SlideShare une entreprise Scribd logo
1  sur  10
Télécharger pour lire hors ligne
Impact of human behavior on social opportunistic forwarding
Waldir Moreira ⇑
, Paulo Mendes
COPELABS, University Lusofona, Lisbon, Portugal
a r t i c l e i n f o
Article history:
Received 4 March 2014
Received in revised form 8 July 2014
Accepted 9 July 2014
Available online 17 July 2014
Keywords:
Opportunistic networks
Delay/disruption-tolerant networks
Social-networking communications
Human dynamics
Application awareness
Challenging environments
a b s t r a c t
The current Internet design is not capable of supporting communications in environments
characterized by very long delays and frequent network partitions. To allow devices to
communicate in such environments, delay-tolerant networking solutions have been
proposed by exploiting opportunistic message forwarding, with limited expectations of
end-to-end connectivity and node resources. Such solutions envision non-traditional com-
munication scenarios, such as disaster areas and development regions. Several forwarding
algorithms have been investigated, aiming to offer the best trade-off between cost (number
of message replicas) and rate of successful delivered message. Among such proposals, there
has been an effort to employ social similarity, inferred from users’ mobility patterns, to
improve opportunistic forwarding solutions. However, such proposals present two major
drawbacks: first, they focus on distribution of intercontact times over the complete
network structure, ignoring the impact that human behavior has on the dynamics of the
network; and second, most of the proposed solutions look at challenging networking envi-
ronments where networks have low density, ignoring the potential use of delay-tolerant
networking to support low cost communications in networks with higher density, such
as urban scenarios. This paper presents a study of the impact that human behavior has
on opportunistic forwarding. Our goal is twofold: (i) to show that performance in low
and high density networks can be improved by taking the dynamics of the network into
account; and (ii) to show that delay-tolerant networking can be used to reduce communi-
cation costs in networks with high density by considering the users’ behavior.
Ó 2014 Elsevier B.V. All rights reserved.
1. Introduction
Wireless devices are becoming more portable and have
increased capabilities (e.g., processing, storage), which is
creating the foundations for the deployment of pervasive
wireless networks based on a large set of personal devices
(e.g., smartphones, embedded devices). Additionally, wire-
less technology has been extended to allow direct commu-
nication aiming to support safety information exchange
(i.e., vehicle-to-vehicle), 3G offloading (i.e., device-to-device),
and to overcome the lack of infrastructure entities
(i.e., Wi-Fi direct).
The combination of pervasive wireless devices and
direct communication solutions can be used to support
the deployment of two major type of applications: end-
to-end communication in development regions, since
today’s Internet routing protocols may operate poorly in
environments characterized by very long delay paths and
frequent network partitions; and low cost communica-
tions, namely data sharing, in urban scenarios, to bypass
expensive data mobile communications and the unreliable
presence of open Wi-Fi access points.
These networking scenarios (from development regions
to urban scenarios) are characterized by network graphs
http://dx.doi.org/10.1016/j.adhoc.2014.07.001
1570-8705/Ó 2014 Elsevier B.V. All rights reserved.
⇑ Corresponding author.
E-mail address: waldir.junior@ulusofona.pt (W. Moreira).
Ad Hoc Networks 25 (2015) 293–302
Contents lists available at ScienceDirect
Ad Hoc Networks
journal homepage: www.elsevier.com/locate/adhoc
with different densities, which pose several challenges in
terms of data forwarding. The goal of this paper is the
investigation of the impact that human behavior may have
on opportunistic forwarding, namely the awareness about
users’ social and data similarities.
Most of the prior art has been studying data transfer
opportunities between wireless devices carried by
humans, by looking at the distribution of intercontact
times, which is the time gap separating two contacts
between the same pair of devices [1]. In challenging net-
working environments, opportunistic contacts among
mobile devices may improve communications among
peers, as well as content dissemination, mitigating the
effects of network disruption. This gave rise to the investi-
gation of opportunistic networks, of which Delay-Tolerant
Networks (DTN) are an example, encompassing different
forwarding proposals to quickly transfer data between
two peers even in the absence of an end-to-end path
between them. Such proposals range from flooding data
[2] in the network, up to solutions that take into account
users’ social interactions [3–8]. In the latter case, wireless
contacts are aggregated into a social graph, and a variety
of metrics (e.g., centrality and similarity) or algorithms
(e.g., community detection) have been proposed to assess
the utility of a node to deliver data or bring it closer to
the destination. It is worth highlighting that the structure
of such graphs is rather dynamic, since users’ social behav-
ior and interactions vary throughout their daily routines.
This brings us to our first challenge: forwarding algorithms
should be able to exploit social graphs that reflect people’s
dynamic behavior. Prior art have studied forwarding algo-
rithms that consider only the global network structure,
without taking people’s behavior into account [9]. In this
paper, we show that forwarding algorithms that exploit
social graphs reflecting variations in people’s daily routines
are able to improve the performance of opportunistic
forwarding.
Our second challenge is to analyze how to expand the
deployment of DTN technology, which is normally seen
only as useful to allow communications in challenging
environments, such as development regions. For this study,
we focus on data sharing since we assume that this should
be the most popular application to take advantage of low
cost communications in dense networks, such as in an
urban scenario. In this case, we study two hypothesis to
ensure good performance of opportunistic forwarding
when the density of the network increases: (i) forwarding
based on social graphs, where aggregation is based only on
social similarities; and (ii) forwarding based on behavior
graphs, where aggregation is done by combining different
aspects of human behavior, such as social similarities and
data similarities (derived from the interests that users
demonstrate in specific types of data).
Hence, in this paper we aim to investigate the possibil-
ity of developing an opportunistic forwarding system able
to support low cost services in dense networking scenarios
as well as basic services in extreme networking conditions,
by exploiting users’ social and data similarities. Our work
shows which type of opportunistic forwarding scheme is
more suitable for delay-tolerant applications, based on
the density of the network in scenarios spanning from
developing regions to urban environments. Our findings
lead to a new research challenge aiming to expand the
impact of DTNs: the investigation of self-awareness mech-
anisms able to adapt their forwarding schemes based on
users’ context, namely the density of the pervasive net-
work where the user is.
The remainder of the paper is structured as follows.
Section 2 aims to motivate our work, namely in what con-
cerns the goal to study methods to expand the deployment
of DTNs, and the impact that a better understanding of
human behavior can have in the development of efficient
forwarding solutions. In Section 3 we present our defini-
tion of network density based on the deployment scenarios
that we look at to pursuit our study and experiments.
Section 4 presents a set of forwarding algorithms that
are considered in our study, including our proposals. In
Section 5, we analyze the performance of opportunistic
forwarding over different network densities. Section 6 con-
cludes our work, and identifies future research challenges.
2. Motivation
The growing number of wireless mobile devices and the
end-user trend to shift toward wireless technology are
opening new possibilities for networking. In particular,
opportunistic networking embodies feasible solutions for
environments with scarce or costly infrastructure-based
connectivity. A lot of attention has been given to the devel-
opment of opportunistic forwarding solutions for networks
with scarce connectivity, which are considered a natural fit
for DTN technology. However, it is our belief that opportu-
nistic forwarding can also be applied to more dense net-
works, where Internet communications are expensive, or
applications aim to take advantage of direct communica-
tions among devices.
In what concerns challenging networks, the most com-
mon approach has been to make use of social similarities
to improve forwarding performance over the overall net-
work. In this case, our work is motivated by the fact that
such approaches ignore the behavior patterns that people
present in their daily routines [10]. It is our belief that
some awareness about users’ behavior patterns may lead
to further performance improvements.
In what concerns the application of DTN and opportu-
nistic forwarding in dense networks, most of the prior art
aims to implement a store-carry-and-forward communica-
tion model that exploits specific devices found in urban
scenarios, such as buses [11] and cars [12]. It is our under-
standing that the development of opportunistic forwarding
solutions should not depend upon specific equipments
only found is some scenarios, since this prevents the
deployment expansion of such proposals. It is our belief
that the success that DTN technology may have on dense
networks depends on its deployment range, which can
only be ensured if such technology is implemented in per-
vasive wireless devices, such as smartphones: these
devices are present in development regions as well as
urban scenarios. In the latter case, communications
between smartphones can also exploit mobility patterns
of different vehicles ridden by people.
294 W. Moreira, P. Mendes / Ad Hoc Networks 25 (2015) 293–302
In order to design useful pervasive applications, it is
vital to have a good understanding of the target environ-
ment and its users. Different types of user behavior may
result in different network conditions and may have a huge
impact on whether or not a particular application is of
interest to the user. A fair amount of work has been done
on studying human mobility traces in order to gain under-
standing of real life mobility patterns and how those affect
the properties of opportunistic networks [13,1,14].
Although mobility patterns are important properties of a
pervasive network, it is also important to understand the
impact that human behavior, such as data interests, have
on these networks. Hence, our work aims to further inves-
tigate this new research trend, expanding social awareness
to human behavior awareness. Among the different human
behavior metrics that can be considered, we focus our
attention on data similarities since data sharing is the most
common application in the Internet, and there are some
evidences that looking at data similarities may improve
the performance of opportunistic forwarding [3,4].
However, there is not a proof that the use of data simi-
larities can lead to a higher forwarding improvement than
just exploiting social interactions and structure (i.e., com-
munities [5], as well as levels of social interaction [6,7]).
It is our understanding that combining social and data sim-
ilarities shall bring benefits (i.e., faster, better content
reachability) to opportunistic forwarding. Hence, in this
work we analyze in which network conditions the exploi-
tation of social similarities results in a good performance,
and when such performance can be augmented by combin-
ing social and data similarity metrics.
3. Network scenario characterization
We consider different networking scenarios, which vary
according to the network density. Sparse scenarios are
characterized by very long delays (e.g., space communica-
tions [15]) and communication suffers from frequent dis-
ruption, mostly due to the lack of infrastructure and
geographic location (e.g., rural areas [16], riverside com-
munities [17,18]). DTN solutions for such sparse scenarios
normally rely on message ferries [19] or data mules [20], in
an attempt to overcome the missing infrastructure. This is
a classic DTN scenario whose challenges are more related
to transport protocols (i.e., dealing with extremely high
delays) than forwarding itself.
In what concerns dense scenarios, communication can
take place through both infrastructured (e.g., access points,
cell towers) and infrastructureless (e.g., WiFi direct, blue-
tooth) means. Still, disruption remains a problem, but
now seen from a different perspective: the dynamic behav-
ior of users (e.g., high mobility), different sources of inter-
ference (e.g., overlapping spectrum), poor coverage (e.g.,
areas full of closed access points) are factors that may con-
tribute to link intermittency, despite all the available sur-
rounding infrastructure. This type of scenario is easily
observed nowadays in urban settings.
In this work, we look at dense (urban) scenarios as
imposing new research challenges for opportunistic for-
warding given the aforementioned characteristics and the
deployment of pervasive wireless devices. Due to the pop-
ularity and capabilities of such pervasive devices, users
want to be able to sent and retrieve data anytime and any-
where. In other words, a free Internet scenario with low
cost denominator networking is of interest to users of data
sharing applications.
With this in mind, we identify network density as an
important evaluation metric to study the deployment
range, and success, of DTN networking: density gives us a
measure of network cohesion defined as the number of
observed relationships divided by the number of possible
relationships in a pervasive network. Yet, another impor-
tant evaluation metric is the average node degree, which
reflects the number of contact opportunities a node may
have.
We studied the characteristics of the three scenarios
that are considered in our experiments (cf. Section 5) in
relation to the density of the underlying network: the
CRAWDAD traces of MIT [21] comprising 97 Nokia 6600
smart phones distributed among the students and staff of
this institution; the Cambridge [22] traces that encom-
passes 36 students in their daily activities; and, a synthetic
mobility scenario encompassing 150 walking people, fol-
lowing the Shortest Path Map Based Movement model (i.e.,
nodes randomly choose destinations and use the shortest
path to reach them). Table 1 summarizes the network den-
sity and average node degree of these three scenarios,
being the density and degree computations done with
the Gephi v0.8.2 [23] analysis tool.
4. Opportunistic forwarding in wireless networks
This section presents the most relevant opportunistic
forwarding proposals, considering whether they make
use of social and/or data similarity metrics. Similarity met-
rics are used to build graphs over which such forwarding
proposals operate [24]. That is, instead of considering the
number and frequency of contacts due to the mobility of
nodes, such approaches take into account more stable
social and/or data metrics, aiming to reduce the cost of
opportunistic forwarding. While social similarity metrics
can be related to communities, node popularity, node cen-
trality, and social relationships, data similarity metrics
may refer to data popularity, data type, and data relevance
to users.
Besides the used similarity metrics, opportunistic for-
warding proposals may be differentiated by their assump-
tions about the network dynamics: they may consider only
the overall network structure, or they may consider varia-
tions in such structure due to the different behavior that
users may have throughout their daily routine.
Table 2 summarizes the type of similarity (i.e., social
and/or data) considered by the analyzed opportunistic
Table 1
Network densities of the considered scenarios.
Scenario Cambridge MIT Synthetic
Identified density 0.767 0.490 0.999
Avg. node degree 26.83 47.01 148.80
W. Moreira, P. Mendes / Ad Hoc Networks 25 (2015) 293–302 295
forwarding proposals (Bubble Rap, CiPRO, SocialCast,
ContentPlace, dLife and SCORP) and whether (or not) they
consider the observed user behavior to build dynamic
social graphs.
A first category of forwarding proposals encompasses
Bubble Rap [5], CiPRO [7], SocialCast [3], and ContentPlace
[4]. These proposals consider social and/or data similarity
metrics, but does not suitably reflect the dynamism of user
behavior in the underlying social graph.
Bubble Rap combines node centrality with the notion of
community to make forwarding decisions. The centrality
metric is used to identify hubs inside (i.e., local) or outside
(i.e., global) communities. Messages are replicated based
on global centrality until they reach the community of
the destination host (i.e., a node belonging to the same
community). Then, Bubble Rap uses the local centrality to
reach the destination inside the community.
CiPRO considers the time and place nodes meet
throughout their routines. It holds knowledge of nodes
(e.g., carrier’s name, address, nationality) expressed by
means of profiles that are used to compute the encounter
probability among nodes in specific time periods. Nodes
that meet occasionally get a copy of a message only if they
