2013 Proceedings IEEE INFOCOM 2013
DOI: 10.1109/infcom.2013.6567166
|View full text |Cite
|
Sign up to set email alerts
|

The strength of vicinity annexation in opportunistic networking

Abstract: Abstract-Most disruption-tolerant networking protocols available have focused on mere contact and intercontact characteristics to make forwarding decisions. We propose to relax such a simplistic approach and include multi-hop opportunities by annexing a node's vicinity to its network vision. We investigate how the vicinity of a node evolves through time and whether such information is useful when routing data. By analyzing a modified version of the pure WAIT forwarding strategy, we observe a clear tradeoff bet… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
13
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(14 citation statements)
references
References 15 publications
(7 reference statements)
1
13
0
Order By: Relevance
“…First the efficient content dissemination is mostly due to high contact rate nodes [26]. Second setting a device's neighbourhood view more than 2 hops does not improve the forwarding efficiency and even dramatically increases data redundancy [27]. Therefore, for evaluating a device 's possibility of contacting a destination, the device also stores its adjacent clusters , besides storing its transient cluster .…”
Section: Transient Cluster Detection Methodmentioning
confidence: 99%
“…First the efficient content dissemination is mostly due to high contact rate nodes [26]. Second setting a device's neighbourhood view more than 2 hops does not improve the forwarding efficiency and even dramatically increases data redundancy [27]. Therefore, for evaluating a device 's possibility of contacting a destination, the device also stores its adjacent clusters , besides storing its transient cluster .…”
Section: Transient Cluster Detection Methodmentioning
confidence: 99%
“…Simplicity of the metric is the main advantage, which requires only information about existence of a path. This metric is motivated by the fact that nodes information beyond one-hop contacts, i.e., kvicinity knowledge, has been shown to be a key ingredient to improve opportunistic network forwarding [30].…”
Section: Global Metricsmentioning
confidence: 99%
“…Thus, protocols may either be enhanced or unenhanced. The enhanced category mainly comprises of two forms: (i) resource management, which constitutes methods to conserve and optimize the use of node and network resources (e.g., coding-based approaches [78], resource allocation [23], delivery acknowledgements [79], and preference according to the age of messages [23]); and (ii) performance optimization, which includes approaches aimed at achieving optimal performance of the protocol (e.g., k-vicinity awareness [80], improved spraying heuristics based on certain qualities presented by the next-hop; for instance a hop that is likely to encounter even better forwarders may be given more quota [17]). …”
Section: Taxonomies For Psn Routing Protocolsmentioning
confidence: 99%