Opportunistic Networks

نویسنده

  • Andreas Heinemann
چکیده

A predominant concern in ubiquitous computing (UC) is the natural and effortless interaction of humans with a smart environment in order to carry out a certain task or simply to make life easier. Often, interaction is bootstrapped with a user’s personal, mobile device. Such a device may carry a digital representation in form of a user profile and a key pair that serves as a digital identity. Examples of devices are personal digital assistants (PDAs) or mobile phones. Especially the mobile phone plays a prominent role since it has conquered our everyday life and is basically ubiquitously available for the user. More and more mobile phones and PDAs are equipped with short range wireless communication capabilities. In most cases, either Bluetooth (Bluetooth SIG Inc., 2003-2005) or 802.11b WiFi technology (IEEE, 1999) is integrated. The prevalent use of wireless connectivity is to synchronize personal data between a mobile device and a desktop computer (via Bluetooth) or have easy access to an institution’s network (via a 802.11 WiFi Wireless Access Point) and further to the Internet. But in addition, with the integration of abstract

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improving Performance of Opportunistic Routing Protocol using Fuzzy Logic for Vehicular Ad-hoc Networks in Highways

Vehicular ad hoc networks are an emerging technology with an extensive capability in various applications including vehicles safety, traffic management and intelligent transportation systems. Considering the high mobility of vehicles and their inhomogeneous distributions, designing an efficient routing protocol seems necessary. Given the fact that a road is crowded at some sections and is not c...

متن کامل

ONEChat: An Efficient Group Chatting Platform for Opportunistic Networks

With the increasing deployment of wireless networks, opportunistic networks are already becoming commonplace due to the limitation of Internet access points. As a result, developing communication tools for opportunistic networks is necessary. Due to the fact that existing applications can not support group chatting efficiently for opportunistic networks, we propose ONEChat to address this issue...

متن کامل

Routing and Forwarding Protocols in Wireless Multi-hop Ad-hoc Networks in Context of Opportunistic Networks: An Analysis

In recent years opportunistic networks have gain popularity in research and industry. In these networks, nodes come into contact with each other opportunistically and communicate wirelessly. An opportunistic network consists of nodes. These nodes are typically handheld devices carried by people which are equipped with large memory, good sensing capability, high computational power with short-ra...

متن کامل

ONEChat: Enabling Group Chat and Messaging in Opportunistic Networks

Opportunistic networks, which are wireless network ”islands” formed when transient and highly mobile nodes meet for a short period of time, are becoming commonplace as wireless devices become more and more popular. It is thus imperative to develop communication tools and applications that work well in opportunistic networks. In particular, group chat and instant messaging applications are parti...

متن کامل

Adaptive Spray Routing for Opportunistic Networks

opportunistic networks are sparse wireless networks where most of the time there is no INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS VOL. 6, NO. 1, FEBRUARY 2013

متن کامل

Using emulation to validate applications on opportunistic networks

The increasing trend on wireless-connected devices makes opportunistic networking a promising alternative to existing infrastructure-based networks. However, on these networks there is neither guarantee about the availability of the connections nor on the topology of the network. The development of opportunistic applications, i.e., applications running over opportunistic networks, is still in e...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008