have higher encounter probability towards its destination.
If nodes meet frequently, history of encounters is used to
predict encounter probabilities for efficient broadcasting
of control packets and messages.
SocialCast considers the data interest shared among
nodes. It devises a utility function that captures the future
co-location of nodes (with others sharing the same inter-
est) and the change in its connectivity degree. Thus, the
utility function measures how good carrier a node can be
regarding a given interest. SocialCast functions are based
on the publish-subscribe paradigm, where users broadcast
their interests, and content is disseminated to interested
parties and/or to new carriers with high utility.
ContentPlace considers information about the users’
social relationships to improve content availability. It com-
putes a utility function for each data object considering: (i)
the access probability to each object and the involved cost
of accessing it; (ii) the social strength of the user towards
the different communities that he/she belongs to and/or
has interacted with. The idea is having the users fetching
data objects that maximize the utility function with
respect to local cache limitations, and choosing those
objects that are of interest to users and can be further dis-
seminated in the communities with whom they have
strong social ties.
A second category of forwarding proposals considers
solely social similarity metrics and take into account the
dynamism of user behavior while building the underlying
social graph. dLife [6] is in this category. It takes into
account the dynamism of users’ behavior throughout their
daily life routines to aid forwarding. The goal is to keep
track of the different levels of social interactions (in terms
of contact duration) that nodes have throughout their daily
activities in order to infer how well socially connected they
are in different periods of the day. Forwarding takes place
by considering either the social strength (i.e., weight)
among users or their importance in specific time periods.
The third and last category comprises both social and
data similarity metrics, as well as the dynamism observed
in the behavior of users in their daily routine. SCORP [8]
belongs to this category. It considers the type of data and
the social relationship between the parties interested in
each data type. SCORP nodes are expected to receive and
store messages considering their own data interests as well
as the interests of other nodes with whom they have inter-
acted before. Data forwarding takes place by considering
the social weight of the encountered node towards nodes
interested in the type of data carried by the message that
is about to be replicated.
For the remainder of this paper, we consider one repre-
sentative from each of the described categories: Bubble
Rap, for being solely based on social similarity metrics;
dLife for being solely based on social similarity metrics
and for reflecting network dynamics; SCORP for consider-
ing social and data similarity metrics and for reflecting
the dynamic user behavior in the social graphs. These pro-
posals are used to illustrate how the performance of oppor-
tunistic forwarding proposals can be improved in networks
with different densities by considering the user dynamic
behavior.
5. Evaluation of forwarding over different network
densities
In this section, we analyze the performance of Bubble
Rap, dLife, and SCORP over different network density sce-
narios. These experiments aim to highlight how different
levels of awareness about users’ behavior can impact the
performance of opportunistic forwarding proposals in sce-
narios with different network density. We perform two set
of experiments: The first set of tests (cf. Section 5.2) aims
to show how delay-tolerant networking can also be used
to reduce communication costs in dense networks by tak-
ing users’ behavior into account. These experiments are
carried out over the three scenarios described in Section 3.
Then, we further analyze Bubble Rap, dLife, and SCORP to
understand how they can excel in different conditions of
Table 2
Characterization of opportunistic forwarding proposals.
Proposals Social similarity metrics Data similarity metrics Dynamic social graphs
Bubble Rap Communities and centrality
CiPRO User profile
SocialCast Data type and relevance to users
ContentPlace Social relationship and communities Data popularity, type and relevance to users
dLife Social weight and node importance U
SCORP Social weight Data type and relevance to users U
296 W. Moreira, P. Mendes / Ad Hoc Networks 25 (2015) 293–302
network density. In Section 5.3 the Cambridge scenario is
considered. As shown in Section 3, despite of having a
higher network density, the number of contact opportuni-
ties in this scenario is the lowest and this is what classifies
a development region setting. To illustrate a high density
(i.e., urban environment), in Section 5.4 we consider the
synthetic mobility scenario which presents the highest
density and average node degree.
5.1. Methodology and simulation settings
Our experimental analysis is carried out in the Opportu-
nistic Network Environment (ONE) simulator [25]. Results
are presented with a 95% confidence interval and in terms
of averaged delivery probability (i.e., ratio between the
number of delivered messages and the number of mes-
sages that should have been delivered), cost (i.e., number
of replicas per delivered message), and latency (i.e., time
elapsed between message creation and delivery).
The traces comprise 97 (MIT) and 36 (Cambridge)
mobile devices. The synthetic mobility scenario simulates
3 groups (A; M, and B) of 50 people each. Nodes are
equipped with 250-Kbps Bluetooth interfaces, and have
speed up to 1.4 m/s. The reason for considering traces
and synthetic mobility scenario relates to the fact that:
(i) with the former, we have a representation of real user
behavior; and (ii) with the latter, we are able to have den-
sity and a number of contact opportunities much higher
than the one provided by the human traces.
Regarding message TTL, we set it to be unlimited in
order to observe the performance behavior (i.e., buffer con-
sumption, number of replicas) of the forwarding proposals
in networks with high traffic load. Message size ranges
from 1 to 100 kB. Despite nodes may have plenty of stor-
age, we consider nodes having different capabilities (i.e.,
smartphones). Thus, nodes have buffers limited to 2 MB
as we consider that nodes may not be willing to share all
their storage space. The performance evaluation follows
the guidelines of a Universal Evaluation Framework (UEF)
[26] to guarantee fairness in the assessment.
In the first set of experiments (cf. Section 5.2), we ana-
lyze the impact that network density has on opportunistic
forwarding. For that, all proposals are subjected to same
network traffic load in each scenario, i.e., 78000, 6000,
and 200 messages are expected to be delivered across all
experiments for MIT, Cambridge, and synthetic scenarios,
respectively. These values are chosen considering the num-
ber of nodes, area, and length of experiments as to gener-
ate a fair number of messages per node per day in an
attempt to avoid resources overload.
In the second set of experiments, we analyze in detail
the performance of opportunistic forwarding in sparse
networks, when facing an increasing traffic load (cf.
Section 5.3). For that, we chose Cambridge as a sparse
network due to its low average node degree (26.83, cf.
Table 1), which is indeed a characteristic of development
regions. To create the same traffic load variation during
the evaluation of the three forwarding proposals, a Bubble
Rap/dLife source is configured to send 1, 5, 10, 20 and 35
different messages to each of the 35 destinations, while a
SCORP source creates 35 messages with unique data types,
and receivers are configured with 1, 5, 10, 20, and 35 ran-
domly assigned data type interests. Thus, we have a total of
35, 175, 350, 700, and 1225 generated messages. The msg/
int notation represents the number of messages sent by
Bubble Rap and dLife sources, or the number of data inter-
ests of each of the SCORP receivers. Since Bubble Rap/dLife
sources generate more messages than SCORP, in this
scenario node 0 (the source) has no buffer restriction and
message generation varies with the load: 35 messages/
day rate (load of 1, 5, and 10 messages), and 70 and 140
messages/day rates (load of 20 and 35 messages,
respectively).
In the third set of experiments, we analyze in detail
the performance of opportunistic forwarding in dense
networks, when facing different mobility levels (cf.
Section 5.4). We considered the synthetic mobility scenario
because of its high density (0.999) and average node
degree (148.8) which are characteristics of urban settings
(cf. Table 1). In this experiment the same load, of 200 mes-
sages per source, is used during the evaluation of the three
forwarding proposals. With Bubble Rap and dLife, node 0
(group A) generates 100 messages to nodes in groups B
and M, and node 100 (group B) generates 100 messages
to nodes in groups A and M. For SCORP, each group has dif-
ferent data interests: group A (reading), group B (games),
and group M (reading and games). The source nodes, 0
and 100, generate only one message for each data type,
game and reading. This guarantees the same number of
messages expected to be received, i.e., 200. Also, by varying
the node pause times between 100 and 100,000 s, we
ensure different levels of mobility (varying from 3456 to
3.4 movements in the simulation). In this scenario, all
sources have restricted buffer, but rate is of 25 messages
generated every 12 h. This is done so that Bubble Rap and
dLife do not discard messages prior to even trying to
exchange them given the buffer constraint.
In what concerns the specificity inherent to each pro-
posal, Bubble Rap uses the K-Clique and cumulative win-
dow algorithms for community formation and centrality
computation [5]. As for dLife and SCORP, both consider 24
daily samples (i.e., each of one hour) [8].
5.2. Different network densities
This section shows how network density impacts on the
performance of opportunistic forwarding proposals. As
mentioned before, our goal is to analyze the usefulness of
opportunistic forwarding for a wide range of network den-
sities and not only the typical DTN sparse scenarios: we
want to bring attention to the performance of DTN also
in dense scenarios found in urban settings, which encom-
pass a panoply of heterogenous devices that could be
exploited to improve users’ networking experience. Fig. 1
presents the performance of considered proposals with dif-
ferent network densities (cf. Table 1).
Generally speaking, we observe that the performance of
social-aware opportunistic forwarding improves with the
increase of network density: the more well connected
nodes are, the better they interact and (i) can deliver more
messages; and (ii) messages are delivered in less time. The
W. Moreira, P. Mendes / Ad Hoc Networks 25 (2015) 293–302 297
associated cost may increase or decrease, and such behav-
ior depends on: (i) whether forwarding proposals make use
of social and/or data similarity metrics; and (ii) on their
assumptions about the network dynamics (cf. Section 4).
Fig. 1(a) presents the average delivery probability. In
particularly, we can observe that all proposals experience
the same performance increasing trend across the different
scenarios. Still, the identified performance increase
between MIT/Cambridge and Cambridge/Synthetic is not
in the same order, despite the clear increase in network
density, 0.277 and 0.232, respectively (cf. Table 1). The rea-
son for that is the low average node degree identified in
Cambridge (26.83). As mentioned in Section 3, average
node degree reflects the number of contact opportunities
a node may have. Since Cambridge presents the lowest
degree among the scenarios, this explains the subtle deliv-
ery gains.
Performance behavior for all proposals indeed improve
with higher network density (Synthetic scenario): a higher
density (0.999) indicates more contact opportunities for
the exchange of messages (148.8, cf. Table 1). Due to the
fact that it relies on social and data similarity metrics as
well as the dynamic behavior of users, SCORP is able to
deliver all messages.
Fig. 1(b) presents the average cost which is expected to
increase with network density: the more contact opportu-
nities the scenario has, the more replicas proposals create.
This can be easily seen with Bubble Rap, which creates an
average of more than 5000 replicas to perform a successful
delivery. The same cost increasing trend is observed with
dLife, but in different orders and especially for the syn-
thetic scenario. We believe that the much higher number
of copies (up to 98% when compared to other scenarios)
is related to the mobility rate. In the Synthetic scenario,
nodes move a lot, resulting in a high number of contacts
with many nodes. Consequently, dLife takes longer to have
a stable view of the network in terms of its social weights
and node importances, which leads to the creation of
unwanted replicas. SCORP has the best cost performance
(up to 0.5 replicas to perform a successful delivery), since
the more interests a node has, the better forwarder it is.
The M group (cf. Section 5.1) accounts for 50% of the inter-
ests existing in the network, which makes it a greater car-
rier for messages.
Fig. 1(c) shows the average latency experienced by mes-
sages since their creation up to their reception at destina-
tion. With traces, all proposals keep the same trend:
average latency decreases. This is due to nodes spanning
different areas and encounter frequency happening at dif-
ferent rates. Thus, messages are forwarded to nodes who
may reach a given destination in shorter periods of time.
SCORP presents a much higher increase in the MIT experi-
ment, as it takes its time to suitably choose the next for-
warders (based on their interest on the message’s
content or social relationship to other interested parties).
This added to fact that interactions among nodes happen
according to the area they move jointly contribute to such
latency peak.
As for the Synthetic mobility experiment, not only the
proposals have many different contact opportunities, but
also nodes encounter more frequently. This consequently
has a positive impact for Bubble Rap, dLife, and SCORP that
are able to deliver content in less time (12,486 s, 11,710 s,
and 6864 s, respectively).
0
20
40
60
80
100
MIT Cambridge Synthetic
Increasing Density
Average Delivery Probability
%
Bubble Rap
dLife
SCORP
(a)
0
1
2
3
4
MIT Cambridge Synthetic
Increasing Density
12
14
#ofreplicas(x102
)
40
50
60
Average Cost
(b)
0
1
2
3
4
5
6
MIT Cambridge Synthetic
Increasing Density
20
60
100
140
Average LatencySeconds(x10
4
)
(c)
Fig. 1. Performance over different network densities.
298 W. Moreira, P. Mendes / Ad Hoc Networks 25 (2015) 293–302
5.3. Low density networks with increasing load
This section presents the performance of opportunistic
forwarding proposals over the low density Cambridge
scenario with increasing traffic load. As mentioned in
Section 3, Cambridge has a low number of contact oppor-
tunities which characterizes development regions. Fig. 2
presents the performance of considered proposals with
different messages and interests being generated.
From the collected results, we observe that opportunis-
tic forwarding based either solely on social similarity met-
rics (Bubble Rap) and/or on the dynamism found users’
behavior (dLife) have a more variable performance behav-
ior. As load increases, these proposals struggle to maintain
a satisfactory functioning due to the overload of resources.
With the combination of social/data similarity metrics
with awareness of users’ dynamic behavior (SCORP),
opportunistic forwarding presents a better behavior: with
the increase in their number of interests, users become
great data disseminators. This improves data delivery with
very low associated cost and latency.
Fig. 2(a) presents the average delivery probability. In
the 1 msg/int configuration, formed communities comprise
almost all nodes. This is advantageous for Bubble Rap since
most of its deliveries happen to nodes sharing communi-
ties. Due to the low number of contact opportunities, dLife
and SCORP take mainly advantage of direct delivery: 57%
and 51% of messages, respectively, are delivered directly
to the destinations.
As the load increases, Bubble Rap presents a 50%
decrease in delivery probability, as it relies on communi-
ties to perform forwardings, and consequently buffer space
becomes an issue. We estimate a buffer usage in the 5 msg/
int configuration of 9.94 MB in each node, which exceeds
the allowed 2 MB (cf. Section 5.1).
This estimation is for a worst case scenario, where Bub-
ble Rap spreads copies to every encountered node. Since
this cannot happen, as Bubble Rap also relies on local cen-
trality to reduce replication, buffer exhaustion is really an
issue given that messages are replicated to fewer nodes
than in our estimation. As more messages are generated,
replication increases: this causes the spread of messages
that potentially take over the resources needed to forward
other messages, reducing Bubble Rap’s capability to deliv-
ery messages.
dLife has a 43% decrease in delivery probability when
load increases, since it needs a warmup time to have an
accurate view of the social weights. This leads to forwar-
dings that never reach destinations given the contact spo-
radicity. For the 10 msg/int configuration, dLife also
experiences buffer exhaustion: estimated consumption is
of 2.17 MB per node. Still, by considering social weights
or node importance, dLife to reach a more stable behavior
