Protocols, mobility models and tools in opportunistic networks: A survey

被引:87
作者
Mota, Vinicius F. S. [1 ,2 ]
Cunha, Felipe D. [1 ]
Macedo, Daniel F. [1 ]
Nogueira, Jose M. S. [1 ]
Loureiro, Antonio A. F. [1 ]
机构
[1] Univ Fed Minas Gerais, Dept Comp Sci, Belo Horizonte, MG, Brazil
[2] Univ Paris Est, Comp Sci Lab LIGM, Champs Sur Marne, France
关键词
Opportunistic networks; Delay-tolerant networks; Context-awareness; Vehicular ad hoc networks; Pocket switched networks; AD-HOC NETWORKS; DELAY-TOLERANT NETWORKS; CONTEXT INFORMATION; IMPACT;
D O I
10.1016/j.comcom.2014.03.019
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In opportunistic networks, instead of assuming an end-to-end path as in the traditional Internet model, messages are exchanged opportunistically when an encounter happens between two nodes. In the last years, several forwarding algorithms to efficiently decide when to forward messages were proposed. Those protocols are commonly suitable to a specific scenario, which has led to the creation of new sub-types of networks. Two different examples are pocket switched networks - PSN and vehicular networks VANETs, since those networks have different features like a specific mobility pattern and intermittent connectivity. In this article we present an overview of opportunistic networks, proposing a taxonomy which encompasses those new types of network. We discuss the commonly used tools, simulators, contact traces, mobility models and applications available. Moreover, we analyzed a set of forwarding protocols to map the approach used by the research community to evaluate their proposals in terms of mobility, contacts and traffic pattern, reliability of simulations and practical projects. We show that although researchers are making efforts to use more realistic contact models (e.g., using real traces) the traffic pattern is generally disregarded, using assumptions that may not fit real applications. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:5 / 19
页数:15
相关论文
共 112 条
[11]  
[Anonymous], 2003, P 4 ACM INT S MOB AD
[12]  
[Anonymous], 2011, 3 INT C ADV SYST SIM
[13]  
[Anonymous], 2010 P IEEE INFOCOM
[14]  
[Anonymous], 2000, EPIDEMIC ROUTING PAR
[15]  
[Anonymous], 2013, COMM RES ARCH WIR DA
[16]  
Arkko J., 2012, P 4 EXTR C COMM ALP
[17]  
Basher N., 2008, WWW 08, P287, DOI DOI 10.1145/1367497.1367537
[18]   Context- and social-aware middleware for opportunistic networks [J].
Boldrini, C. ;
Conti, M. ;
Delmastro, F. ;
Passarella, A. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2010, 33 (05) :525-541
[19]   Exploiting users' social relations to forward data in opportunistic networks: The HiBOp solution [J].
Boldrini, Chiara ;
Conti, Marco ;
Passarella, Andrea .
PERVASIVE AND MOBILE COMPUTING, 2008, 4 (05) :633-657
[20]  
Boldrini C, 2007, I S WORLD WIREL MOBI, P78