Cardiff University | Prifysgol Caerdydd ORCA
Online Research @ Cardiff 
WelshClear Cookie - decide language by browser settings

Identifying and comparing opportunistic and social networks

Ali, Mona 2013. Identifying and comparing opportunistic and social networks. PhD Thesis, Cardiff University.
Item availability restricted.

[thumbnail of 2013alimphd.pdf]
PDF - Accepted Post-Print Version
Download (12MB) | Preview
[thumbnail of AliM.pdf] PDF - Supplemental Material
Restricted to Repository staff only

Download (702kB)


Recent developments in computation and communication technologies are making big changes to the method in which people communicate with each other. Online social networks, wireless technologies and smart-phones are very common and enable communication to be maintained while people are mobile. These types of communication are closely related to humans because they carry the devices. In this research, we detect, analyse and compare opportunistic networks with human social networks. Currently opportunistic networking platforms have not gone beyond the research and development stage where they are challenging to design and implement. Therefore we develop an indoor mobility tracking system to track the participant movement inside buildings and to record the physical interaction between participants using Bluetooth technology. This system has two different ways of abstracting opportunistic networks from the experimental data: mobility (device-to-building) and co-located (device-to-device) interactions. The mobility detection system has been studied using a volunteer group of students in the School of Computer Science and Informatics. This group also has been studied to understand their social networking structure and characteristics by using electronic survey methodology. Different techniques have been used to investigate the individuals’ networks from the survey and mobility movements and a comparison between them. From a precision and recall technique, we find that 60-80 % of the participants’ social network is embedded in the opportunistic network but a small proportion 10-20% of the opportunistic network is embedded in the social network. This shows the presence of many weak links in the opportunistic network that means the opportunistic network connectivity requires a very small number of key-players to disseminate information throughout the network. We also examine both networks from the perspective of information dissemination. We find that device-to-device create many more weak links to disseminate information rather than server detection. Therefore, information quickly floods throughout the co-located network.

Item Type: Thesis (PhD)
Status: Unpublished
Schools: Computer Science & Informatics
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Date of First Compliant Deposit: 30 March 2016
Last Modified: 19 Mar 2016 23:19

Actions (repository staff only)

Edit Item Edit Item


Downloads per month over past year

View more statistics