{"title":"机会型Ad Hoc网络中有效供应评估框架的研究","authors":"Anthony Smith, Richard Hill","doi":"10.1109/3PGCIC.2011.15","DOIUrl":null,"url":null,"abstract":"In wireless ad-hoc networks where there is no continuous end-to-end path we move into the area of opportunistic networks. Forwarding messages via any encountered nodes, such as the mobile devices that many users already carry. Normally we are looking for the most efficient method of passing these messages across the network, but how do we evaluate the different methods. We propose to develop a framework that will allow us to evaluate how efficiently provisioning has been performed. This has been explored with the use of a case study and two benchmark protocols, Epidemic and PRoPHET. We present the results of this analysis and describe an approach to the validation of this through simulation.","PeriodicalId":251730,"journal":{"name":"2011 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Towards a Framework for the Evaluation of Efficient Provisioning in Opportunistic Ad Hoc Networks\",\"authors\":\"Anthony Smith, Richard Hill\",\"doi\":\"10.1109/3PGCIC.2011.15\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In wireless ad-hoc networks where there is no continuous end-to-end path we move into the area of opportunistic networks. Forwarding messages via any encountered nodes, such as the mobile devices that many users already carry. Normally we are looking for the most efficient method of passing these messages across the network, but how do we evaluate the different methods. We propose to develop a framework that will allow us to evaluate how efficiently provisioning has been performed. This has been explored with the use of a case study and two benchmark protocols, Epidemic and PRoPHET. We present the results of this analysis and describe an approach to the validation of this through simulation.\",\"PeriodicalId\":251730,\"journal\":{\"name\":\"2011 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing\",\"volume\":\"5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-10-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/3PGCIC.2011.15\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/3PGCIC.2011.15","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Towards a Framework for the Evaluation of Efficient Provisioning in Opportunistic Ad Hoc Networks
In wireless ad-hoc networks where there is no continuous end-to-end path we move into the area of opportunistic networks. Forwarding messages via any encountered nodes, such as the mobile devices that many users already carry. Normally we are looking for the most efficient method of passing these messages across the network, but how do we evaluate the different methods. We propose to develop a framework that will allow us to evaluate how efficiently provisioning has been performed. This has been explored with the use of a case study and two benchmark protocols, Epidemic and PRoPHET. We present the results of this analysis and describe an approach to the validation of this through simulation.