资源描述:
《impact of human mobility on opportunistic forwarding algorithms》由会员上传分享,免费在线阅读,更多相关内容在教育资源-天天文库。
1、ImpactofHumanMobilityonOpportunisticForwardingAlgorithmsAugustinChaintreau‡,PanHui*,JonCrowcroft*,ChristopheDiot‡,RichardGass†,andJamesScott†,‡ThomsonResearch*UniversityofCambridge†IntelResearch46quaiA.LeGallo15JJThomsonAvenue92648BoulogneFRANCECambridge,CB30FD,UKaugustin.chaintreau@thomson.netpan.h
2、ui@cl.cam.ac.uk,jon.crowcroft@cl.cam.ac.ukchristophe.diot@thomson.netrichard.gass@intel.com,jamesscott@acm.orgAbstract—Thispaperstudiesdatatransferopportunitiesbe-aremet,northerecenthistoryofcontacts,orthetimeofthetweenwirelessdevicescarriedbyhumans.Weobservethattheday,inordertomakeforwardingdecisio
3、ns.Insteadforwardingdistributionoftheinter-contacttime(thetimegapseparatingdecisionsarebasedonstaticallydefinedforwardingrulesthattwocontactsbetweenthesamepairofdevices)maybewellboundthenumberofdatareplicas,orthenumberofhops.approximatedbyapowerlaw,overtherange[10minutes;1day].Thisobservationisconfirm
4、edusingeightdistinctexperimentalBasedonourexperimentalobservations,wedevelopadatasets.Itisatoddswiththeexponentialdecayimpliedbysimplifiedmodelofopportunisticcontactbetweenhuman-themostcommonlyusedmobilitymodels.Inthispaper,wecarriedwirelessdevices.Itisbasedonseveralindependencestudyhowthisnewlyuncov
5、eredcharacteristicofhumanmobilityassumptionswhicharecommonintheliteratureofmobileimpactsoneclassofforwardingalgorithmspreviouslyproposed.ad-hocrouting.WedonotclaimthatthismodelcapturesWeuseasimplifiedmodelbasedontherenewaltheorytostudyhowtheparametersofthedistributionimpacttheperformancetheperformanc
6、eofdifferentforwardingalgorithmsaccurately.intermsofthedeliverydelayofthesealgorithms.WemakeRather,itservesourpurposewhichistodemonstratehowtherecommendationsforthedesignofwellfoundedopportunistictailofinter-contacttimesinfluencestheperformanceofnaiveforwardingalgorithms,inthecontextofhumancarrieddev
7、ices.forwardingalgorithms,andhowtheseshouldbeconfiguredtoofferreasonableguarantees.ExperimentalresultsarepresentedinSectionII.InSec-I.INTRODUCTIONtionIII,wemodelcontactopportunitiesbasedonourobser-Thei