scispace - formally typeset
Search or ask a question
Book ChapterDOI

Context-Based Routing Protocols for OppNets

TL;DR: This chapter gives the general definition of context information and emphasize the role of contextInformation to take forwarding decisions in opportunistic networks and classify the main routing protocols proposed in the literature on the basis of context Information of users they exploit.
Abstract: Opportunistic network does not rely on any pre-existing infrastructure and no assumption is made on the existence of a complete path between source and destination. The development of efficient routing protocols for opportunistic networks is generally a difficult task due to the absence of knowledge about the network topology. Therefore, routing is one of the most persuasive challenges of opportunistic networks. In this chapter, we give the general definition of context information and emphasize the role of context information to take forwarding decisions in opportunistic networks. We classify the main routing protocols proposed in the literature on the basis of context information of users they exploit. Specifically, we classify two main classes of routing protocols, corresponding to context-oblivious and context-aware protocols. Then, we further classify context-aware routing protocols into two subclasses, i.e., partially context-aware and fully context-aware protocols, based on the amount of context information they use for routing. We emphasize and describe only routing protocols of context-aware category and the detailed discussion about context-oblivious routing protocols is out of the scope of this chapter.
Citations
More filters
Journal ArticleDOI
TL;DR: In this article , a context-aware routing protocol is proposed that uses the frequency of contacts among nodes as context information to identify the message's best forwarder in opportunistic ad hoc networks.
Abstract: An Opportunistic Network is an intermittently connected Mobile Ad-hoc Networks that exploits the communication opportunity between the nodes for data transmission whenever they are within the communication range of each other even for a short time. In contrast to the Mobile Ad-hoc Networks, Opportunistic Networks follow store-carry-forward approach for the data transmission. Routing in this type of network depends on many factors, like the direction of the node's movement, the supported interface bandwidth (Bluetooth, high-speed Internet, etc.), the node's speed, and the node's buffer size. In this research work, a context-aware routing protocol is proposed that uses the frequency of contacts among nodes as context information. The frequency of meetings between any two nodes is found to be a good heuristic to identify the message's best forwarder. The proposed routing protocol is simulated on opportunistic network environment (ONE) simulator and the results are compared with the most prominent routing protocols of context-oblivious and context-aware classes, and it was found that the proposed routing protocol performs better than other protocols in terms of delivery probability and buffer average time.
References
More filters
Proceedings ArticleDOI
27 Sep 1999
TL;DR: Some of the research challenges in understanding context and in developing context-aware applications are discussed, which are increasingly important in the fields of handheld and ubiquitous computing, where the user?s context is changing rapidly.
Abstract: When humans talk with humans, they are able to use implicit situational information, or context, to increase the conversational bandwidth. Unfortunately, this ability to convey ideas does not transfer well to humans interacting with computers. In traditional interactive computing, users have an impoverished mechanism for providing input to computers. By improving the computer’s access to context, we increase the richness of communication in human-computer interaction and make it possible to produce more useful computational services. The use of context is increasingly important in the fields of handheld and ubiquitous computing, where the user?s context is changing rapidly. In this panel, we want to discuss some of the research challenges in understanding context and in developing context-aware applications.

4,842 citations

Amin Vahdat1
01 Jan 2000
TL;DR: This work introduces Epidemic Routing, where random pair-wise exchanges of messages among mobile hosts ensure eventual message delivery and achieves eventual delivery of 100% of messages with reasonable aggregate resource consumption in a number of interesting scenarios.
Abstract: Mobile ad hoc routing protocols allow nodes with wireless adaptors to communicate with one another without any pre-existing network infrastructure. Existing ad hoc routing protocols, while robust to rapidly changing network topology, assume the presence of a connected path from source to destination. Given power limitations, the advent of short-range wireless networks, and the wide physical conditions over which ad hoc networks must be deployed, in some scenarios it is likely that this assumption is invalid. In this work, we develop techniques to deliver messages in the case where there is never a connected path from source to destination or when a network partition exists at the time a message is originated. To this end, we introduce Epidemic Routing, where random pair-wise exchanges of messages among mobile hosts ensure eventual message delivery. The goals of Epidemic Routing are to: i) maximize message delivery rate, ii) minimize message latency, and iii) minimize the total resources consumed in message delivery. Through an implementation in the Monarch simulator, we show that Epidemic Routing achieves eventual delivery of 100% of messages with reasonable aggregate resource consumption in a number of interesting scenarios.

4,355 citations


"Context-Based Routing Protocols for..." refers background in this paper

  • ...It is an extension of Epidemic routing protocol [16] with the concept of delivery probability....

    [...]

  • ...Epidemic routing is the most suitable protocol of this category [16]....

    [...]

Proceedings ArticleDOI
Kevin Fall1
25 Aug 2003
TL;DR: This work proposes a network architecture and application interface structured around optionally-reliable asynchronous message forwarding, with limited expectations of end-to-end connectivity and node resources.
Abstract: The highly successful architecture and protocols of today's Internet may operate poorly in environments characterized by very long delay paths and frequent network partitions. These problems are exacerbated by end nodes with limited power or memory resources. Often deployed in mobile and extreme environments lacking continuous connectivity, many such networks have their own specialized protocols, and do not utilize IP. To achieve interoperability between them, we propose a network architecture and application interface structured around optionally-reliable asynchronous message forwarding, with limited expectations of end-to-end connectivity and node resources. The architecture operates as an overlay above the transport layers of the networks it interconnects, and provides key services such as in-network data storage and retransmission, interoperable naming, authenticated forwarding and a coarse-grained class of service.

3,511 citations

Journal ArticleDOI
TL;DR: A conceptual framework is presented that separates the acquisition and representation of context from the delivery and reaction to context by a context-aware application, and a toolkit is built that instantiates this conceptual framework and supports the rapid development of a rich space of context- aware applications.
Abstract: Computing devices and applications are now used beyond the desktop, in diverse environments, and this trend toward ubiquitous computing is accelerating. One challenge that remains in this emerging research field is the ability to enhance the behavior of any application by informing it of the context of its use. By context, we refer to any information that characterizes a situation related to the interaction between humans, applications, and the surrounding environment. Context-aware applications promise richer and easier interaction, but the current state of research in this field is still far removed from that vision. This is due to 3 main problems: (a) the notion of context is still ill defined, (b) there is a lack of conceptual models and methods to help drive the design of context-aware applications, and (c) no tools are available to jump-start the development of context-aware applications. In this anchor article, we address these 3 problems in turn. We first define context, identify categories of contextual information, and characterize context-aware application behavior. Though the full impact of context-aware computing requires understanding very subtle and high-level notions of context, we are focusing our efforts on the pieces of context that can be inferred automatically from sensors in a physical environment. We then present a conceptual framework that separates the acquisition and representation of context from the delivery and reaction to context by a context-aware application. We have built a toolkit, the Context Toolkit, that instantiates this conceptual framework and supports the rapid development of a rich space of context-aware applications. We illustrate the usefulness of the conceptual framework by describing a number of context-aware applications that have been prototyped using the Context Toolkit. We also demonstrate how such a framework can support the investigation of important research challenges in the area of context-aware computing.

3,095 citations