iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://unpaywall.org/10.1007/978-3-319-22572-2_13
Exploiting Communication Opportunities in Disrupted Network Environments | SpringerLink
Skip to main content

Exploiting Communication Opportunities in Disrupted Network Environments

  • Conference paper
  • First Online:
Wired/Wireless Internet Communications (WWIC 2015)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 9071))

Included in the following conference series:

Abstract

The capability of a mobility model to detect certain patterns of user behavior (e.g., favorite walks or walking habits) enables solutions for a number of challenging networking problems, including efficient opportunistic communications and handoff/cellular planning. We argue that the limited viewpoint of a single mobile node and its scarce resources (e.g., energy, memory or processing) are major obstacles for accurate estimations. Targeting at hybrid network environments, we offload prediction capabilities to the fixed nodes that may be available in the area, offering a global view and the capability of resource-demanding calculations.

Here, we introduce a solution running on top of the infrastructure nodes that: (i) implements a mobility model which provides a number of mobility forecasts to the mobile users in the area, (ii) supports proactively the routing decisions of opportunistic mobile devices being taken at times there is not connectivity. We introduce the corresponding semi-Markov model and demonstrate its efficiency using scenarios deployed in a pre-selected city center, where a number of mobile nodes seek for Internet access.

L. Mamatas carried out his main contribution in this paper during his employment at the Democritus University of Thrace, Greece.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. CRAWDAD, a community resource for archiving wireless data at Dartmouth. http://crawdad.cs.dartmouth.edu

  2. OpenStreetMap - the free wiki world map. http://www.openstreetmap.org

  3. Balasubramanian, A., Mahajan, R., Venkataramani, A.: Augmenting mobile 3G using WiFi. In: Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services, MobiSys 2010, New York, NY, USA, pp. 209–222 (2010)

    Google Scholar 

  4. Banerjee, N., Corner, M., Levine, B.: An energy-efficient architecture for DTN throwboxes. In: 26th IEEE International Conference on Computer Communications (INFOCOM 2007), pp. 776–784. IEEE (2007)

    Google Scholar 

  5. Bhattacharya, A., Das, S.K.: Lezi-update: an information-theoretic approach to track mobile users in PCS networks. In: Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking, MobiCom 1999, pp. 1–12. ACM, New York (1999)

    Google Scholar 

  6. Boldrini, C., Conti, M., Passarella, A.: Modelling social-aware forwarding in opportunistic networks. In: Hummel, K.A., Hlavacs, H., Gansterer, W. (eds.) Performance Evaluation of Computer and Communication Systems. LNCS, vol. 6821, pp. 141–152. Springer, Heidelberg (2011)

    Google Scholar 

  7. Burgess, J., Gallagher, B., Jensen, D., Levine, B.: Maxprop: routing for vehicle-based disruption-tolerant networks. In: IEEE INFOCOM, Barcelona, Spain, vol. 6, pp. 1–11 (2006)

    Google Scholar 

  8. Chen, Y., Borrel, V., Ammar, M., Zegura, E.: A framework for characterizing the wireless and mobile network continuum. ACM SIGCOMM Comput. Commun. Rev. 41(1), 5–13 (2011)

    Article  Google Scholar 

  9. Chon, Y., Shin, H., Talipov, E., Cha, H.: Evaluating mobility models for temporal prediction with high-granularity mobility data. In: International Conference on Pervasive Computing and Communications (PerCom 2012), pp. 206–212. IEEE (2012)

    Google Scholar 

  10. De Domenico, M., Lima, A., Musolesi, M.: Interdependence and predictability of human mobility and social interactions. In: Proceedings of the Pervasive 2012, Newcastle, UK (2012)

    Google Scholar 

  11. Fall, K.: A delay-tolerant network architecture for challenged internets. In: Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 27–34. ACM (2003)

    Google Scholar 

  12. Gambs, S., Killijian, M., del Prado Cortez, M.: Next place prediction using mobility markov chains. In: Proceedings of the First Workshop on Measurement, Privacy, and Mobility, p. 3. ACM (2012)

    Google Scholar 

  13. Hartenstein, H., Laberteaux, K.: A tutorial survey on vehicular ad hoc networks. IEEE Commun. Mag. 46(6), 164–171 (2008)