than Bubble Rap.
The delivery capability of SCORP raises as the ability of
nodes to become a good carrier increases (i.e., the more
data interests a node has, the better it is to deliver data
to others, since they potentially share data interests). The
0
20
40
60
80
100
1 5 10 20 35
%
# of messages/interests per node
Average Delivery Probability
Bubble Rap
dLife
SCORP
(a)
0
2
4
6
8
10
1 5 10 20 35
#ofreplicas(x10
2
)
# of messages/interests per node
Average Cost
(b)
0
2
4
6
8
10
12
14
1 5 10 20 35
Seconds(x10
4
)
# of messages/interests per node
Average Latency
(c)
Fig. 2. Performance over low density networks.
W. Moreira, P. Mendes / Ad Hoc Networks 25 (2015) 293–302 299
maximum estimated buffer consumption of SCORP is of
0.16 MB (35 msg/int).
Fig. 2(b) presents the cost behavior. In the 1 msg/int
configuration, all proposals create very few replicas to per-
form a successful delivery, 7.95 (Bubble Rap), 14.32 (dLife),
and 23.46 (SCORP), as they rely mostly on shared commu-
nities and/or direct deliveries. We also observe that SCORP
replicates more than dLife due to a particularity in its
implementation: SCORP nodes with interest in a specific
data type not only process messages carrying such type
of data, but also replicate it to other interested nodes, thus
creating extra replicas.
For the 5, 10, 20 and 35 msg/int configurations, cost is
expected to increase as load increases, as seen with dLife.
The same performance behavior was expected for Bubble
Rap. However, the observed cost peaks relate to the corre-
lation between the message creation time and the sporad-
icity of contacts: messages created in periods with a high
number of contacts are subject to more replications. This
is more evident with Bubble Rap at the 5 msg/int configura-
tion, as it relies on shared communities to forward: as
mentioned earlier, most of the communities comprise
almost all nodes, which increases its replication rate.
Despite the efforts, these replications do not improve the
delivery probabilities of Bubble Rap and dLife, contributing
only to the associated forwarding cost.
When carrying a significant number of data interests, a
SCORP node can serve as a carrier for a larger number of
nodes. Consequently, the observed extra replicas the in
the 1 msg/int configuration make it rather efficient: SCORP
creates an average of 6.39 replicas across all msg/int con-
figurations, while Bubble Rapand dLife produce 452.41
and 96 replicas, respectively.
Fig. 2(c) shows the average latency that messages expe-
rience. The latency peak in the 1 msg/int configuration
refers to the message generation time: some messages
are created during periods where very few contacts (and
sometimes none) take place followed by long periods (12
to 23 h) with almost no contact. Consequently, messages
are stored longer, contributing to the increase of the over-
all latency. This effect is mitigated as the load increases
with messages being created almost immediately before
a high number of contacts take place.
Since latency is in function of the delivered messages,
the variable behavior of Bubble Rap and dLife is due to vari-
ations in their delivery rates, and also to their choices of
next forwarders that may take longer to deliver data to
destinations. SCORP presents a latency that is up to 90.2%
and 92.2% lower than Bubble Rap and dLife, respectively.
The good performance of SCORP is due to the fact that
latency decreases with the number of data interest carried
by each node: A node carrying a significant number of data
interests is a good carried for more data types, even if such
node itself is not interested in such data types, leading to a
higher number of carriers and so a low latency to distribute
data types to interested nodes.
5.4. High density networks with increasing mobility
This section presents the performance of opportunistic
forwarding proposals over the high density synthetic
scenario, under different mobility levels. As presented in
Section 3, the synthetic scenario has the highest density
and number of contact opportunities which is a character-
istic of urban settings. Fig. 3 presents the performance of
considered proposals with different mobility levels.
Generally speaking, as nodes start to move less (i.e.,
increasing pause time), less messages are expected to be
delivered. Since nodes start to encounter at a less frequent
rate, the number of replications is also expect to decrease.
Regarding latency, messages are to experience longer wait-
ing times prior to delivery, as nodes move less, and the
encounters may not be enough to reach intermediate
nodes that meet the destinations or even the destinations
themselves.
Fig. 3(a) presents the average delivery probability.
Given the community formation characteristic of this sce-
nario, Bubble Rap relies mostly on the global centrality to
deliver content. By looking at centrality [5], we observe
very few nodes (out of the 150) with global centrality that
can actually aid in forwarding, i.e., 19.33% (29 nodes),
10.67% (16 nodes), 21.33% (32 nodes), and 2% (3 nodes)
for 100, 1000, 10,000, and 100,000 pause time configura-
tions, respectively. So, these nodes become hubs and given
buffer constraint and infinite TTL (i.e., messages created
earlier take the opportunity of newly created ones), it is
certain that nodes drop messages, directly impacting Bub-
ble Rap.
Given the high number of contacts, the computation of
social weight and node importance done by dLife takes
longer to reflect reality: thus dLife replicates more and
experiences buffer exhaustion. Indeed, social awareness
is advantageous, but still not enough to reach optimal
delivery rate in such conditions.
Independent of the number of contacts among nodes,
SCORP can still identify nodes that are better related to oth-
ers sharing similar interests, reaching optimal delivery rate
for 100, 1000, and 10,000 pause time configurations. By
considering nodes’ interest in content and their social
weights, SCORP does not suffer as much with node mobility
as dLife and Bubble Rap.
With 100,000 s of pause time, the little interaction hap-
pening in a sporadic manner (with intervals between 20
and 26 h) affects Bubble Rap, dLife and SCORP as they
depend on such interactions to compute centrality, node
importance, and social weights, as well as to exchange/
deliver content.
Fig. 3(b) presents the average cost behavior. As pause
time increases, the number of contacts among nodes
decreases, providing all solutions with the opportunity to
have a stable view of the network in terms of their social
metrics with 100, 1000, and 10,000 s of pause time. This
explains the cost reduction for Bubble Rap and dLife: both
are able to identify the best next forwarders, resulting in
the creation of less replicas to perform a successful
delivery.
SCORP has a very low replication rate (average of 0.5
replicas) given its choice to replicate based on the interest
that nodes have on content and on their social weight
towards other nodes interested in such content. When
the intermediate node has an increased number of
interests (i.e., by having different interests, the node can
300 W. Moreira, P. Mendes / Ad Hoc Networks 25 (2015) 293–302
potentially deliver more content) as observed in Section 5.3,
replication costs are even lower. Furthermore, SCORP
suitably uses buffer space with an estimated average occu-
pancy of 0.03 MB per node per day.
With 100,000-s pause time, as cost is in function of
delivered messages (and deliveries are low, due to contact
sporadicity), proposals have a low cost.
As expected (cf. Fig. 3(c)), latency increases as node
mobility decreases: encounters are less frequent, and so
content must be stored for longer times. Also, the time that
the social metrics take to converge (i.e., a more stable view
of the network in terms of centrality, social weight, and
node importance) contributes for the increase in the expe-
rienced latency. The highest increase in latency with
100,000 s of pause time is due to contacts happening in a
sporadic fashion with intervals between them of up to
26 h, thus proposals take much longer to perform a
delivery.
6. Conclusions
Opportunistic forwarding proposals comprise social
similarity (e.g., common social groups and communities,
node popularity, levels of centrality, social relationships
and interactions, user profiles) and/or data similarity
(e.g., shared interests, interest of users in the content tra-
versing network, content availability, type of content)
aspects. Additionally, these proposals may (or not) take
into account the network dynamics.
In this paper, we highlight the possibility of having
opportunistic forwarding that can provide support to (i)
basic services in extreme networking conditions (e.g.,
end-to-end communication in development regions); and
(ii) low-cost services in dense (e.g., urban) networking
scenarios.
Our results show that opportunistic forwarding, based
on either social or data similarity metrics may present sat-
isfactory performance over challenged (i.e., development
region) and dense (i.e., urban) scenarios, even when for-
warding proposals do not considering the dynamism
observed in the users behavior.
However, when social and data similarity metrics are
considered alongside with the dynamics of user behavior,
opportunistic forwarding presents interesting performance
gains in both scenarios: average results over sparse and
dense networks, shows that performance improvements
go up to 54% regarding delivery capability while latency
and cost can be reduced by 45% and 99% respectively,
when compared to forwarding solely based on data simi-
larity and completely agnostic to the dynamism found in
user behavior.
These findings point to a new research challenge
regarding the impact of DTN application: the investigation
of self-awareness mechanisms able to adapt their forward-
ing schemes based on the context of the user, namely the
density of the network where he/she is currently. Based
on our results, by (i) being able to adapt to the characteris-
tics of the scenario (sparse vs. dense), considering the
0
20
40
60
80
100
100 1000 10000 100000
%
Pause time (seconds)
Average Delivery Probability
Bubble Rap
dLife
SCORP
(a)
0
10
20
30
40
50
60
70
100 1000 10000 100000
#ofreplicas(x102
)
Pause time (seconds)
Average Cost
(b)
0
5
10
15
20
100 1000 10000 100000
Seconds(x104
)
Pause time (seconds)
Average Latency
(c)
Fig. 3. Performance over high density networks.
W. Moreira, P. Mendes / Ad Hoc Networks 25 (2015) 293–302 301
dynamism of users’ behavior; and (ii) also employing data
similarity metrics, opportunistic forwarding allows the
exchange of data in both development regions and urban
settings.
References
[1] A. Chaintreau, P. Hui, J. Crowcroft, C. Diot, R. Gass, J. Scott, Impact of
human mobility on opportunistic forwarding algorithms, IEEE Trans.
Mobile Comput. 6 (6) (2007) 606–620.
[2] A. Vahdat, D. Becker, Epidemic routing for partially connected ad hoc
networks, Tech. Rep. CS-200006, Duke University, 2000.
[3] P. Costa, C. Mascolo, M. Musolesi, G.P. Picco, Socially-aware routing
for publish-subscribe in delay-tolerant mobile ad hoc networks, IEEE
J. Sel. A. Commun. 26 (5) (2008) 748–760.
[4] C. Boldrini, M. Conti, A. Passarella, Design and performance
evaluation of content place, a social-aware data dissemination
system for opportunistic networks, Comput. Netw. 54 (4) (2010)
589–604.
[5] P. Hui, J. Crowcroft, E. Yoneki, Bubble rap: social-based forwarding in
delay-tolerant networks, IEEE Trans. Mobile Comput. 10 (11) (2011)
1576–1589.
[6] W. Moreira, P. Mendes, S. Sargento, Opportunistic routing based on
daily routines, in: Proceedings of IEEE WoWMoM, San Francisco,
USA, 2012.
[7] H.A. Nguyen, S. Giordano, Context information prediction for social-
based routing in opportunistic networks, Ad Hoc Netw. 10 (8) (2012)
1557–1569.
[8] W. Moreira, P. Mendes, S. Sargento, Social-aware opportunistic
routing protocol based on user’s interactions and interests, in: M.H.
Sherif, A. Mellouk, J. Li, P. Bellavista (Eds.), Ad Hoc Networks,
Springer International Publishing, 2014, pp. 100–115.
[9] T. Hossmann, T. Spyropoulos, F. Legendre, Know thy neighbor:
towards optimal mapping of contacts to social graphs for dtn routing,
in: Proceedings of INFOCOM, San Diego, USA, 2010, pp. 866–874.
[10] N. Eagle, A. Pentland, Eigenbehaviors: identifying structure in
routine, Behav. Ecol. Sociobiol. 63 (7) (2009) 1057–1066.
[11] I. Komnios, V. Tsaoussidis, Carpool: extending free internet access
over dtn in urban environment, in: Proceedings of ACM MobiCom
LCDNet, Miami, USA, 2013.
[12] P.-C. Cheng, K. Lee, M. Gerla, J. Harri, Geodtn+nav: geographic dtn
routing with navigator prediction for urban vehicular environments,
Mobile Netw. Appl. 15 (1) (2010) 61–82.
[13] P. Hui, A. Chaintreau, J. Scott, R. Gass, J. Crowcroft, C. Diot, Pocket
switched networks and human mobility in conference
environments, in: Proceedings of ACM SIGCOMM WDTN,
Philadelphia, USA, 2005.
[14] T. Hossmann, T. Spyropoulos, F. Legendre, A complex network
analysis of human mobility, in: Proceedings of INFOCOM, Shanghai,
China, 2011.
[15] S. Farrell, V. Cahill, Delay- and Disruption-Tolerant Networking
Artech House Telecommunications Library, Artech House, 2006.
[16] S. Jain, K. Fall, R. Patra, Routing in a delay tolerant network, in:
Proceedings of SIGCOMM, Portland, USA, 2004.
[17] W. Moreira, R. Ferreira, D. Cirqueira, P. Mendes, E. Cerqueira,
Socialdtn: A dtn implementation for digital and social inclusion,
in: Proceedings of ACM MobiCom LCDNet, Miami, USA, 2013.
[18] R. Ferreira, W. Moreira, P. Mendes, M. Gerla, E. Cerqueira, Improving
the delivery rate of digital inclusion applications for amazon
riverside communities by using an integrated bluetooth dtn
architecture, Int. J. Comput. Sci. Netw. Security 14 (1) (2014) 17–24.
[19] W. Zhao, M. Ammar, E. Zegura, A message ferrying approach for data
delivery in sparse mobile ad hoc networks, in: Proceedings of ACM
MobiHoc, Roppongi Hills, Japan, 2004.
[20] R. Shah, S. Roy, S. Jain, W. Brunette, Data mules: modeling a three-
tier architecture for sparse sensor networks, in: Proceedings of IEEE
Workshop SNPA, Anchorage, USA, 2003.
[21] N. Eagle, A. Pentland, CRAWDAD data set mit/reality (v. 2005-07-01),
July 2005. <http://crawdad.cs.dartmouth.edu/mit/reality>.
[22] J. Scott, R. Gass, J. Crowcroft, P. Hui, C. Diot, A. Chaintreau, CRAWDAD
trace cambridge/haggle/imote/content (v. 2006-09-15), September
2006. <http://crawdad.cs.dartmouth.edu/cambridge/haggle/imote/
content>.
[23] M. Bastian, S. Heymann, M. Jacomy, Gephi: An open source software
for exploring and manipulating networks, in: Proceedings of AAAI
Conference on Weblogs and Social Media, San Jose, California, 2009.
[24] W. Moreira, P. Mendes, Social-aware opportunistic routing: the new
trend, in: I. Woungang, S.K. Dhurandher, A. Anpalagan, A.V.
Vasilakos (Eds.), Routing in Opportunistic Networks, Springer, New
York, 2013, pp. 27–68.
[25] A. Keränen, J. Ott, T. Kärkkäinen, The one simulator for dtn protocol
evaluation, in: Proceedings of Simutools, Rome, Italy, 2009.
[26] W. Moreira, P. Mendes, S. Sargento, Assessment model for
opportunistic routing, in: Proceedings of LATINCOM, Belem, Brazil,
2011.
Waldir Moreira started his Bachelor’s degree
in Computer Science in 1999 at the University
of Lethbridge, Canada and finished it in 2005
at the Universidade da Amazonia, Brazil. Then,
he received his Master’s degree from the
Postgraduate Program of Computer Science at
Universidade Federal do Pará, Brazil. In 2009,
He joined the Internet Architectures and
Networking (IAN) group at Institute for Sys-
tems and Computer Engineering of Porto
(INESC-Porto) in Portugal, participating in a
Wireless Cooperative Networking project.
Currently, he is waiting for his defense to get the Ph.D. degree from the
MAP Doctoral Programme in Telecommunications (MAP-Tele) at Uni-
versity of Aveiro (UA). He is a member of the Association for Research and
Development in Cognitive and People-centric Computing (COPELabs/
ULHT), an external collaborator with the Research Group on Computer
Networks and Multimedia Communications (GERCOM/UFPA), and Invited
Professor at Universidade Lusófona Porto (ULP). His research interests
include Wireless Adhoc, Mesh, Social-aware, Cooperative, Opportunistic,
and Information-centric Networking and Routing.
Paulo Mendes is the vice-director of the
Cognition and People centric computing
Research Center (COPELabs) at University
Lusofona, where he is associated professor,
and director of the Ph.D. program on Infor-
matics – New Media and Pervasive Systems
(NEMPS). He studied Informatics Engineering
at University of Coimbra receiving a diploma
degree in 1993, and at the Technical Univer-
sity of Lisbon receiving a M.Sc. degree in 1998
in Electrical and Computer Engineering. In
2004 he got his Ph.D. (summa cum laude)
degree in Informatics Engineering from the University of Coimbra, having
performed his Ph.D. thesis work as a visiting Scholar at Columbia Uni-
versity, New York. Before his Ph.D. Paulo worked in industry as a coor-
dinator of a telematic unit at a Portuguese company and as a researcher at
the informatics center of University of Coimbra. After his Ph.D. Paulo was
a senior researcher at NTT DOCOMO Euro-labs for 4 years, and a research
coordinator at the portuguese research lab INESCTEC for 3 years. In 2010
we founded the research center on Informatics and Technologies (SITIL-
abs) at University Lusofona, which gave place to COPELabs in October
2013. The publication record includes over 100 scientific articles and 14
international patents. Besides his scientific publications, Paulo is a
member of the ACM SIGCOMM and also has contributing to IETF/IRTF
work.
302 W. Moreira, P. Mendes / Ad Hoc Networks 25 (2015) 293–302

