Conference paper Open Access

Exploiting Communication Opportunities in Disrupted Network Environments

Mamatas, Lefteris; Papadopoulou, Alexandra; Tsaoussidis, Vassilis

JSON-LD ( Export

  "description": "<p>The capability of a mobility model to detect certain patterns of user behavior (e.g., favorite walks or walking habits) enables solutions for a number of challenging networking problems, including efficient opportunistic communications and handoff / cellular planning. We<br />\nargue that the limited viewpoint of a single mobile node and its scarce<br />\nresources (e.g., energy, memory or processing) are major obstacles for<br />\naccurate estimations. Targeting at hybrid network environments, we offload prediction capabilities to the fixed nodes that may be available in the area, offering a global view and the capability of resource-demanding calculations. Here, we introduce a solution running on top of the infrastructure nodes that: (i) implements a mobility model which provides a number of mobility forecasts to the mobile users in the area, (ii) supports proactively the routing decisions of opportunistic mobile devices being taken at times there is not connectivity. We introduce the corresponding semi-Markov model and demonstrate its efficiency using scenarios deployed in a pre-selected city center, where a number of mobile nodes seek for Internet access.</p>", 
  "license": "", 
  "creator": [
      "affiliation": "University of Macedonia", 
      "@type": "Person", 
      "name": "Mamatas, Lefteris"
      "affiliation": "Aristotle University of Thessaloniki", 
      "@type": "Person", 
      "name": "Papadopoulou, Alexandra"
      "affiliation": "Democritus University of Thrace", 
      "@type": "Person", 
      "name": "Tsaoussidis, Vassilis"
  "headline": "Exploiting Communication Opportunities in Disrupted Network Environments", 
  "image": "", 
  "datePublished": "2015-05-25", 
  "url": "", 
  "keywords": [
    "Opportunistic Networks, Mobility modeling, Mobile resource offloading"
  "@context": "", 
  "identifier": "", 
  "@id": "", 
  "@type": "ScholarlyArticle", 
  "name": "Exploiting Communication Opportunities in Disrupted Network Environments"
All versions This version
Views 6060
Downloads 2828
Data volume 25.1 MB25.1 MB
Unique views 6060
Unique downloads 2727


Cite as