Conference paper Open Access

Exploiting Communication Opportunities in Disrupted Network Environments

Mamatas, Lefteris; Papadopoulou, Alexandra; Tsaoussidis, Vassilis

JSON-LD ( Export

  "description": "<p>The capability of a mobility model to detect certain patterns of user behavior (e.g., favorite walks or walking habits) enables solutions for a number of challenging networking problems, including efficient opportunistic communications and handoff / cellular planning. We<br />\nargue that the limited viewpoint of a single mobile node and its scarce<br />\nresources (e.g., energy, memory or processing) are major obstacles for<br />\naccurate estimations. Targeting at hybrid network environments, we offload prediction capabilities to the fixed nodes that may be available in the area, offering a global view and the capability of resource-demanding calculations. Here, we introduce a solution running on top of the infrastructure nodes that: (i) implements a mobility model which provides a number of mobility forecasts to the mobile users in the area, (ii) supports proactively the routing decisions of opportunistic mobile devices being taken at times there is not connectivity. We introduce the corresponding semi-Markov model and demonstrate its efficiency using scenarios deployed in a pre-selected city center, where a number of mobile nodes seek for Internet access.</p>", 
  "license": "", 
  "creator": [
      "affiliation": "University of Macedonia", 
      "@type": "Person", 
      "name": "Mamatas, Lefteris"
      "affiliation": "Aristotle University of Thessaloniki", 
      "@type": "Person", 
      "name": "Papadopoulou, Alexandra"
      "affiliation": "Democritus University of Thrace", 
      "@type": "Person", 
      "name": "Tsaoussidis, Vassilis"
  "url": "", 
  "image": "", 
  "datePublished": "2015-05-25", 
  "headline": "Exploiting Communication Opportunities in Disrupted Network Environments", 
  "keywords": [
    "Opportunistic Networks, Mobility modeling, Mobile resource offloading"
  "@context": "", 
  "identifier": "", 
  "@id": "", 
  "@type": "ScholarlyArticle", 
  "name": "Exploiting Communication Opportunities in Disrupted Network Environments"
All versions This version
Views 2525
Downloads 66
Data volume 5.4 MB5.4 MB
Unique views 2525
Unique downloads 66


Cite as