Contenu connexe

Tendances

A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...inventionjournals
 
Optimal content downloading in vehicular network with density measurement
Optimal content downloading in vehicular network with density measurementOptimal content downloading in vehicular network with density measurement
Optimal content downloading in vehicular network with density measurementZac Darcy
 
Complex Networks Analysis @ Universita Roma Tre
Complex Networks Analysis @ Universita Roma TreComplex Networks Analysis @ Universita Roma Tre
Complex Networks Analysis @ Universita Roma TreMatteo Moci
 
Maximizing p2 p file access availability in mobile ad hoc networks though rep...
Maximizing p2 p file access availability in mobile ad hoc networks though rep...Maximizing p2 p file access availability in mobile ad hoc networks though rep...
Maximizing p2 p file access availability in mobile ad hoc networks though rep...LeMeniz Infotech
 
Evaluating content-centric communication over power line communication infras...
Evaluating content-centric communication over power line communication infras...Evaluating content-centric communication over power line communication infras...
Evaluating content-centric communication over power line communication infras...Khaled Ben Driss
 
Maximizing p2 p file access availability in mobile ad hoc networks though rep...
Maximizing p2 p file access availability in mobile ad hoc networks though rep...Maximizing p2 p file access availability in mobile ad hoc networks though rep...
Maximizing p2 p file access availability in mobile ad hoc networks though rep...Pvrtechnologies Nellore
 
A boring presentation about social mobile communication patterns and opportun...
A boring presentation about social mobile communication patterns and opportun...A boring presentation about social mobile communication patterns and opportun...
A boring presentation about social mobile communication patterns and opportun...Save Manos
 
APPLICATION OF CLUSTERING TO ANALYZE ACADEMIC SOCIAL NETWORKS
APPLICATION OF CLUSTERING TO ANALYZE ACADEMIC SOCIAL NETWORKSAPPLICATION OF CLUSTERING TO ANALYZE ACADEMIC SOCIAL NETWORKS
APPLICATION OF CLUSTERING TO ANALYZE ACADEMIC SOCIAL NETWORKSIJwest
 
Iaetsd an enhancement for content sharing over
Iaetsd an enhancement for content sharing overIaetsd an enhancement for content sharing over
Iaetsd an enhancement for content sharing overIaetsd Iaetsd
 
Lectura 2.2 the roleofontologiesinemergnetmiddleware
Lectura 2.2   the roleofontologiesinemergnetmiddlewareLectura 2.2   the roleofontologiesinemergnetmiddleware
Lectura 2.2 the roleofontologiesinemergnetmiddlewareMatias Menendez
 
Spreading processes on temporal networks
Spreading processes on temporal networksSpreading processes on temporal networks
Spreading processes on temporal networksPetter Holme
 
An updated look at social network extraction system a personal data analysis ...
An updated look at social network extraction system a personal data analysis ...An updated look at social network extraction system a personal data analysis ...
An updated look at social network extraction system a personal data analysis ...eSAT Publishing House
 
Top Ten Read Articles - International Journal of Wireless & Mobile Networks (...
Top Ten Read Articles - International Journal of Wireless & Mobile Networks (...Top Ten Read Articles - International Journal of Wireless & Mobile Networks (...
Top Ten Read Articles - International Journal of Wireless & Mobile Networks (...ijwmn
 
Social-aware Forwarding in Opportunistic Wireless Networks: Content Awareness...
Social-aware Forwarding in Opportunistic Wireless Networks: Content Awareness...Social-aware Forwarding in Opportunistic Wireless Networks: Content Awareness...
Social-aware Forwarding in Opportunistic Wireless Networks: Content Awareness...Waldir Moreira
 
Study of the topology mismatch problem in peer to-peer networks
Study of the topology mismatch problem in peer to-peer networksStudy of the topology mismatch problem in peer to-peer networks
Study of the topology mismatch problem in peer to-peer networksAlexander Decker
 

Tendances (18)

A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
 
Optimal content downloading in vehicular network with density measurement
Optimal content downloading in vehicular network with density measurementOptimal content downloading in vehicular network with density measurement
Optimal content downloading in vehicular network with density measurement
 
Complex Networks Analysis @ Universita Roma Tre
Complex Networks Analysis @ Universita Roma TreComplex Networks Analysis @ Universita Roma Tre
Complex Networks Analysis @ Universita Roma Tre
 
Maximizing p2 p file access availability in mobile ad hoc networks though rep...
Maximizing p2 p file access availability in mobile ad hoc networks though rep...Maximizing p2 p file access availability in mobile ad hoc networks though rep...
Maximizing p2 p file access availability in mobile ad hoc networks though rep...
 
Evaluating content-centric communication over power line communication infras...
Evaluating content-centric communication over power line communication infras...Evaluating content-centric communication over power line communication infras...
Evaluating content-centric communication over power line communication infras...
 
Maximizing p2 p file access availability in mobile ad hoc networks though rep...
Maximizing p2 p file access availability in mobile ad hoc networks though rep...Maximizing p2 p file access availability in mobile ad hoc networks though rep...
Maximizing p2 p file access availability in mobile ad hoc networks though rep...
 
A boring presentation about social mobile communication patterns and opportun...
A boring presentation about social mobile communication patterns and opportun...A boring presentation about social mobile communication patterns and opportun...
A boring presentation about social mobile communication patterns and opportun...
 
APPLICATION OF CLUSTERING TO ANALYZE ACADEMIC SOCIAL NETWORKS
APPLICATION OF CLUSTERING TO ANALYZE ACADEMIC SOCIAL NETWORKSAPPLICATION OF CLUSTERING TO ANALYZE ACADEMIC SOCIAL NETWORKS
APPLICATION OF CLUSTERING TO ANALYZE ACADEMIC SOCIAL NETWORKS
 
D1803022335
D1803022335D1803022335
D1803022335
 
PhD dissertation
PhD dissertationPhD dissertation
PhD dissertation
 
Iaetsd an enhancement for content sharing over
Iaetsd an enhancement for content sharing overIaetsd an enhancement for content sharing over
Iaetsd an enhancement for content sharing over
 
Lectura 2.2 the roleofontologiesinemergnetmiddleware
Lectura 2.2   the roleofontologiesinemergnetmiddlewareLectura 2.2   the roleofontologiesinemergnetmiddleware
Lectura 2.2 the roleofontologiesinemergnetmiddleware
 
Spreading processes on temporal networks
Spreading processes on temporal networksSpreading processes on temporal networks
Spreading processes on temporal networks
 
An updated look at social network extraction system a personal data analysis ...
An updated look at social network extraction system a personal data analysis ...An updated look at social network extraction system a personal data analysis ...
An updated look at social network extraction system a personal data analysis ...
 
Prototype Models of IoTs Interoperability
Prototype Models of IoTs InteroperabilityPrototype Models of IoTs Interoperability
Prototype Models of IoTs Interoperability
 
Top Ten Read Articles - International Journal of Wireless & Mobile Networks (...
Top Ten Read Articles - International Journal of Wireless & Mobile Networks (...Top Ten Read Articles - International Journal of Wireless & Mobile Networks (...
Top Ten Read Articles - International Journal of Wireless & Mobile Networks (...
 
Social-aware Forwarding in Opportunistic Wireless Networks: Content Awareness...
Social-aware Forwarding in Opportunistic Wireless Networks: Content Awareness...Social-aware Forwarding in Opportunistic Wireless Networks: Content Awareness...
Social-aware Forwarding in Opportunistic Wireless Networks: Content Awareness...
 
Study of the topology mismatch problem in peer to-peer networks
Study of the topology mismatch problem in peer to-peer networksStudy of the topology mismatch problem in peer to-peer networks
Study of the topology mismatch problem in peer to-peer networks
 

En vedette

Adding engagement to the classroomv1
Adding engagement to the classroomv1Adding engagement to the classroomv1
Adding engagement to the classroomv1Scott860
 
Model View Controller ext4
Model View Controller  ext4Model View Controller  ext4
Model View Controller ext4Pankaj Avhad
 
76호 우리와 다음
76호 우리와 다음 76호 우리와 다음
76호 우리와 다음 cmej4747
 
UX Design + UI Design: Injecting a brand persona!
UX Design + UI Design: Injecting a brand persona!UX Design + UI Design: Injecting a brand persona!
UX Design + UI Design: Injecting a brand persona!Jayan Narayanan
 

En vedette (6)

Adding engagement to the classroomv1
Adding engagement to the classroomv1Adding engagement to the classroomv1
Adding engagement to the classroomv1
 
Ccna pres
Ccna presCcna pres
Ccna pres
 
Model View Controller ext4
Model View Controller  ext4Model View Controller  ext4
Model View Controller ext4
 
Fa10 mcs-005
Fa10 mcs-005Fa10 mcs-005
Fa10 mcs-005
 
76호 우리와 다음
76호 우리와 다음 76호 우리와 다음
76호 우리와 다음
 
UX Design + UI Design: Injecting a brand persona!
UX Design + UI Design: Injecting a brand persona!UX Design + UI Design: Injecting a brand persona!
UX Design + UI Design: Injecting a brand persona!
 

