Efficient and Transparent Use of personal device storage in opportunistic data forwarding
نویسندگان
چکیده
We consider a growing research trend of using personal mobile devices for forwarding opportunistic network data. Because personal device storage is meant to support user applications, opportunistic networks must use it in a manner that remains completely transparent to the user. One way to make a device’s storage use transparent is to allow priority access to the storage to user applications, even if the storage is currently occupied by network data yet to be forwarded. This means that data given to a device waiting to be forwarded can be overwritten by application data and may, thus, be lost. In this paper we consider random access memory (RAM) as the primary storage location in a mobile device. We propose three algorithms of different sophistications to answer the question of how much data should be moved when a contact opportunity arises between two devices in such a way to first maximise the data transferred while minimising the probability that this data will be overwritten when applications claim priority access. We collect 33 hours of high-resolution RAM usage traces of two real smartphones over a 3-day period under a variety of usage scenarios to evaluate and compare the performances of the proposed algorithms. Surprisingly, we find that autoregression forecasting of RAM usage cannot outperform ∗Corresponding author Email addresses: [email protected] (Sayed Amir Hoseini), [email protected] (Azade Fotouhi), [email protected] (Mahbub Hassan), [email protected] (Chun Tung Chou), [email protected] (Mostafa H. Ammar) Preprint submitted to Journal of Computer Communications October 22, 2015
منابع مشابه
Special Section on Challenged Networks
s p l t a It is our great pleasure to introduce this Special Section of the Journal, presenting advanced solutions for mobile challenged networks. The special section collects extended papers from the 9th ACMWorkshop on Challenged Networks, CHANTS 2014. After a decade of research into this area, the subject of challenged networks is both generating solutions for practical applications, still re...
متن کاملHotspot-entropy based data forwarding in opportunistic social networks
Performance of data forwarding in opportunistic social networks benefits considerably if one canmake use of humanmobility in terms of social contexts. However, it is difficult and time-consuming to calculate the centrality and similarity of nodes by using solutions of traditional social networks analysis, this is mainly because of the transient node contact and the intermittently connected link...
متن کاملEnergy-efficient opportunistic forwarding in multi-hop cellular networks using device-to-device communications
Cellular networks face significant challenges as a result of the growth of cellular data traffic, with a significant portion of such traffic being delay tolerant. Multi-hop Cellular Networks (MCN) can help address the foreseen capacity and energy-efficiency constraints of cellular networks through the integration of cellular and Device to Device (D2D) communications. To this aim, this work prop...
متن کاملFriendship and Selfishness Forwarding: applying machine learning techniques to Opportunistic Networks data forwarding
Opportunistic networks could become the solution to provide communication support in both cities where the cellular network could be overloaded, and in scenarios where a fixed infrastructure is not available, like in remote and developing regions. A critical issue that still requires a satisfactory solution is the design of an efficient data delivery solution. Social characteristics are recentl...
متن کاملIdentifying Influential Nodes for Efficient Routing in Opportunistic Networks
—Opportunistic networks exploit human mobility and consequent device-to-device contacts to opportunistically create data paths over time. Identifying influential nodes as relay is a crucial problem for efficient routing in opportunistic networks. The degree centrality method is very simple but of little relevance. Although closeness centrality and betweenness centrality can effectively identif...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Computer Communications
دوره 73 شماره
صفحات -
تاریخ انتشار 2016