Mobile computing and networking
Search-and-Discover in Mobile P2P Network Databases
ICDCS '06 Proceedings of the 26th IEEE International Conference on Distributed Computing Systems
Analysis and implications of student contact patterns derived from campus schedules
Proceedings of the 12th annual international conference on Mobile computing and networking
Stochastic event capture using mobile sensors subject to a quality metric
Proceedings of the 12th annual international conference on Mobile computing and networking
WICON '06 Proceedings of the 2nd annual international workshop on Wireless internet
Understanding urban interactions from bluetooth phone contact traces
PAM'07 Proceedings of the 8th international conference on Passive and active network measurement
Proceedings of the 1st ACM SIGMOBILE workshop on Mobility models
Anonysense: privacy-aware people-centric sensing
Proceedings of the 6th international conference on Mobile systems, applications, and services
Design principles for opportunistic communication in constrained computing environments
Proceedings of the 2008 ACM workshop on Wireless networks and systems for developing regions
Opportunistic DTN routing with window-aware adaptive replication
Proceedings of the 4th Asian Conference on Internet Engineering
The ONE simulator for DTN protocol evaluation
Proceedings of the 2nd International Conference on Simulation Tools and Techniques
Blue-Fi: enhancing Wi-Fi performance using bluetooth signals
Proceedings of the 7th international conference on Mobile systems, applications, and services
Opportunistic energy-efficient contact probing in delay-tolerant applications
IEEE/ACM Transactions on Networking (TON)
Findings from an empirical study of fine-grained human social contacts
WONS'09 Proceedings of the Sixth international conference on Wireless On-Demand Network Systems and Services
An energy-optimal scheme for neighbor discovery in opportunistic networking
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Markov-optimal sensing policy for user state estimation in mobile devices
Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks
Energy-efficient adaptive interface activation for delay/disruption tolerant networks
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
Distributed estimation of global parameters in delay-tolerant networks
Computer Communications
Folksonomy-based reasoning for content dissemination in mobile settings
Proceedings of the 5th ACM workshop on Challenged networks
Routing for disruption tolerant networks: taxonomy and design
Wireless Networks
Fair content dissemination in participatory DTNs
Ad Hoc Networks
Taming the mobile data deluge with drop zones
IEEE/ACM Transactions on Networking (TON)
BeachNet: propagation-based information sharing in mostly static networks
Proceedings of the 3rd Extreme Conference on Communication: The Amazon Expedition
Botnet command and control based on Short Message Service and human mobility
Computer Networks: The International Journal of Computer and Telecommunications Networking
Proceedings of the 8th ACM MobiCom workshop on Challenged networks
Pervasive and Mobile Computing
Adaptive role switching for fair and efficient battery usage in device-to-device communication
ACM SIGMOBILE Mobile Computing and Communications Review
Hi-index | 0.00 |
In many delay tolerant applications, information is opportunistically exchanged between mobile devices who encounter each other. In order to effect such information exchange, mobile devices must have knowledge of other devices in their vicinity. We consider scenarios in which there is no infrastructure and devices must probe their environment to discover other devices. This can be an extremely energy consuming process and highlights the need for energy conscious contact probing mechanisms. If devices probe very infrequently, they might miss many of their contacts. On the other hand, frequent contact probing might be energy inefficient. In this paper, we investigate the trade-off between the probability of missing a contact and the contact probing frequency. First, via theoretical analysis, we characterize the trade-off between the probability of a missed contact and the contact probing interval for stationary processes. Next, for time varying contact arrival rates, we provide an optimization framework to compute the optimal contact probing interval as a function of the arrival rate. We characterize real world contact patterns via Bluetooth phone contact logging experiments and show that the contact arrival process is self-similar. We design STAR, a contact probing algorithm which adapts to the contact arrival process. Via trace driven simulations on our experimental data, we show that STAR consumes three times less energy when compared to a constant contact probing interval scheme.