Similaire à 1 s2.0-s1570870514001255-main

SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKSSIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKSijujournal
 
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...ijasuc
 
Community Detection Using Inter Contact Time and Social Characteristics Based...
Community Detection Using Inter Contact Time and Social Characteristics Based...Community Detection Using Inter Contact Time and Social Characteristics Based...
Community Detection Using Inter Contact Time and Social Characteristics Based...jake henry
 
Content Sharing over Smartphone-Based Delay-Tolerant Networks
Content Sharing over Smartphone-Based Delay-Tolerant NetworksContent Sharing over Smartphone-Based Delay-Tolerant Networks
Content Sharing over Smartphone-Based Delay-Tolerant NetworksIJERA Editor
 
Mobile data offloading
Mobile data offloadingMobile data offloading
Mobile data offloadingMuthu Samy
 
Mobile data offloading
Mobile data offloadingMobile data offloading
Mobile data offloadingMuthu Samy
 
Mobile data offloading
Mobile data offloadingMobile data offloading
Mobile data offloadingMuthu Samy
 
Optimal Content Downloading in Vehicular Network with Density Measurement
Optimal Content Downloading in Vehicular Network with Density MeasurementOptimal Content Downloading in Vehicular Network with Density Measurement
Optimal Content Downloading in Vehicular Network with Density MeasurementZac Darcy
 
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...IRJET Journal
 
New prediction method for data spreading in social networks based on machine ...
New prediction method for data spreading in social networks based on machine ...New prediction method for data spreading in social networks based on machine ...
New prediction method for data spreading in social networks based on machine ...TELKOMNIKA JOURNAL
 
Statistical dissemination controlIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO S...
Statistical dissemination controlIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO S...Statistical dissemination controlIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO S...
Statistical dissemination controlIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO S...ranjith kumar
 
Delay Tolerant Network
Delay Tolerant NetworkDelay Tolerant Network
Delay Tolerant NetworkMichel Chamat
 
Statistical dissemination control in large machine to-machine communication n...
Statistical dissemination control in large machine to-machine communication n...Statistical dissemination control in large machine to-machine communication n...
Statistical dissemination control in large machine to-machine communication n...Pvrtechnologies Nellore
 
The Design of a Simulation for the Modeling and Analysis of Public Transporta...
The Design of a Simulation for the Modeling and Analysis of Public Transporta...The Design of a Simulation for the Modeling and Analysis of Public Transporta...
The Design of a Simulation for the Modeling and Analysis of Public Transporta...CSCJournals
 
THE SOCIALIZED INFRASTRUCTURE OF THE INTERNET ON THE COMPUTING LEVEL
THE SOCIALIZED INFRASTRUCTURE OF THE INTERNET ON THE COMPUTING LEVEL THE SOCIALIZED INFRASTRUCTURE OF THE INTERNET ON THE COMPUTING LEVEL
THE SOCIALIZED INFRASTRUCTURE OF THE INTERNET ON THE COMPUTING LEVEL ijcsit
 
THE SOCIALIZED INFRASTRUCTURE OF THE INTERNET ON THE COMPUTING LEVEL
THE SOCIALIZED INFRASTRUCTURE OF THE INTERNET ON THE COMPUTING LEVEL THE SOCIALIZED INFRASTRUCTURE OF THE INTERNET ON THE COMPUTING LEVEL
THE SOCIALIZED INFRASTRUCTURE OF THE INTERNET ON THE COMPUTING LEVEL AIRCC Publishing Corporation
 
Effects of mobility models and nodes distribution on wireless sensors networks
Effects of mobility models and nodes distribution on wireless sensors networksEffects of mobility models and nodes distribution on wireless sensors networks
Effects of mobility models and nodes distribution on wireless sensors networksijasuc
 
An efficient approach on spatial big data related to wireless networks and it...
An efficient approach on spatial big data related to wireless networks and it...An efficient approach on spatial big data related to wireless networks and it...
An efficient approach on spatial big data related to wireless networks and it...eSAT Journals
 
A Review Paper On Viral Mobile Communications System
A Review Paper On Viral Mobile Communications SystemA Review Paper On Viral Mobile Communications System
A Review Paper On Viral Mobile Communications SystemMichele Thomas
 

Similaire à 1 s2.0-s1570870514001255-main (20)

SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKSSIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
 
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
 
Community Detection Using Inter Contact Time and Social Characteristics Based...
Community Detection Using Inter Contact Time and Social Characteristics Based...Community Detection Using Inter Contact Time and Social Characteristics Based...
Community Detection Using Inter Contact Time and Social Characteristics Based...
 
Content Sharing over Smartphone-Based Delay-Tolerant Networks
Content Sharing over Smartphone-Based Delay-Tolerant NetworksContent Sharing over Smartphone-Based Delay-Tolerant Networks
Content Sharing over Smartphone-Based Delay-Tolerant Networks
 
Mobile data offloading
Mobile data offloadingMobile data offloading
Mobile data offloading
 
Mobile data offloading
Mobile data offloadingMobile data offloading
Mobile data offloading
 
Mobile data offloading
Mobile data offloadingMobile data offloading
Mobile data offloading
 
Optimal Content Downloading in Vehicular Network with Density Measurement
Optimal Content Downloading in Vehicular Network with Density MeasurementOptimal Content Downloading in Vehicular Network with Density Measurement
Optimal Content Downloading in Vehicular Network with Density Measurement
 
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
 
New prediction method for data spreading in social networks based on machine ...
New prediction method for data spreading in social networks based on machine ...New prediction method for data spreading in social networks based on machine ...
New prediction method for data spreading in social networks based on machine ...
 
Statistical dissemination controlIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO S...
Statistical dissemination controlIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO S...Statistical dissemination controlIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO S...
Statistical dissemination controlIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO S...
 
Delay Tolerant Network
Delay Tolerant NetworkDelay Tolerant Network
Delay Tolerant Network
 
Statistical dissemination control in large machine to-machine communication n...
Statistical dissemination control in large machine to-machine communication n...Statistical dissemination control in large machine to-machine communication n...
Statistical dissemination control in large machine to-machine communication n...
 
The Design of a Simulation for the Modeling and Analysis of Public Transporta...
The Design of a Simulation for the Modeling and Analysis of Public Transporta...The Design of a Simulation for the Modeling and Analysis of Public Transporta...
The Design of a Simulation for the Modeling and Analysis of Public Transporta...
 
THE SOCIALIZED INFRASTRUCTURE OF THE INTERNET ON THE COMPUTING LEVEL
THE SOCIALIZED INFRASTRUCTURE OF THE INTERNET ON THE COMPUTING LEVEL THE SOCIALIZED INFRASTRUCTURE OF THE INTERNET ON THE COMPUTING LEVEL
THE SOCIALIZED INFRASTRUCTURE OF THE INTERNET ON THE COMPUTING LEVEL
 
THE SOCIALIZED INFRASTRUCTURE OF THE INTERNET ON THE COMPUTING LEVEL
THE SOCIALIZED INFRASTRUCTURE OF THE INTERNET ON THE COMPUTING LEVEL THE SOCIALIZED INFRASTRUCTURE OF THE INTERNET ON THE COMPUTING LEVEL
THE SOCIALIZED INFRASTRUCTURE OF THE INTERNET ON THE COMPUTING LEVEL
 
Opportunistic Routing in Delay Tolerant Network with Different Routing Algorithm
Opportunistic Routing in Delay Tolerant Network with Different Routing AlgorithmOpportunistic Routing in Delay Tolerant Network with Different Routing Algorithm
Opportunistic Routing in Delay Tolerant Network with Different Routing Algorithm
 
Effects of mobility models and nodes distribution on wireless sensors networks
Effects of mobility models and nodes distribution on wireless sensors networksEffects of mobility models and nodes distribution on wireless sensors networks
Effects of mobility models and nodes distribution on wireless sensors networks
 
An efficient approach on spatial big data related to wireless networks and it...
An efficient approach on spatial big data related to wireless networks and it...An efficient approach on spatial big data related to wireless networks and it...
An efficient approach on spatial big data related to wireless networks and it...
 
A Review Paper On Viral Mobile Communications System
A Review Paper On Viral Mobile Communications SystemA Review Paper On Viral Mobile Communications System
A Review Paper On Viral Mobile Communications System
 

Dernier

VIP Call Girl in Mira Road 💧 9920725232 ( Call Me ) Get A New Crush Everyday ...
VIP Call Girl in Mira Road 💧 9920725232 ( Call Me ) Get A New Crush Everyday ...VIP Call Girl in Mira Road 💧 9920725232 ( Call Me ) Get A New Crush Everyday ...
VIP Call Girl in Mira Road 💧 9920725232 ( Call Me ) Get A New Crush Everyday ...dipikadinghjn ( Why You Choose Us? ) Escorts
 
Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...
Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...
Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...priyasharma62062
 
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...dipikadinghjn ( Why You Choose Us? ) Escorts
 
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...dipikadinghjn ( Why You Choose Us? ) Escorts
 
Top Rated Pune Call Girls Pashan ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated  Pune Call Girls Pashan ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Top Rated  Pune Call Girls Pashan ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated Pune Call Girls Pashan ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Call Girls in Nagpur High Profile
 
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbai
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbaiVasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbai
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbaipriyasharma62062
 
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...dipikadinghjn ( Why You Choose Us? ) Escorts
 
Mira Road Memorable Call Grls Number-9833754194-Bhayandar Speciallty Call Gir...
Mira Road Memorable Call Grls Number-9833754194-Bhayandar Speciallty Call Gir...Mira Road Memorable Call Grls Number-9833754194-Bhayandar Speciallty Call Gir...
Mira Road Memorable Call Grls Number-9833754194-Bhayandar Speciallty Call Gir...priyasharma62062
 
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Availabledollysharma2066
 
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...ssifa0344
 
Kharghar Blowjob Housewife Call Girls NUmber-9833754194-CBD Belapur Internati...
Kharghar Blowjob Housewife Call Girls NUmber-9833754194-CBD Belapur Internati...Kharghar Blowjob Housewife Call Girls NUmber-9833754194-CBD Belapur Internati...
Kharghar Blowjob Housewife Call Girls NUmber-9833754194-CBD Belapur Internati...priyasharma62062
 
( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...
( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...
( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...dipikadinghjn ( Why You Choose Us? ) Escorts
 
VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...
VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...
VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...dipikadinghjn ( Why You Choose Us? ) Escorts
 
Top Rated Pune Call Girls Lohegaon ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
Top Rated  Pune Call Girls Lohegaon ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...Top Rated  Pune Call Girls Lohegaon ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
Top Rated Pune Call Girls Lohegaon ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...Call Girls in Nagpur High Profile
 
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )Pooja Nehwal
 
Enjoy Night⚡Call Girls Patel Nagar Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Patel Nagar Delhi >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Patel Nagar Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Patel Nagar Delhi >༒8448380779 Escort ServiceDelhi Call girls
 
Booking open Available Pune Call Girls Wadgaon Sheri 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Wadgaon Sheri  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Wadgaon Sheri  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Wadgaon Sheri 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 

Dernier (20)

VIP Call Girl in Mira Road 💧 9920725232 ( Call Me ) Get A New Crush Everyday ...
VIP Call Girl in Mira Road 💧 9920725232 ( Call Me ) Get A New Crush Everyday ...VIP Call Girl in Mira Road 💧 9920725232 ( Call Me ) Get A New Crush Everyday ...
VIP Call Girl in Mira Road 💧 9920725232 ( Call Me ) Get A New Crush Everyday ...
 
Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...
Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...
Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...
 
(INDIRA) Call Girl Srinagar Call Now 8617697112 Srinagar Escorts 24x7
(INDIRA) Call Girl Srinagar Call Now 8617697112 Srinagar Escorts 24x7(INDIRA) Call Girl Srinagar Call Now 8617697112 Srinagar Escorts 24x7
(INDIRA) Call Girl Srinagar Call Now 8617697112 Srinagar Escorts 24x7
 
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
 
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
 
Top Rated Pune Call Girls Pashan ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated  Pune Call Girls Pashan ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Top Rated  Pune Call Girls Pashan ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated Pune Call Girls Pashan ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
 
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbai
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbaiVasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbai
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbai
 
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
 
Mira Road Memorable Call Grls Number-9833754194-Bhayandar Speciallty Call Gir...
Mira Road Memorable Call Grls Number-9833754194-Bhayandar Speciallty Call Gir...Mira Road Memorable Call Grls Number-9833754194-Bhayandar Speciallty Call Gir...
Mira Road Memorable Call Grls Number-9833754194-Bhayandar Speciallty Call Gir...
 
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available
 
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
 
Kharghar Blowjob Housewife Call Girls NUmber-9833754194-CBD Belapur Internati...
Kharghar Blowjob Housewife Call Girls NUmber-9833754194-CBD Belapur Internati...Kharghar Blowjob Housewife Call Girls NUmber-9833754194-CBD Belapur Internati...
Kharghar Blowjob Housewife Call Girls NUmber-9833754194-CBD Belapur Internati...
 
( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...
( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...
( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...
 
(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7
(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7
(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7
 
From Luxury Escort Service Kamathipura : 9352852248 Make on-demand Arrangemen...
From Luxury Escort Service Kamathipura : 9352852248 Make on-demand Arrangemen...From Luxury Escort Service Kamathipura : 9352852248 Make on-demand Arrangemen...
From Luxury Escort Service Kamathipura : 9352852248 Make on-demand Arrangemen...
 
VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...
VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...
VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...
 
Top Rated Pune Call Girls Lohegaon ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
Top Rated  Pune Call Girls Lohegaon ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...Top Rated  Pune Call Girls Lohegaon ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
Top Rated Pune Call Girls Lohegaon ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
 
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
 
Enjoy Night⚡Call Girls Patel Nagar Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Patel Nagar Delhi >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Patel Nagar Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Patel Nagar Delhi >༒8448380779 Escort Service
 
Booking open Available Pune Call Girls Wadgaon Sheri 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Wadgaon Sheri  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Wadgaon Sheri  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Wadgaon Sheri 6297143586 Call Hot Ind...
 

