Opportunistic Networks: A Review
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 2
Abstract
Abstract: Opportunistic network is a wireless ad hoc network. It is a type of delay tolerant network and an extension of mobile ad hoc networks. This network has a special characteristic which is intermittent connectivity. From intermittent we mean that connections are not stable and connections occur at irregular intervals. Connection may or may not occur which depends on the suitability of selecting a node which can carry the message closer to the destination or to the destination itself. End to end connections for transmissionof data are unavailable here and they use store and forward technique for transmission of data. As end to end connections are not present so routes are established dynamically without having any knowledge about the network topology. Here, intermediate nodes are used for the delivery of message to its intended destination. These intermediate nodes store the messages with them until they find any other suitable node in theircommunication range which can successfully take the message closer to the destination. Once, a node is found within the range, the message is forwarded to that node. Now this selected node will find another suitable nodein its range and the process is repeated until there is successful delivery to the destination. As every node has an opportunity to select a suitable node in their range, so these networks are known as opportunistic networks. This paper provides a quick review of mobile opportunistic networks including their routing protocols, challenges, and applications.
Authors and Affiliations
Navneet Kaur, , Gauri Mathur,
MSESEP- Mobile Sink Based ESEP using Reliable Cluster Head and Sorting Technique
Abstract: The Wireless Sensor Network (WSN) is composed of sensors. These sensor nodes sense the physical parameters like temperature, pressure, humidity etc. In real time environment these sensors have different energie...
Cosine Similarity Based Clustering For Software Testing Using Prioritization
prioritizing the test cases helps to increase the rate of fault detection. The difficulty of ensuring the dependability in the growth of the scale of software and software testing in distributed environment a suf...
Implementing Security algorithm to worm hole attack using AOMDV protocol & comparison using NS2 simulator
Abstract: In present era, where every person has become addicted to wireless networks, MANET’S has fulfilled the demand of the people by removing the dependency of fixed network. Mobile ad-hoc networks have extende...
Overview: Importance of Network Security and Future Issues
Abstract: Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a bett...
An Adaptive approach to retrieve image affected by impulse noisefrom documents
Abstract: Impulsive noise is sometimes called salt-and-pepper noise or spike noise is most oftenly occuringimage detoriation. An image containing salt-and-pepper noise will have dark pixels in bright regions and brightpi...