    Article  Google Scholar 

  14. Howard, R.: Dynamic Probabilistic Systems: Vol.: 2.: Semi-Markov and Decision Processes. Wiley, New York (1971)

    Google Scholar 

  15. Iosifescu Manu, A.: Non homogeneous semi-markov processes. Studii si Cercetuari Matematice 24, 529–533 (1972)

    MATH  Google Scholar 

  16. Keränen, A., Ott, J., Kärkkäinen, T.: The ONE simulator for DTN protocol evaluation. In: SIMUTools 2009: Proceedings of the 2nd International Conference on Simulation Tools and Techniques, ICST, New York, NY, USA (2009)

    Google Scholar 

  17. Kubach, U., Rothermel, K.: Exploiting location information for infostation-based hoarding. In: Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, MobiCom 2001, pp. 15–27. ACM, New York (2001)

    Google Scholar 

  18. Kumar, K., Lu, Y.: Cloud computing for mobile users: can offloading computation save energy? Computer 43(4), 51–56 (2010)

    Article  Google Scholar 

  19. Lee, J.K., Hou, J.: Modeling steady-state and transient behaviors of user mobility: formulation, analysis, and application. In: Proceedings of the 7th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), pp. 85–96. ACM (2006)

    Google Scholar 

  20. Nicholson, A.J., Noble, B.D.: Breadcrumbs: forecasting mobile connectivity. In: Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, MobiCom 2008, pp. 46–57. ACM, New York (2008)

    Google Scholar 

  21. Papadopoulou, A., Mamatas, L., Tsaoussidis, V.: Semi markov modeling for user mobility in urban areas. In: Proceedings of the 2nd Stochastic Modeling Techniques and Data Analysis International Conference (SMTDA 2012), 5–8 June 2012

    Google Scholar 

  22. Papastergiou, G., Psaras, I., Tsaoussidis, V.: Deep-space transport protocol: a novel transport scheme for space DTNs. Comput. Commun. 32(16), 1757–1767 (2009)

    Article  Google Scholar 

  23. Petit, B., Ammar, M., Fujimoto, R.: Protocols for roadside-to-roadside data relaying over vehicular networks. In: Wireless Communications and Networking Conference (WCNC 2006), vol. 1, pp. 294–299. IEEE (2006)

    Google Scholar 

  24. Siris, V.A., Kalyvas, D.: Enhancing mobile data offloading with mobility prediction and prefetching. In: Proceedings of the Seventh ACM International Workshop on Mobility in the Evolving Internet Architecture, MobiArch 2012, pp. 17–22. ACM, New York (2012)

    Google Scholar 

  25. Song, L., Deshpande, U., Kozat, U.C., Kotz, D., Jain, R.: Predictability of WLAN mobility and its effects on bandwidth provisioning. In: Proceedings of the 25th IEEE International Conference on Computer Communications (INFOCOM), pp. 1–13. IEEE (2006)

    Google Scholar 

  26. Spyropoulos, T., Psounis, K., Raghavendra, C.: Efficient routing in intermittently connected mobile networks: the multiple-copy case. IEEE/ACM Trans. Netw. 16(1), 77–90 (2008)

    Article  Google Scholar 

  27. Vassiliou, P., Papadopoulou, A.: Non homogeneous semi markov systems and maintainability of the state sizes. J. Appl. Probab. 29, 519–534 (1992)

    Article  MathSciNet  MATH  Google Scholar 

  28. Yu, F., Leung, V.: Mobility-based predictive call admission control and bandwidth reservation in wireless cellular networks. Comput. Netw. 38(5), 577–589 (2002)

    Article  Google Scholar 

  29. Yuan, Q., Cardei, I., Wu, J.: Predict and relay: an efficient routing in disruption-tolerant networks. In: Proceedings of the Tenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 95–104. ACM (2009)

    Google Scholar 

Download references

Acknowledgements

figure a

The research leading to these results has received funding from the European Unions (EU) Horizon 2020 research and innovation programme under grant agreement No 645124 (Action full title: Universal, mobile-centric and opportunistic communications architecture, Action Acronym: UMOBILE). This paper reflects only the authors views and the Community is not liable for any use that may be made of the information contained therein.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lefteris Mamatas .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Mamatas, L., Papadopoulou, A., Tsaoussidis, V. (2015). Exploiting Communication Opportunities in Disrupted Network Environments. In: Aguayo-Torres, M., Gómez, G., Poncela, J. (eds) Wired/Wireless Internet Communications. WWIC 2015. Lecture Notes in Computer Science(), vol 9071. Springer, Cham. https://doi.org/10.1007/978-3-319-22572-2_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-22572-2_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-22571-5

  • Online ISBN: 978-3-319-22572-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics