Cardiff University | Prifysgol Caerdydd ORCA
Online Research @ Cardiff 
WelshClear Cookie - decide language by browser settings

A simple human mobility model for opportunistic networks

Greede, Abdolbast, Allen, Stuart Michael ORCID: https://orcid.org/0000-0003-1776-7489 and Whitaker, Roger Marcus ORCID: https://orcid.org/0000-0002-8473-1913 2008. A simple human mobility model for opportunistic networks. Presented at: 9th Annual Postgraduate Symposium : The Convergence of Telecommunications, Networking and Broadcasting, Liverpool John Moores University, 23-24 June 2008. Proceedings of the 9th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting, Liverpool, UK, 23-24 June 2008. Liverpool, UK: Liverpool John Moores University,

Full text not available from this repository.

Abstract

Opportunistic networking has received considerable interest from the research community in recent years. In this kind of network, mobile nodes exploit mobility to communicate with each other even if a route connecting them never exists. The design of efficient forwarding strategies for opportunistic networks is usually a big challenge. In the opportunistic networks research community, evaluation of new forwarding network protocol relies almost completely on simulation. An important component of such a simulator is the mobility model which should ideally mimic the movements of real mobile nodes (MNs). Clearly the value of the validation of forwarding protocol is highly dependent on mobility models used in the simulations especially if the protocol is exploit information on the prior movement and relationships of nodes. In this paper we assess different types of mobility models that are available. Based on this analysis we present alternative mobility models that can be applied to evaluate protocols for opportunistic data forwarding. We propose a “simple human mobility model” that simulates the movement of mobile nodes in a similar manner of humans. We adopt the proposed model for the building of the School of Computer Science, Cardiff University in order to show how it can be configured to incorporate walls and corridors. We briefly describe an implementation of this model in a simulation network environment. A comparison of our model with other mobility models are also presented and discussed in this paper.

Item Type: Conference or Workshop Item (Paper)
Date Type: Publication
Status: Published
Schools: Computer Science & Informatics
Systems Immunity Research Institute (SIURI)
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Additional Information: Session 1C - Mobile and Ad Hoc Networks
Publisher: Liverpool John Moores University
ISBN: 9781902560199
Related URLs:
Last Modified: 19 Oct 2022 09:08
URI: https://orca.cardiff.ac.uk/id/eprint/20103

Citation Data

Actions (repository staff only)

Edit Item Edit Item