2020
DOI: 10.1016/j.comcom.2020.04.031
|View full text |Cite
|
Sign up to set email alerts
|

Optimising message broadcasting in opportunistic networks

Abstract: Message Broadcasting in Opportunistic Networks is based on the opportunity of establishing contacts among mobiles nodes for message exchange. Nevertheless, as the amount of information transmitted in a contact is limited by the transmission speed and the contact duration, large messages are less likely to be exchanged, and thus their diffusion is severely limited. Furthermore, these failed transmissions can also lead to an important waste of network resources, since the message transmission is aborted when the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 45 publications
0
7
0
Order By: Relevance
“…In this section, the behaviors of a number of MASS nodes are simulated and examined. The motions of these nodes constitute an opportunistic network [73], where encounters or departures among the MASS nodes occur continuously and randomly, so that the formation of the network are constantly on the change. For two specific MASS nodes, an encounter may lead to the updating of PriBoT.…”
Section: Resultsmentioning
confidence: 99%
“…In this section, the behaviors of a number of MASS nodes are simulated and examined. The motions of these nodes constitute an opportunistic network [73], where encounters or departures among the MASS nodes occur continuously and randomly, so that the formation of the network are constantly on the change. For two specific MASS nodes, an encounter may lead to the updating of PriBoT.…”
Section: Resultsmentioning
confidence: 99%
“…Similar to the solving process of the delivery probability in section ''Message forwarding strategy with same activities,'' we can get the solution of the indirect delivery probability, as shown in formulas ( 12) and ( 13). If l T and l P are not the same link, the indirect delivery probability can be calculated as formula (12), where N l PT = ½T l P i, j ð Þ=T l T i, j ð Þ represents the number of l T when l P does not occur, N l T = ½TTL r =T l T (i, j) represents the number of l T in TTL r , and N l P = ½TTL r =T l P (i, j) represents the number of l P in TTL r .…”
Section: Message Forwarding Strategy Without Same Activitiesmentioning
confidence: 99%
“…Typical algorithms include Epidemic, 9 Spray and Wait, 10 and Spray and Focus. 11 Based on the Epidemic algorithm, Chancay-Garcı´a et al 12 considered that the amount of transmitted information is limited by the transmission speed and contact time and proposed an epidemic extension protocol called Xpread. Similarly, on the basis of the Epidemic algorithm, Chunyue et al 13 proposed an asynchronous sleep mechanism that allows nodes to determine whether to enter the sleep state based on their own energy status, real-time status, and other information.…”
Section: Routing Algorithm Based On Opportunistic Forwardingmentioning
confidence: 99%
“…The implemented artificial intelligence rule-based fire engine calculated buffer occupancy (BO) using equation 1, less congested node (LCN) using equation 2, average congested node (ACN) using equation (3) and high congested node (HCN) using equation 4Buffer occupancy (BO) = Accured Buffer Size Total buffer Size 3100…”
Section: Working Of Aibrbfementioning
confidence: 99%
“…2 In such networks, nodes exchange data using store carry and forward mechanics whenever they came in range of another device that is why it is called opportunistic networks. 3 Due to limited storage capacity of handheld devices in 4G or 5G networks by the end user, only limited amount of data can be transferred. Nodes in 5G networks are, therefore, difficult to implement peer-to-peer communication for data exchange, so a new emerging type of communication via identifying suitable relay node as custodian node using store and forward mechanism is identified for bundle exchange between peers when a best opportunity is found in terms of storage and connectivity.…”
Section: Introductionmentioning
confidence: 99%