2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) 2013
DOI: 10.1109/infcomw.2013.6562898
|View full text |Cite
|
Sign up to set email alerts
|

The strength of vicinity annexation in opportunistic networking

Abstract: Abstract-Most disruption-tolerant networking protocols available have focused on mere contact and intercontact characteristics to make forwarding decisions. We propose to relax such a simplistic approach and include multi-hop opportunities by annexing a node's vicinity to its network vision. We investigate how the vicinity of a node evolves through time and whether such information is useful when routing data. By analyzing a modified version of the pure WAIT forwarding strategy, we observe a clear tradeoff bet… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
4
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
3
3

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 23 publications
(9 reference statements)
1
4
0
Order By: Relevance
“…Hence, probing your 4-vicinity is enough to get most of the arrivals patterns in a node's surrounding. We confirm our previous finding on the optimal limit of κ-vicinity probing [13].…”
Section: Birth In the κ-Vicinitysupporting
confidence: 92%
“…Hence, probing your 4-vicinity is enough to get most of the arrivals patterns in a node's surrounding. We confirm our previous finding on the optimal limit of κ-vicinity probing [13].…”
Section: Birth In the κ-Vicinitysupporting
confidence: 92%
“…We wish to point out that some recent work highlights the benefit of the vicinity knowledge in terms of routing over opportunistic networks . In particular, Tiphaine Phe‐Neau et al , demonstrate the benefit of knowing neighbor nodes located within k hops from a source and call it k −vicinity knowledge. In a certain manner, DQN lays on the same property by limiting the spread of its number of copies within a number of hops as explained in the following algorithm.…”
Section: Dqn Algorithmmentioning
confidence: 99%
“…Phe-Neau et al considered the multi-hop communication opportunities around a node's vicinity in [29]. However, in their approach, multi-hop communication opportunities around a node are only utilized when the destination of the data is within the node's vicinity, which is basically a WAIT strategy and then it does not contain mechanisms to make the data reach more nodes and get closer to the destination.…”
Section: ) Comparisons With R3mentioning
confidence: 99%