1 s2.0-s1570870514001255-main

  • 1. Impact of human behavior on social opportunistic forwarding Waldir Moreira ⇑ , Paulo Mendes COPELABS, University Lusofona, Lisbon, Portugal a r t i c l e i n f o Article history: Received 4 March 2014 Received in revised form 8 July 2014 Accepted 9 July 2014 Available online 17 July 2014 Keywords: Opportunistic networks Delay/disruption-tolerant networks Social-networking communications Human dynamics Application awareness Challenging environments a b s t r a c t The current Internet design is not capable of supporting communications in environments characterized by very long delays and frequent network partitions. To allow devices to communicate in such environments, delay-tolerant networking solutions have been proposed by exploiting opportunistic message forwarding, with limited expectations of end-to-end connectivity and node resources. Such solutions envision non-traditional com- munication scenarios, such as disaster areas and development regions. Several forwarding algorithms have been investigated, aiming to offer the best trade-off between cost (number of message replicas) and rate of successful delivered message. Among such proposals, there has been an effort to employ social similarity, inferred from users’ mobility patterns, to improve opportunistic forwarding solutions. However, such proposals present two major drawbacks: first, they focus on distribution of intercontact times over the complete network structure, ignoring the impact that human behavior has on the dynamics of the network; and second, most of the proposed solutions look at challenging networking envi- ronments where networks have low density, ignoring the potential use of delay-tolerant networking to support low cost communications in networks with higher density, such as urban scenarios. This paper presents a study of the impact that human behavior has on opportunistic forwarding. Our goal is twofold: (i) to show that performance in low and high density networks can be improved by taking the dynamics of the network into account; and (ii) to show that delay-tolerant networking can be used to reduce communi- cation costs in networks with high density by considering the users’ behavior. Ó 2014 Elsevier B.V. All rights reserved. 1. Introduction Wireless devices are becoming more portable and have increased capabilities (e.g., processing, storage), which is creating the foundations for the deployment of pervasive wireless networks based on a large set of personal devices (e.g., smartphones, embedded devices). Additionally, wire- less technology has been extended to allow direct commu- nication aiming to support safety information exchange (i.e., vehicle-to-vehicle), 3G offloading (i.e., device-to-device), and to overcome the lack of infrastructure entities (i.e., Wi-Fi direct). The combination of pervasive wireless devices and direct communication solutions can be used to support the deployment of two major type of applications: end- to-end communication in development regions, since today’s Internet routing protocols may operate poorly in environments characterized by very long delay paths and frequent network partitions; and low cost communica- tions, namely data sharing, in urban scenarios, to bypass expensive data mobile communications and the unreliable presence of open Wi-Fi access points. These networking scenarios (from development regions to urban scenarios) are characterized by network graphs http://dx.doi.org/10.1016/j.adhoc.2014.07.001 1570-8705/Ó 2014 Elsevier B.V. All rights reserved. ⇑ Corresponding author. E-mail address: waldir.junior@ulusofona.pt (W. Moreira). Ad Hoc Networks 25 (2015) 293–302 Contents lists available at ScienceDirect Ad Hoc Networks journal homepage: www.elsevier.com/locate/adhoc
  • 2. with different densities, which pose several challenges in terms of data forwarding. The goal of this paper is the investigation of the impact that human behavior may have on opportunistic forwarding, namely the awareness about users’ social and data similarities. Most of the prior art has been studying data transfer opportunities between wireless devices carried by humans, by looking at the distribution of intercontact times, which is the time gap separating two contacts between the same pair of devices [1]. In challenging net- working environments, opportunistic contacts among mobile devices may improve communications among peers, as well as content dissemination, mitigating the effects of network disruption. This gave rise to the investi- gation of opportunistic networks, of which Delay-Tolerant Networks (DTN) are an example, encompassing different forwarding proposals to quickly transfer data between two peers even in the absence of an end-to-end path between them. Such proposals range from flooding data [2] in the network, up to solutions that take into account users’ social interactions [3–8]. In the latter case, wireless contacts are aggregated into a social graph, and a variety of metrics (e.g., centrality and similarity) or algorithms (e.g., community detection) have been proposed to assess the utility of a node to deliver data or bring it closer to the destination. It is worth highlighting that the structure of such graphs is rather dynamic, since users’ social behav- ior and interactions vary throughout their daily routines. This brings us to our first challenge: forwarding algorithms should be able to exploit social graphs that reflect people’s dynamic behavior. Prior art have studied forwarding algo- rithms that consider only the global network structure, without taking people’s behavior into account [9]. In this paper, we show that forwarding algorithms that exploit social graphs reflecting variations in people’s daily routines are able to improve the performance of opportunistic forwarding. Our second challenge is to analyze how to expand the deployment of DTN technology, which is normally seen only as useful to allow communications in challenging environments, such as development regions. For this study, we focus on data sharing since we assume that this should be the most popular application to take advantage of low cost communications in dense networks, such as in an urban scenario. In this case, we study two hypothesis to ensure good performance of opportunistic forwarding when the density of the network increases: (i) forwarding based on social graphs, where aggregation is based only on social similarities; and (ii) forwarding based on behavior graphs, where aggregation is done by combining different aspects of human behavior, such as social similarities and data similarities (derived from the interests that users demonstrate in specific types of data). Hence, in this paper we aim to investigate the possibil- ity of developing an opportunistic forwarding system able to support low cost services in dense networking scenarios as well as basic services in extreme networking conditions, by exploiting users’ social and data similarities. Our work shows which type of opportunistic forwarding scheme is more suitable for delay-tolerant applications, based on the density of the network in scenarios spanning from developing regions to urban environments. Our findings lead to a new research challenge aiming to expand the impact of DTNs: the investigation of self-awareness mech- anisms able to adapt their forwarding schemes based on users’ context, namely the density of the pervasive net- work where the user is. The remainder of the paper is structured as follows. Section 2 aims to motivate our work, namely in what con- cerns the goal to study methods to expand the deployment of DTNs, and the impact that a better understanding of human behavior can have in the development of efficient forwarding solutions. In Section 3 we present our defini- tion of network density based on the deployment scenarios that we look at to pursuit our study and experiments. Section 4 presents a set of forwarding algorithms that are considered in our study, including our proposals. In Section 5, we analyze the performance of opportunistic forwarding over different network densities. Section 6 con- cludes our work, and identifies future research challenges. 2. Motivation The growing number of wireless mobile devices and the end-user trend to shift toward wireless technology are opening new possibilities for networking. In particular, opportunistic networking embodies feasible solutions for environments with scarce or costly infrastructure-based connectivity. A lot of attention has been given to the devel- opment of opportunistic forwarding solutions for networks with scarce connectivity, which are considered a natural fit for DTN technology. However, it is our belief that opportu- nistic forwarding can also be applied to more dense net- works, where Internet communications are expensive, or applications aim to take advantage of direct communica- tions among devices. In what concerns challenging networks, the most com- mon approach has been to make use of social similarities to improve forwarding performance over the overall net- work. In this case, our work is motivated by the fact that such approaches ignore the behavior patterns that people present in their daily routines [10]. It is our belief that some awareness about users’ behavior patterns may lead to further performance improvements. In what concerns the application of DTN and opportu- nistic forwarding in dense networks, most of the prior art aims to implement a store-carry-and-forward communica- tion model that exploits specific devices found in urban scenarios, such as buses [11] and cars [12]. It is our under- standing that the development of opportunistic forwarding solutions should not depend upon specific equipments only found is some scenarios, since this prevents the deployment expansion of such proposals. It is our belief that the success that DTN technology may have on dense networks depends on its deployment range, which can only be ensured if such technology is implemented in per- vasive wireless devices, such as smartphones: these devices are present in development regions as well as urban scenarios. In the latter case, communications between smartphones can also exploit mobility patterns of different vehicles ridden by people. 294 W. Moreira, P. Mendes / Ad Hoc Networks 25 (2015) 293–302
  • 3. In order to design useful pervasive applications, it is vital to have a good understanding of the target environ- ment and its users. Different types of user behavior may result in different network conditions and may have a huge impact on whether or not a particular application is of interest to the user. A fair amount of work has been done on studying human mobility traces in order to gain under- standing of real life mobility patterns and how those affect the properties of opportunistic networks [13,1,14]. Although mobility patterns are important properties of a pervasive network, it is also important to understand the impact that human behavior, such as data interests, have on these networks. Hence, our work aims to further inves- tigate this new research trend, expanding social awareness to human behavior awareness. Among the different human behavior metrics that can be considered, we focus our attention on data similarities since data sharing is the most common application in the Internet, and there are some evidences that looking at data similarities may improve the performance of opportunistic forwarding [3,4]. However, there is not a proof that the use of data simi- larities can lead to a higher forwarding improvement than just exploiting social interactions and structure (i.e., com- munities [5], as well as levels of social interaction [6,7]). It is our understanding that combining social and data sim- ilarities shall bring benefits (i.e., faster, better content reachability) to opportunistic forwarding. Hence, in this work we analyze in which network conditions the exploi- tation of social similarities results in a good performance, and when such performance can be augmented by combin- ing social and data similarity metrics. 3. Network scenario characterization We consider different networking scenarios, which vary according to the network density. Sparse scenarios are characterized by very long delays (e.g., space communica- tions [15]) and communication suffers from frequent dis- ruption, mostly due to the lack of infrastructure and geographic location (e.g., rural areas [16], riverside com- munities [17,18]). DTN solutions for such sparse scenarios normally rely on message ferries [19] or data mules [20], in an attempt to overcome the missing infrastructure. This is a classic DTN scenario whose challenges are more related to transport protocols (i.e., dealing with extremely high delays) than forwarding itself. In what concerns dense scenarios, communication can take place through both infrastructured (e.g., access points, cell towers) and infrastructureless (e.g., WiFi direct, blue- tooth) means. Still, disruption remains a problem, but now seen from a different perspective: the dynamic behav- ior of users (e.g., high mobility), different sources of inter- ference (e.g., overlapping spectrum), poor coverage (e.g., areas full of closed access points) are factors that may con- tribute to link intermittency, despite all the available sur- rounding infrastructure. This type of scenario is easily observed nowadays in urban settings. In this work, we look at dense (urban) scenarios as imposing new research challenges for opportunistic for- warding given the aforementioned characteristics and the deployment of pervasive wireless devices. Due to the pop- ularity and capabilities of such pervasive devices, users want to be able to sent and retrieve data anytime and any- where. In other words, a free Internet scenario with low cost denominator networking is of interest to users of data sharing applications. With this in mind, we identify network density as an important evaluation metric to study the deployment range, and success, of DTN networking: density gives us a measure of network cohesion defined as the number of observed relationships divided by the number of possible relationships in a pervasive network. Yet, another impor- tant evaluation metric is the average node degree, which reflects the number of contact opportunities a node may have. We studied the characteristics of the three scenarios that are considered in our experiments (cf. Section 5) in relation to the density of the underlying network: the CRAWDAD traces of MIT [21] comprising 97 Nokia 6600 smart phones distributed among the students and staff of this institution; the Cambridge [22] traces that encom- passes 36 students in their daily activities; and, a synthetic mobility scenario encompassing 150 walking people, fol- lowing the Shortest Path Map Based Movement model (i.e., nodes randomly choose destinations and use the shortest path to reach them). Table 1 summarizes the network den- sity and average node degree of these three scenarios, being the density and degree computations done with the Gephi v0.8.2 [23] analysis tool. 4. Opportunistic forwarding in wireless networks This section presents the most relevant opportunistic forwarding proposals, considering whether they make use of social and/or data similarity metrics. Similarity met- rics are used to build graphs over which such forwarding proposals operate [24]. That is, instead of considering the number and frequency of contacts due to the mobility of nodes, such approaches take into account more stable social and/or data metrics, aiming to reduce the cost of opportunistic forwarding. While social similarity metrics can be related to communities, node popularity, node cen- trality, and social relationships, data similarity metrics may refer to data popularity, data type, and data relevance to users. Besides the used similarity metrics, opportunistic for- warding proposals may be differentiated by their assump- tions about the network dynamics: they may consider only the overall network structure, or they may consider varia- tions in such structure due to the different behavior that users may have throughout their daily routine. Table 2 summarizes the type of similarity (i.e., social and/or data) considered by the analyzed opportunistic Table 1 Network densities of the considered scenarios. Scenario Cambridge MIT Synthetic Identified density 0.767 0.490 0.999 Avg. node degree 26.83 47.01 148.80 W. Moreira, P. Mendes / Ad Hoc Networks 25 (2015) 293–302 295
