Data Forwarding in Opportunistic Networks

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Opportunistic Forwarding in Challenged Networks

LEE, CHUL-HO. Design and Analysis of Opportunistic Forwarding in Challenged Networks. (Under the direction of Dr. Do Young Eun.) Challenged networks are those networks, e.g., mobile opportunistic networks (MONs), a.k.a., delay/disruption tolerant networks, and power-constrained or duty-cycled wireless sensor networks (WSNs), where traditional Internet architectures fail to ensure end-to-end com...

متن کامل

Optimal Data Partitioning and Forwarding in Opportunistic Mobile Networks

In opportunistic mobile networks, existing schemes rely on the assumption that data can be entirely transmitted at each contact. However, in an opportunistic mobile network, the transmission probability exponentially decreases as the data size increases. That is, the contact duration in each contact might be insufficient to deliver large data. Therefore, it is reasonable to partition original d...

متن کامل

Hotspot-entropy based data forwarding in opportunistic social networks

Performance of data forwarding in opportunistic social networks benefits considerably if one canmake use of humanmobility in terms of social contexts. However, it is difficult and time-consuming to calculate the centrality and similarity of nodes by using solutions of traditional social networks analysis, this is mainly because of the transient node contact and the intermittently connected link...

متن کامل

Modelling Social-Aware Forwarding in Opportunistic Networks

Opportunistic networks are one of the most promising evolutions of the traditional Mobile Ad Hoc Networks paradigm. Communications in an opportunistic network rely on the mobility of the users: each message is handed over from node to node, making hop-by-hop decisions to select the node that is better suited for bringing the message closer to its destination. Algorithms exploiting social-awaren...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Information Technology Journal

سال: 2010

ISSN: 1812-5638

DOI: 10.3923/itj.2010.215.223