An analytical study of people mobility in opportunistic networks

Ling Jyh Chen, Yung Chih Chen

Research output: Contribution to journalArticle

3 Citations (Scopus)

Abstract

An opportunistic network is a type of Delay Tolerant Network (DTN) in which communication opportunities are intermittent. Moreover, an end-to-end path between the source and the destination may never have existed, disconnection and reconnection are common occurrences, and link performance is highly variable or extreme. With numerous emerging opportunistic networking applications, strategies that can facilitate effective data communication in such challenging environments have become increasingly desirable. In particular, knowing the fundamental properties of opportunistic networks will soon be the key to the proper design of opportunistic routing schemes and applications. In this study, we investigate opportunistic network scenarios based on two public network traces, namely, the UCSD and Dartmouth traces. Our contribution is twofold. First, we identify the censorship issue in network traces that usually leads to a strongly skewed distribution of the measurements. Based on this knowledge, we then apply the Kaplan-Meier Estimator to calculate the survivorship of network measurements. The survivorship feature is used to design our proposed censorship removal algorithm (CRA) for recovering censored data. Second, we perform an in-depth analysis of the UCSD and Dartmouth network traces. We show that they exhibit strong self-similarity, and can be modeled as such. We believe these newly revealed characteristics will be important in the future development and evaluation of opportunistic networks.

Original languageEnglish
Pages (from-to)197-214
Number of pages18
JournalJournal of Information Science and Engineering
Volume26
Issue number1
Publication statusPublished - 2010 Jan 1

Keywords

  • Censorship removal algorithm
  • Delay tolerant networks
  • Kaplan-meier estimator
  • Self-similarity
  • Survival analysis

ASJC Scopus subject areas

  • Software
  • Human-Computer Interaction
  • Hardware and Architecture
  • Library and Information Sciences
  • Computational Theory and Mathematics

Fingerprint Dive into the research topics of 'An analytical study of people mobility in opportunistic networks'. Together they form a unique fingerprint.

  • Cite this