  • 4. forwarding proposals (Bubble Rap, CiPRO, SocialCast, ContentPlace, dLife and SCORP) and whether (or not) they consider the observed user behavior to build dynamic social graphs. A first category of forwarding proposals encompasses Bubble Rap [5], CiPRO [7], SocialCast [3], and ContentPlace [4]. These proposals consider social and/or data similarity metrics, but does not suitably reflect the dynamism of user behavior in the underlying social graph. Bubble Rap combines node centrality with the notion of community to make forwarding decisions. The centrality metric is used to identify hubs inside (i.e., local) or outside (i.e., global) communities. Messages are replicated based on global centrality until they reach the community of the destination host (i.e., a node belonging to the same community). Then, Bubble Rap uses the local centrality to reach the destination inside the community. CiPRO considers the time and place nodes meet throughout their routines. It holds knowledge of nodes (e.g., carrier’s name, address, nationality) expressed by means of profiles that are used to compute the encounter probability among nodes in specific time periods. Nodes that meet occasionally get a copy of a message only if they have higher encounter probability towards its destination. If nodes meet frequently, history of encounters is used to predict encounter probabilities for efficient broadcasting of control packets and messages. SocialCast considers the data interest shared among nodes. It devises a utility function that captures the future co-location of nodes (with others sharing the same inter- est) and the change in its connectivity degree. Thus, the utility function measures how good carrier a node can be regarding a given interest. SocialCast functions are based on the publish-subscribe paradigm, where users broadcast their interests, and content is disseminated to interested parties and/or to new carriers with high utility. ContentPlace considers information about the users’ social relationships to improve content availability. It com- putes a utility function for each data object considering: (i) the access probability to each object and the involved cost of accessing it; (ii) the social strength of the user towards the different communities that he/she belongs to and/or has interacted with. The idea is having the users fetching data objects that maximize the utility function with respect to local cache limitations, and choosing those objects that are of interest to users and can be further dis- seminated in the communities with whom they have strong social ties. A second category of forwarding proposals considers solely social similarity metrics and take into account the dynamism of user behavior while building the underlying social graph. dLife [6] is in this category. It takes into account the dynamism of users’ behavior throughout their daily life routines to aid forwarding. The goal is to keep track of the different levels of social interactions (in terms of contact duration) that nodes have throughout their daily activities in order to infer how well socially connected they are in different periods of the day. Forwarding takes place by considering either the social strength (i.e., weight) among users or their importance in specific time periods. The third and last category comprises both social and data similarity metrics, as well as the dynamism observed in the behavior of users in their daily routine. SCORP [8] belongs to this category. It considers the type of data and the social relationship between the parties interested in each data type. SCORP nodes are expected to receive and store messages considering their own data interests as well as the interests of other nodes with whom they have inter- acted before. Data forwarding takes place by considering the social weight of the encountered node towards nodes interested in the type of data carried by the message that is about to be replicated. For the remainder of this paper, we consider one repre- sentative from each of the described categories: Bubble Rap, for being solely based on social similarity metrics; dLife for being solely based on social similarity metrics and for reflecting network dynamics; SCORP for consider- ing social and data similarity metrics and for reflecting the dynamic user behavior in the social graphs. These pro- posals are used to illustrate how the performance of oppor- tunistic forwarding proposals can be improved in networks with different densities by considering the user dynamic behavior. 5. Evaluation of forwarding over different network densities In this section, we analyze the performance of Bubble Rap, dLife, and SCORP over different network density sce- narios. These experiments aim to highlight how different levels of awareness about users’ behavior can impact the performance of opportunistic forwarding proposals in sce- narios with different network density. We perform two set of experiments: The first set of tests (cf. Section 5.2) aims to show how delay-tolerant networking can also be used to reduce communication costs in dense networks by tak- ing users’ behavior into account. These experiments are carried out over the three scenarios described in Section 3. Then, we further analyze Bubble Rap, dLife, and SCORP to understand how they can excel in different conditions of Table 2 Characterization of opportunistic forwarding proposals. Proposals Social similarity metrics Data similarity metrics Dynamic social graphs Bubble Rap Communities and centrality CiPRO User profile SocialCast Data type and relevance to users ContentPlace Social relationship and communities Data popularity, type and relevance to users dLife Social weight and node importance U SCORP Social weight Data type and relevance to users U 296 W. Moreira, P. Mendes / Ad Hoc Networks 25 (2015) 293–302
  • 5. network density. In Section 5.3 the Cambridge scenario is considered. As shown in Section 3, despite of having a higher network density, the number of contact opportuni- ties in this scenario is the lowest and this is what classifies a development region setting. To illustrate a high density (i.e., urban environment), in Section 5.4 we consider the synthetic mobility scenario which presents the highest density and average node degree. 5.1. Methodology and simulation settings Our experimental analysis is carried out in the Opportu- nistic Network Environment (ONE) simulator [25]. Results are presented with a 95% confidence interval and in terms of averaged delivery probability (i.e., ratio between the number of delivered messages and the number of mes- sages that should have been delivered), cost (i.e., number of replicas per delivered message), and latency (i.e., time elapsed between message creation and delivery). The traces comprise 97 (MIT) and 36 (Cambridge) mobile devices. The synthetic mobility scenario simulates 3 groups (A; M, and B) of 50 people each. Nodes are equipped with 250-Kbps Bluetooth interfaces, and have speed up to 1.4 m/s. The reason for considering traces and synthetic mobility scenario relates to the fact that: (i) with the former, we have a representation of real user behavior; and (ii) with the latter, we are able to have den- sity and a number of contact opportunities much higher than the one provided by the human traces. Regarding message TTL, we set it to be unlimited in order to observe the performance behavior (i.e., buffer con- sumption, number of replicas) of the forwarding proposals in networks with high traffic load. Message size ranges from 1 to 100 kB. Despite nodes may have plenty of stor- age, we consider nodes having different capabilities (i.e., smartphones). Thus, nodes have buffers limited to 2 MB as we consider that nodes may not be willing to share all their storage space. The performance evaluation follows the guidelines of a Universal Evaluation Framework (UEF) [26] to guarantee fairness in the assessment. In the first set of experiments (cf. Section 5.2), we ana- lyze the impact that network density has on opportunistic forwarding. For that, all proposals are subjected to same network traffic load in each scenario, i.e., 78000, 6000, and 200 messages are expected to be delivered across all experiments for MIT, Cambridge, and synthetic scenarios, respectively. These values are chosen considering the num- ber of nodes, area, and length of experiments as to gener- ate a fair number of messages per node per day in an attempt to avoid resources overload. In the second set of experiments, we analyze in detail the performance of opportunistic forwarding in sparse networks, when facing an increasing traffic load (cf. Section 5.3). For that, we chose Cambridge as a sparse network due to its low average node degree (26.83, cf. Table 1), which is indeed a characteristic of development regions. To create the same traffic load variation during the evaluation of the three forwarding proposals, a Bubble Rap/dLife source is configured to send 1, 5, 10, 20 and 35 different messages to each of the 35 destinations, while a SCORP source creates 35 messages with unique data types, and receivers are configured with 1, 5, 10, 20, and 35 ran- domly assigned data type interests. Thus, we have a total of 35, 175, 350, 700, and 1225 generated messages. The msg/ int notation represents the number of messages sent by Bubble Rap and dLife sources, or the number of data inter- ests of each of the SCORP receivers. Since Bubble Rap/dLife sources generate more messages than SCORP, in this scenario node 0 (the source) has no buffer restriction and message generation varies with the load: 35 messages/ day rate (load of 1, 5, and 10 messages), and 70 and 140 messages/day rates (load of 20 and 35 messages, respectively). In the third set of experiments, we analyze in detail the performance of opportunistic forwarding in dense networks, when facing different mobility levels (cf. Section 5.4). We considered the synthetic mobility scenario because of its high density (0.999) and average node degree (148.8) which are characteristics of urban settings (cf. Table 1). In this experiment the same load, of 200 mes- sages per source, is used during the evaluation of the three forwarding proposals. With Bubble Rap and dLife, node 0 (group A) generates 100 messages to nodes in groups B and M, and node 100 (group B) generates 100 messages to nodes in groups A and M. For SCORP, each group has dif- ferent data interests: group A (reading), group B (games), and group M (reading and games). The source nodes, 0 and 100, generate only one message for each data type, game and reading. This guarantees the same number of messages expected to be received, i.e., 200. Also, by varying the node pause times between 100 and 100,000 s, we ensure different levels of mobility (varying from 3456 to 3.4 movements in the simulation). In this scenario, all sources have restricted buffer, but rate is of 25 messages generated every 12 h. This is done so that Bubble Rap and dLife do not discard messages prior to even trying to exchange them given the buffer constraint. In what concerns the specificity inherent to each pro- posal, Bubble Rap uses the K-Clique and cumulative win- dow algorithms for community formation and centrality computation [5]. As for dLife and SCORP, both consider 24 daily samples (i.e., each of one hour) [8]. 5.2. Different network densities This section shows how network density impacts on the performance of opportunistic forwarding proposals. As mentioned before, our goal is to analyze the usefulness of opportunistic forwarding for a wide range of network den- sities and not only the typical DTN sparse scenarios: we want to bring attention to the performance of DTN also in dense scenarios found in urban settings, which encom- pass a panoply of heterogenous devices that could be exploited to improve users’ networking experience. Fig. 1 presents the performance of considered proposals with dif- ferent network densities (cf. Table 1). Generally speaking, we observe that the performance of social-aware opportunistic forwarding improves with the increase of network density: the more well connected nodes are, the better they interact and (i) can deliver more messages; and (ii) messages are delivered in less time. The W. Moreira, P. Mendes / Ad Hoc Networks 25 (2015) 293–302 297
  • 6. associated cost may increase or decrease, and such behav- ior depends on: (i) whether forwarding proposals make use of social and/or data similarity metrics; and (ii) on their assumptions about the network dynamics (cf. Section 4). Fig. 1(a) presents the average delivery probability. In particularly, we can observe that all proposals experience the same performance increasing trend across the different scenarios. Still, the identified performance increase between MIT/Cambridge and Cambridge/Synthetic is not in the same order, despite the clear increase in network density, 0.277 and 0.232, respectively (cf. Table 1). The rea- son for that is the low average node degree identified in Cambridge (26.83). As mentioned in Section 3, average node degree reflects the number of contact opportunities a node may have. Since Cambridge presents the lowest degree among the scenarios, this explains the subtle deliv- ery gains. Performance behavior for all proposals indeed improve with higher network density (Synthetic scenario): a higher density (0.999) indicates more contact opportunities for the exchange of messages (148.8, cf. Table 1). Due to the fact that it relies on social and data similarity metrics as well as the dynamic behavior of users, SCORP is able to deliver all messages. Fig. 1(b) presents the average cost which is expected to increase with network density: the more contact opportu- nities the scenario has, the more replicas proposals create. This can be easily seen with Bubble Rap, which creates an average of more than 5000 replicas to perform a successful delivery. The same cost increasing trend is observed with dLife, but in different orders and especially for the syn- thetic scenario. We believe that the much higher number of copies (up to 98% when compared to other scenarios) is related to the mobility rate. In the Synthetic scenario, nodes move a lot, resulting in a high number of contacts with many nodes. Consequently, dLife takes longer to have a stable view of the network in terms of its social weights and node importances, which leads to the creation of unwanted replicas. SCORP has the best cost performance (up to 0.5 replicas to perform a successful delivery), since the more interests a node has, the better forwarder it is. The M group (cf. Section 5.1) accounts for 50% of the inter- ests existing in the network, which makes it a greater car- rier for messages. Fig. 1(c) shows the average latency experienced by mes- sages since their creation up to their reception at destina- tion. With traces, all proposals keep the same trend: average latency decreases. This is due to nodes spanning different areas and encounter frequency happening at dif- ferent rates. Thus, messages are forwarded to nodes who may reach a given destination in shorter periods of time. SCORP presents a much higher increase in the MIT experi- ment, as it takes its time to suitably choose the next for- warders (based on their interest on the message’s content or social relationship to other interested parties). This added to fact that interactions among nodes happen according to the area they move jointly contribute to such latency peak. As for the Synthetic mobility experiment, not only the proposals have many different contact opportunities, but also nodes encounter more frequently. This consequently has a positive impact for Bubble Rap, dLife, and SCORP that are able to deliver content in less time (12,486 s, 11,710 s, and 6864 s, respectively). 0 20 40 60 80 100 MIT Cambridge Synthetic Increasing Density Average Delivery Probability % Bubble Rap dLife SCORP (a) 0 1 2 3 4 MIT Cambridge Synthetic Increasing Density 12 14 #ofreplicas(x102 ) 40 50 60 Average Cost (b) 0 1 2 3 4 5 6 MIT Cambridge Synthetic Increasing Density 20 60 100 140 Average LatencySeconds(x10 4 ) (c) Fig. 1. Performance over different network densities. 298 W. Moreira, P. Mendes / Ad Hoc Networks 25 (2015) 293–302
  • 7. 5.3. Low density networks with increasing load This section presents the performance of opportunistic forwarding proposals over the low density Cambridge scenario with increasing traffic load. As mentioned in Section 3, Cambridge has a low number of contact oppor- tunities which characterizes development regions. Fig. 2 presents the performance of considered proposals with different messages and interests being generated. From the collected results, we observe that opportunis- tic forwarding based either solely on social similarity met- rics (Bubble Rap) and/or on the dynamism found users’ behavior (dLife) have a more variable performance behav- ior. As load increases, these proposals struggle to maintain a satisfactory functioning due to the overload of resources. With the combination of social/data similarity metrics with awareness of users’ dynamic behavior (SCORP), opportunistic forwarding presents a better behavior: with the increase in their number of interests, users become great data disseminators. This improves data delivery with very low associated cost and latency. Fig. 2(a) presents the average delivery probability. In the 1 msg/int configuration, formed communities comprise almost all nodes. This is advantageous for Bubble Rap since most of its deliveries happen to nodes sharing communi- ties. Due to the low number of contact opportunities, dLife and SCORP take mainly advantage of direct delivery: 57% and 51% of messages, respectively, are delivered directly to the destinations. As the load increases, Bubble Rap presents a 50% decrease in delivery probability, as it relies on communi- ties to perform forwardings, and consequently buffer space becomes an issue. We estimate a buffer usage in the 5 msg/ int configuration of 9.94 MB in each node, which exceeds the allowed 2 MB (cf. Section 5.1). This estimation is for a worst case scenario, where Bub- ble Rap spreads copies to every encountered node. Since this cannot happen, as Bubble Rap also relies on local cen- trality to reduce replication, buffer exhaustion is really an issue given that messages are replicated to fewer nodes than in our estimation. As more messages are generated, replication increases: this causes the spread of messages that potentially take over the resources needed to forward other messages, reducing Bubble Rap’s capability to deliv- ery messages. dLife has a 43% decrease in delivery probability when load increases, since it needs a warmup time to have an accurate view of the social weights. This leads to forwar- dings that never reach destinations given the contact spo- radicity. For the 10 msg/int configuration, dLife also experiences buffer exhaustion: estimated consumption is of 2.17 MB per node. Still, by considering social weights or node importance, dLife to reach a more stable behavior than Bubble Rap. The delivery capability of SCORP raises as the ability of nodes to become a good carrier increases (i.e., the more data interests a node has, the better it is to deliver data to others, since they potentially share data interests). The 0 20 40 60 80 100 1 5 10 20 35 % # of messages/interests per node Average Delivery Probability Bubble Rap dLife SCORP (a) 0 2 4 6 8 10 1 5 10 20 35 #ofreplicas(x10 2 ) # of messages/interests per node Average Cost (b) 0 2 4 6 8 10 12 14 1 5 10 20 35 Seconds(x10 4 ) # of messages/interests per node Average Latency (c) Fig. 2. Performance over low density networks. W. Moreira, P. Mendes / Ad Hoc Networks 25 (2015) 293–302 299
