Copy Limited Flooding over Opportunistic Networks

被引:0
|
作者
Niu, Jianwei [1 ]
Liu, Mingzhu [1 ]
Shu, Lei [2 ]
Guizani, Mohsen [3 ]
机构
[1] Beihang Univ, State Key Lab Software Dev Environm, Beijing 100191, Peoples R China
[2] Guangdong Univ Petrochem Technol, Guangdong Petrochem Equipment Fault Diag key Lab, Maoming 525000, Peoples R China
[3] Qatar Univ, Doha, Qatar
基金
中国国家自然科学基金;
关键词
Opportunistic network; message dissemination; copy limited flooding; network model; MOBILITY;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Mobile devices with local wireless interfaces can be organized into opportunistic networks which exploit communication opportunities arising from the movement of their users. With the proliferation and increasing capabilities of these devices, it is significant to investigate message dissemination over opportunistic networks to maximize the potential of those networks. In this paper, we analyze the performance of copy-limited flooding over opportunistic networks, where each node can only send no more than k copies of the same message. For this purpose, we propose a network model called Markov and Random graph Hierarchic Model (MRHM), where a node transfers among different Main-areas (places frequently visited by nodes) according to the Markov rule, and two different nodes in the same Main-area can establish a connection with a certain probability. We theoretically analyze the performance of k-copy limited flooding over MRHM in terms of delivery rate and delay. Our extensive experiments over MRHM and real traces reveal that when k equals 3, the performance of k -copy limited flooding is very close to that of Epidemic Routing.
引用
收藏
页码:1785 / 1790
页数:6
相关论文
共 50 条
  • [21] Opportunistic Distributed Beamforming in Cognitive Radio Networks with Limited Feedback
    Zhang, Chao
    Guo, Li
    Hu, Ranjie
    Lin, Jiaru
    2014 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2014, : 893 - 897
  • [22] A Route Discovery Method based on Limited Flooding in ZigBee Networks
    Lin, Zijing
    Meng, Max Q. -H.
    Liang, Huawei
    2008 IEEE INTERNATIONAL CONFERENCE ON AUTOMATION AND LOGISTICS, VOLS 1-6, 2008, : 3039 - 3044
  • [23] Data dissemination using limited flooding in wireless sensor networks
    Medidi, M
    Ding, J
    Medidi, S
    ICWN '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS, 2005, : 434 - 440
  • [24] A limited flooding scheme for query delivery in wireless sensor networks
    Son, J
    Ha, N
    Kim, K
    Ryu, J
    Son, J
    Han, KJ
    ADVANCED WEB AND NETWORK TECHNOLOGIES, AND APPLICATIONS, PROCEEDINGS, 2006, 3842 : 276 - 280
  • [25] CLOF: Contribution-level-based opportunistic flooding for multihop wireless networks
    Byeon, Seunggyu
    Park, Sejin
    Seo, Hyung-Yoon
    Kim, Jong-Deok
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2018, 14 (05):
  • [26] Flooding Time in Opportunistic Networks under Power Law and Exponential Intercontact Times
    Becchetti, Luca
    Clementi, Andrea
    Pasquale, Francesco
    Resta, Giovanni
    Santi, Paolo
    Silvestri, Riccardo
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (09) : 2297 - 2306
  • [27] Optimized Opportunistic Multicast Scheduling Over Cellular Networks
    Low, Tze-Ping
    Pun, Man-On
    Kuo, C. -C. Jay
    GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [28] On the Effectiveness of Opportunistic Routing over Wireless Mesh Networks
    Wu, Haisheng
    Wang, Guijin
    Lin, Xinggang
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [29] User Recruitment for Mobile Crowdsensing over Opportunistic Networks
    Karaliopoulos, Merkouris
    Telelis, Orestis
    Koutsopoulos, Iordanis
    2015 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), 2015,
  • [30] Two Hops or More: On Hop-Limited Search in Opportunistic Networks
    Bayhan, Suzan
    Hyytia, Esa
    Kangasharju, Jussi
    Ott, Jorg
    MSWIM'15: PROCEEDINGS OF THE 18TH ACM INTERNATIONAL CONFERENCE ON MODELING, ANALYSIS AND SIMULATION OF WIRELESS AND MOBILE SYSTEMS, 2015, : 115 - 124