2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012) 2012
DOI: 10.1109/comsnets.2012.6151324
|View full text |Cite
|
Sign up to set email alerts
|

Performance modeling of routing in delay-tolerant networks with node heterogeneity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 16 publications
0
6
0
Order By: Relevance
“…The authors considered a network of heterogeneous devices, where different types of malware can only attack the systems they are targeted for. Manam et al [18] presents the performance modelling of two routing protocols (two-hop and epidemic) by considering the nodes to have heterogeneous transmission ranges. The delivery latency of the messages was found to decrease with the increasing transmission ranges of the nodes.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The authors considered a network of heterogeneous devices, where different types of malware can only attack the systems they are targeted for. Manam et al [18] presents the performance modelling of two routing protocols (two-hop and epidemic) by considering the nodes to have heterogeneous transmission ranges. The delivery latency of the messages was found to decrease with the increasing transmission ranges of the nodes.…”
Section: Related Workmentioning
confidence: 99%
“…A walk through of the existing works reveal that there is a lack of 'comprehensive approach' to address the heterogeneity, and its impacts, on PSNs, or DTNs, in general. Besides, while works in [15,16,18] focus on the reduction of communication opportunities in the network, heterogeneity of certain aspects (e.g. incompatible network devicesin absence of any bridging [12], and routing protocols) turn available communication opportunities useless.…”
Section: Related Workmentioning
confidence: 99%
“…This approach contacts the node that is receiving the message during flooding. Several advanced proposals have replaced topological information with higher-level information while attempting to limit flooding cost [10][11][12][13][14].…”
Section: Introductionmentioning
confidence: 99%
“…Such works showed that unrestricted buffers and epidemic routing will provide the best delivery ratio [10], even though the number of message copies increases exponentially, as predicted by the SIR (Susceptible-Infected-Recovered) model [13]. The buffer occupancy is usually not considered a problem, or one of less importance, to the point that most of the related work assumes infinite buffers [3]- [9], [14]- [17]. Heterogeneous ICTs, either for pairs [9], [15], [16] or groups [5], [14], [17] of nodes, are also rarely considered.…”
Section: Introductionmentioning
confidence: 99%
“…The buffer occupancy is usually not considered a problem, or one of less importance, to the point that most of the related work assumes infinite buffers [3]- [9], [14]- [17]. Heterogeneous ICTs, either for pairs [9], [15], [16] or groups [5], [14], [17] of nodes, are also rarely considered. A more detailed literature overview can be found in Table I. We focus our work on a specific type of sensor network where mobile nodes perform a measurement and then transmit their data by message forwarding among their peers.…”
Section: Introductionmentioning
confidence: 99%