  • 8. maximum estimated buffer consumption of SCORP is of 0.16 MB (35 msg/int). Fig. 2(b) presents the cost behavior. In the 1 msg/int configuration, all proposals create very few replicas to per- form a successful delivery, 7.95 (Bubble Rap), 14.32 (dLife), and 23.46 (SCORP), as they rely mostly on shared commu- nities and/or direct deliveries. We also observe that SCORP replicates more than dLife due to a particularity in its implementation: SCORP nodes with interest in a specific data type not only process messages carrying such type of data, but also replicate it to other interested nodes, thus creating extra replicas. For the 5, 10, 20 and 35 msg/int configurations, cost is expected to increase as load increases, as seen with dLife. The same performance behavior was expected for Bubble Rap. However, the observed cost peaks relate to the corre- lation between the message creation time and the sporad- icity of contacts: messages created in periods with a high number of contacts are subject to more replications. This is more evident with Bubble Rap at the 5 msg/int configura- tion, as it relies on shared communities to forward: as mentioned earlier, most of the communities comprise almost all nodes, which increases its replication rate. Despite the efforts, these replications do not improve the delivery probabilities of Bubble Rap and dLife, contributing only to the associated forwarding cost. When carrying a significant number of data interests, a SCORP node can serve as a carrier for a larger number of nodes. Consequently, the observed extra replicas the in the 1 msg/int configuration make it rather efficient: SCORP creates an average of 6.39 replicas across all msg/int con- figurations, while Bubble Rapand dLife produce 452.41 and 96 replicas, respectively. Fig. 2(c) shows the average latency that messages expe- rience. The latency peak in the 1 msg/int configuration refers to the message generation time: some messages are created during periods where very few contacts (and sometimes none) take place followed by long periods (12 to 23 h) with almost no contact. Consequently, messages are stored longer, contributing to the increase of the over- all latency. This effect is mitigated as the load increases with messages being created almost immediately before a high number of contacts take place. Since latency is in function of the delivered messages, the variable behavior of Bubble Rap and dLife is due to vari- ations in their delivery rates, and also to their choices of next forwarders that may take longer to deliver data to destinations. SCORP presents a latency that is up to 90.2% and 92.2% lower than Bubble Rap and dLife, respectively. The good performance of SCORP is due to the fact that latency decreases with the number of data interest carried by each node: A node carrying a significant number of data interests is a good carried for more data types, even if such node itself is not interested in such data types, leading to a higher number of carriers and so a low latency to distribute data types to interested nodes. 5.4. High density networks with increasing mobility This section presents the performance of opportunistic forwarding proposals over the high density synthetic scenario, under different mobility levels. As presented in Section 3, the synthetic scenario has the highest density and number of contact opportunities which is a character- istic of urban settings. Fig. 3 presents the performance of considered proposals with different mobility levels. Generally speaking, as nodes start to move less (i.e., increasing pause time), less messages are expected to be delivered. Since nodes start to encounter at a less frequent rate, the number of replications is also expect to decrease. Regarding latency, messages are to experience longer wait- ing times prior to delivery, as nodes move less, and the encounters may not be enough to reach intermediate nodes that meet the destinations or even the destinations themselves. Fig. 3(a) presents the average delivery probability. Given the community formation characteristic of this sce- nario, Bubble Rap relies mostly on the global centrality to deliver content. By looking at centrality [5], we observe very few nodes (out of the 150) with global centrality that can actually aid in forwarding, i.e., 19.33% (29 nodes), 10.67% (16 nodes), 21.33% (32 nodes), and 2% (3 nodes) for 100, 1000, 10,000, and 100,000 pause time configura- tions, respectively. So, these nodes become hubs and given buffer constraint and infinite TTL (i.e., messages created earlier take the opportunity of newly created ones), it is certain that nodes drop messages, directly impacting Bub- ble Rap. Given the high number of contacts, the computation of social weight and node importance done by dLife takes longer to reflect reality: thus dLife replicates more and experiences buffer exhaustion. Indeed, social awareness is advantageous, but still not enough to reach optimal delivery rate in such conditions. Independent of the number of contacts among nodes, SCORP can still identify nodes that are better related to oth- ers sharing similar interests, reaching optimal delivery rate for 100, 1000, and 10,000 pause time configurations. By considering nodes’ interest in content and their social weights, SCORP does not suffer as much with node mobility as dLife and Bubble Rap. With 100,000 s of pause time, the little interaction hap- pening in a sporadic manner (with intervals between 20 and 26 h) affects Bubble Rap, dLife and SCORP as they depend on such interactions to compute centrality, node importance, and social weights, as well as to exchange/ deliver content. Fig. 3(b) presents the average cost behavior. As pause time increases, the number of contacts among nodes decreases, providing all solutions with the opportunity to have a stable view of the network in terms of their social metrics with 100, 1000, and 10,000 s of pause time. This explains the cost reduction for Bubble Rap and dLife: both are able to identify the best next forwarders, resulting in the creation of less replicas to perform a successful delivery. SCORP has a very low replication rate (average of 0.5 replicas) given its choice to replicate based on the interest that nodes have on content and on their social weight towards other nodes interested in such content. When the intermediate node has an increased number of interests (i.e., by having different interests, the node can 300 W. Moreira, P. Mendes / Ad Hoc Networks 25 (2015) 293–302
  • 9. potentially deliver more content) as observed in Section 5.3, replication costs are even lower. Furthermore, SCORP suitably uses buffer space with an estimated average occu- pancy of 0.03 MB per node per day. With 100,000-s pause time, as cost is in function of delivered messages (and deliveries are low, due to contact sporadicity), proposals have a low cost. As expected (cf. Fig. 3(c)), latency increases as node mobility decreases: encounters are less frequent, and so content must be stored for longer times. Also, the time that the social metrics take to converge (i.e., a more stable view of the network in terms of centrality, social weight, and node importance) contributes for the increase in the expe- rienced latency. The highest increase in latency with 100,000 s of pause time is due to contacts happening in a sporadic fashion with intervals between them of up to 26 h, thus proposals take much longer to perform a delivery. 6. Conclusions Opportunistic forwarding proposals comprise social similarity (e.g., common social groups and communities, node popularity, levels of centrality, social relationships and interactions, user profiles) and/or data similarity (e.g., shared interests, interest of users in the content tra- versing network, content availability, type of content) aspects. Additionally, these proposals may (or not) take into account the network dynamics. In this paper, we highlight the possibility of having opportunistic forwarding that can provide support to (i) basic services in extreme networking conditions (e.g., end-to-end communication in development regions); and (ii) low-cost services in dense (e.g., urban) networking scenarios. Our results show that opportunistic forwarding, based on either social or data similarity metrics may present sat- isfactory performance over challenged (i.e., development region) and dense (i.e., urban) scenarios, even when for- warding proposals do not considering the dynamism observed in the users behavior. However, when social and data similarity metrics are considered alongside with the dynamics of user behavior, opportunistic forwarding presents interesting performance gains in both scenarios: average results over sparse and dense networks, shows that performance improvements go up to 54% regarding delivery capability while latency and cost can be reduced by 45% and 99% respectively, when compared to forwarding solely based on data simi- larity and completely agnostic to the dynamism found in user behavior. These findings point to a new research challenge regarding the impact of DTN application: the investigation of self-awareness mechanisms able to adapt their forward- ing schemes based on the context of the user, namely the density of the network where he/she is currently. Based on our results, by (i) being able to adapt to the characteris- tics of the scenario (sparse vs. dense), considering the 0 20 40 60 80 100 100 1000 10000 100000 % Pause time (seconds) Average Delivery Probability Bubble Rap dLife SCORP (a) 0 10 20 30 40 50 60 70 100 1000 10000 100000 #ofreplicas(x102 ) Pause time (seconds) Average Cost (b) 0 5 10 15 20 100 1000 10000 100000 Seconds(x104 ) Pause time (seconds) Average Latency (c) Fig. 3. Performance over high density networks. W. Moreira, P. Mendes / Ad Hoc Networks 25 (2015) 293–302 301
  • 10. dynamism of users’ behavior; and (ii) also employing data similarity metrics, opportunistic forwarding allows the exchange of data in both development regions and urban settings. References [1] A. Chaintreau, P. Hui, J. Crowcroft, C. Diot, R. Gass, J. Scott, Impact of human mobility on opportunistic forwarding algorithms, IEEE Trans. Mobile Comput. 6 (6) (2007) 606–620. [2] A. Vahdat, D. Becker, Epidemic routing for partially connected ad hoc networks, Tech. Rep. CS-200006, Duke University, 2000. [3] P. Costa, C. Mascolo, M. Musolesi, G.P. Picco, Socially-aware routing for publish-subscribe in delay-tolerant mobile ad hoc networks, IEEE J. Sel. A. Commun. 26 (5) (2008) 748–760. [4] C. Boldrini, M. Conti, A. Passarella, Design and performance evaluation of content place, a social-aware data dissemination system for opportunistic networks, Comput. Netw. 54 (4) (2010) 589–604. [5] P. Hui, J. Crowcroft, E. Yoneki, Bubble rap: social-based forwarding in delay-tolerant networks, IEEE Trans. Mobile Comput. 10 (11) (2011) 1576–1589. [6] W. Moreira, P. Mendes, S. Sargento, Opportunistic routing based on daily routines, in: Proceedings of IEEE WoWMoM, San Francisco, USA, 2012. [7] H.A. Nguyen, S. Giordano, Context information prediction for social- based routing in opportunistic networks, Ad Hoc Netw. 10 (8) (2012) 1557–1569. [8] W. Moreira, P. Mendes, S. Sargento, Social-aware opportunistic routing protocol based on user’s interactions and interests, in: M.H. Sherif, A. Mellouk, J. Li, P. Bellavista (Eds.), Ad Hoc Networks, Springer International Publishing, 2014, pp. 100–115. [9] T. Hossmann, T. Spyropoulos, F. Legendre, Know thy neighbor: towards optimal mapping of contacts to social graphs for dtn routing, in: Proceedings of INFOCOM, San Diego, USA, 2010, pp. 866–874. [10] N. Eagle, A. Pentland, Eigenbehaviors: identifying structure in routine, Behav. Ecol. Sociobiol. 63 (7) (2009) 1057–1066. [11] I. Komnios, V. Tsaoussidis, Carpool: extending free internet access over dtn in urban environment, in: Proceedings of ACM MobiCom LCDNet, Miami, USA, 2013. [12] P.-C. Cheng, K. Lee, M. Gerla, J. Harri, Geodtn+nav: geographic dtn routing with navigator prediction for urban vehicular environments, Mobile Netw. Appl. 15 (1) (2010) 61–82. [13] P. Hui, A. Chaintreau, J. Scott, R. Gass, J. Crowcroft, C. Diot, Pocket switched networks and human mobility in conference environments, in: Proceedings of ACM SIGCOMM WDTN, Philadelphia, USA, 2005. [14] T. Hossmann, T. Spyropoulos, F. Legendre, A complex network analysis of human mobility, in: Proceedings of INFOCOM, Shanghai, China, 2011. [15] S. Farrell, V. Cahill, Delay- and Disruption-Tolerant Networking Artech House Telecommunications Library, Artech House, 2006. [16] S. Jain, K. Fall, R. Patra, Routing in a delay tolerant network, in: Proceedings of SIGCOMM, Portland, USA, 2004. [17] W. Moreira, R. Ferreira, D. Cirqueira, P. Mendes, E. Cerqueira, Socialdtn: A dtn implementation for digital and social inclusion, in: Proceedings of ACM MobiCom LCDNet, Miami, USA, 2013. [18] R. Ferreira, W. Moreira, P. Mendes, M. Gerla, E. Cerqueira, Improving the delivery rate of digital inclusion applications for amazon riverside communities by using an integrated bluetooth dtn architecture, Int. J. Comput. Sci. Netw. Security 14 (1) (2014) 17–24. [19] W. Zhao, M. Ammar, E. Zegura, A message ferrying approach for data delivery in sparse mobile ad hoc networks, in: Proceedings of ACM MobiHoc, Roppongi Hills, Japan, 2004. [20] R. Shah, S. Roy, S. Jain, W. Brunette, Data mules: modeling a three- tier architecture for sparse sensor networks, in: Proceedings of IEEE Workshop SNPA, Anchorage, USA, 2003. [21] N. Eagle, A. Pentland, CRAWDAD data set mit/reality (v. 2005-07-01), July 2005. <http://crawdad.cs.dartmouth.edu/mit/reality>. [22] J. Scott, R. Gass, J. Crowcroft, P. Hui, C. Diot, A. Chaintreau, CRAWDAD trace cambridge/haggle/imote/content (v. 2006-09-15), September 2006. <http://crawdad.cs.dartmouth.edu/cambridge/haggle/imote/ content>. [23] M. Bastian, S. Heymann, M. Jacomy, Gephi: An open source software for exploring and manipulating networks, in: Proceedings of AAAI Conference on Weblogs and Social Media, San Jose, California, 2009. [24] W. Moreira, P. Mendes, Social-aware opportunistic routing: the new trend, in: I. Woungang, S.K. Dhurandher, A. Anpalagan, A.V. Vasilakos (Eds.), Routing in Opportunistic Networks, Springer, New York, 2013, pp. 27–68. [25] A. Keränen, J. Ott, T. Kärkkäinen, The one simulator for dtn protocol evaluation, in: Proceedings of Simutools, Rome, Italy, 2009. [26] W. Moreira, P. Mendes, S. Sargento, Assessment model for opportunistic routing, in: Proceedings of LATINCOM, Belem, Brazil, 2011. Waldir Moreira started his Bachelor’s degree in Computer Science in 1999 at the University of Lethbridge, Canada and finished it in 2005 at the Universidade da Amazonia, Brazil. Then, he received his Master’s degree from the Postgraduate Program of Computer Science at Universidade Federal do Pará, Brazil. In 2009, He joined the Internet Architectures and Networking (IAN) group at Institute for Sys- tems and Computer Engineering of Porto (INESC-Porto) in Portugal, participating in a Wireless Cooperative Networking project. Currently, he is waiting for his defense to get the Ph.D. degree from the MAP Doctoral Programme in Telecommunications (MAP-Tele) at Uni- versity of Aveiro (UA). He is a member of the Association for Research and Development in Cognitive and People-centric Computing (COPELabs/ ULHT), an external collaborator with the Research Group on Computer Networks and Multimedia Communications (GERCOM/UFPA), and Invited Professor at Universidade Lusófona Porto (ULP). His research interests include Wireless Adhoc, Mesh, Social-aware, Cooperative, Opportunistic, and Information-centric Networking and Routing. Paulo Mendes is the vice-director of the Cognition and People centric computing Research Center (COPELabs) at University Lusofona, where he is associated professor, and director of the Ph.D. program on Infor- matics – New Media and Pervasive Systems (NEMPS). He studied Informatics Engineering at University of Coimbra receiving a diploma degree in 1993, and at the Technical Univer- sity of Lisbon receiving a M.Sc. degree in 1998 in Electrical and Computer Engineering. In 2004 he got his Ph.D. (summa cum laude) degree in Informatics Engineering from the University of Coimbra, having performed his Ph.D. thesis work as a visiting Scholar at Columbia Uni- versity, New York. Before his Ph.D. Paulo worked in industry as a coor- dinator of a telematic unit at a Portuguese company and as a researcher at the informatics center of University of Coimbra. After his Ph.D. Paulo was a senior researcher at NTT DOCOMO Euro-labs for 4 years, and a research coordinator at the portuguese research lab INESCTEC for 3 years. In 2010 we founded the research center on Informatics and Technologies (SITIL- abs) at University Lusofona, which gave place to COPELabs in October 2013. The publication record includes over 100 scientific articles and 14 international patents. Besides his scientific publications, Paulo is a member of the ACM SIGCOMM and also has contributing to IETF/IRTF work. 302 W. Moreira, P. Mendes / Ad Hoc Networks 25 (2015) 293–302