Performance evaluation of routing protocols in opportunistic networks

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

We focus on a deterministic opportunistic network in which the mobility of the nodes is exploited to carry the information and the contact times between nodes are known in advance or can be predicted. We consider specifically two classes of traces collected in real life: public transportation system and human mobility. Our contribution mainly consists of two-folds: on one hand, we have exploited several real-life mobility traces, trying to understand the pattern of the mobility and the interaction; on the other hand, we have evaluated the trace-driven performance of previously proposed almost-optimal routing algorithm MC-DHCD, in terms of delay and throughput. We believe that our work, even though based on some simplified assumptions, will help the researchers to better design the routing protocol in an opportunistic network environment, to support QoS in terms of both delay and throughput.

Original languageEnglish
Title of host publication5th International Conference on Computing Communication and Networking Technologies, ICCCNT 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781479926961
DOIs
StatePublished - 19 Nov 2014
Event5th International Conference on Computing Communication and Networking Technologies, ICCCNT 2014 - Hefei, China
Duration: 11 Jul 201413 Jul 2014

Publication series

Name5th International Conference on Computing Communication and Networking Technologies, ICCCNT 2014

Conference

Conference5th International Conference on Computing Communication and Networking Technologies, ICCCNT 2014
Country/TerritoryChina
CityHefei
Period11/07/1413/07/14

Keywords

  • QoS
  • Routing protocol
  • mobile networks
  • performance evaluation

Fingerprint

Dive into the research topics of 'Performance evaluation of routing protocols in opportunistic networks'. Together they form a unique fingerprint.

Cite this