Opportunistic Network Essay

1608 words - 7 pages


In an opportunistic network, when nodes move away or need to turn off their power to save up energy, links may be disturbed or shut down intermittently. These events result is in intermittent connectivity. When there is no communication path existing between the source and destination, the network partition occurs. The possibility of the data being sent by sender might be not received or semi-received by the receiver. Therefore, nodes need to communicate with each other opportunistic contacts through Store-Carry-Forward (SCF) operation. The specific challenges in opportunistic network are the contact opportunity and the node storage.
...view middle of the document...

This scheme achieves the optimal delay with unlimited relay buffers. However, such a multiple-copy scheme generally incurs significant overhead on storage constraint. Another theory from other researcher is a buffer-management strategy, RRFS-with-RandomDrop, to avoid head-of-line blocking in the FIFO case. They showed that the proposed strategy can reduce the deprivation of average data delivery delay performance.

Another challenge in opportunistic network is data integrity. Data integrity is a part of data security, also an important element to establish secure communication. Digital signatures can be used to guarantee the integrity of data. But they are too costly investment for weak devices (like mobile phones, PDAs etc.) which also running on a limited battery power. Hence, alternatives should be devised to guarantee the integrity of data packets. Also, packet sizes may vary when it travels through an opportunistic network. Suppose that a packet is sent from a mobile phone to the base station through a PC connected to the Internet. In this case, the packet size when it travels from the mobile phone to the PC will be different from the packet size when it travels from the PC to the base station. If the packet fragmentation and aggregation process cannot be performed securely, the end-to-end security mechanisms could fail.


A. Haggle
The Haggle project has been developed by researcher from Department of Information Technology, Uppsala University in Sweden. It is an innovative concept for Autonomic Opportunistic Communication Research project funded by the European Commission under the Information Society Technologies Programme of the 6th Framework between January 2006 and June 2010. This application supports many platforms, but mainly targets on mobile phones. The example of platforms include Google Android, iPhone OS, Windows Mobile, Mac OS X, Linux, etc. The programming languages used are a mix of C++ and C. But the applications themselves can be written in other languages as well, like C# and Java.

The Haggle allows mobile devices to exchange content directly between them when they connected in close range contact. A Haggle-enabled application can exchange photographs or songs mostly are multimedia data between mobile phones. The content exchange happens according a subscribe model, where users state their interests via keywords and then receive content items from others based on to how well they match the interests. Haggle application also supports both Bluetooth and Wi-Fi connectivity. Figure 7 below show Haggle architecture and how it works in content transmission.

This function of application internally used a concept of opportunistic network technology in their data dissemination. Haggle provides a search-based data dissemination framework for mobile opportunistic communication environments, making it easy to share any type of media directly between intermittently connected mobile...

Find Another Essay On opportunistic network

Challenges and Solutions to the Security and Privacy Concerns of MSNs

2124 words - 9 pages With the fast evolving social network technology, the anonymity network identity will ensure that the privacy of the MUs exists. The implementation of this system can help eliminate all the security and privacy problems affecting MSNs at the moment. This is because the network identity of the device plays a major role in establishing connections between devices. If the internet servers adopt this system, the security and privacy concerns in MSNs

Shoplifting Essay

1454 words - 6 pages a variety of methods. Most shoplifters are amateurs. However, there are growing numbers of people who make their living by stealing from retail stores. Amateur shoplifter can be highly skilled, and some steal almost every day, but don't do it to make a living. Most amateurs are opportunistic, crude in their methods, and are detected more often than others. Professional shoplifters run the gamut from being highly skilled to

Overview of the Cognitive Network Technique

2062 words - 8 pages Cognitive Network is a technique which is used to improve the spectrum utilization. Current network scenario is experiencing the huge spectrum scarcity problem due to the fixed assignment policy so in this method great amount of spectrum remain unused. To overcome this limitation the spectrum allocation must be in dynamic manner. In this report the spectrum allocation is discussed thoroughly. Interference is the most important factor that needs

Fd Ex

2051 words - 8 pages , although a costly form of organization, offers efficiency advantages of markets for minimizing these contracting hazards. Conflicts can be resolved by fiat instead of appealing to the courts. Therefore, even if courier service requires few idiosyncratic physical assets such as containers, trucks, or airplanes, the information network is transaction-specific, which, according to TCE, calls for vertical integration to safeguard against opportunistic

SHARP: A Joint Spectrum Allocation, Handover and Routing Protocol for Cognitive Radio Ad Hoc Networks

1647 words - 7 pages blind decision making method, promises a greater adaptability and responsiveness to channel temporal variations, opportunistic / stochastic nature accessing to media for CR users, CR user mobility and queue hotspots; this substantially enhances the throughput efficiency of the whole CRN. In this paper, backpressure routing refers to a stochastic network optimization algorithm also referred to as Utility Optimal Lyapunov Networking algorithm [22

Cryptography is Essential for Information Systems

754 words - 3 pages Cryptography has a powerful tool used with computers and the computer network security. This paper will explore the threats, the can and cannot do the threats, system design, implementation, state of security, etc. All systems using cryptography for authentication and privacy with the strongest cryptographic can still be vulnerable with upstream and downstream threats. The secure session of the authentication will require the secure user to have

Business Research Methods

960 words - 4 pages relationships. Trust is vital in many business relationships, especially those containing an element of risk. Lacking effective regulation in the Internet context, consumers have to trust that the e-service vendor will not engage in harmful opportunistic behaviors, or else the overwhelming social complexity will cause them to avoid purchasing (Gefen, 2000). Some researchers have suggested that online customers generally stay away from e-businesses

Virulence Factors and Evasion of the Human Defense System of Fungus

1567 words - 6 pages . C. albicans can infect healthy individuals, however, this scenario does not occur frequently (Zipfel et al. 2013). Candida species give rise to dangerous opportunistic infections in humans, growing as a yeast-like organism. It dwells commensally on the skin, within the genitourinary tract and gut as an opportunistic pathogen waiting for conditions suitable to thrive in such as a disproportion in the battling bacterial flora or reduced immune

Using Roles in Business

1082 words - 4 pages data. Examples:Separation at the network (non-sensitive from sensitive) segregates risky traffic and processing from critical traffic, processing, and data.According to "Cyber Mission Assurance" (2014),( " Segmentation at the network level should implement controlled interfaces between segments, as needed, both within an enterprise and at its boundaries.").Using secure browsers, powerful and recommended encryption software.Although, SoD is a new

The Analysis of Animal Migrations: Terrestrial, Aquatic, and Aerial

2172 words - 9 pages size of the organism and the behavior of migrating originates as a set of genetic instructions which include instincts of time, distance, and physiological adaptations, while also leaving room for learning additional migratory adaptations (Alerstam et al. 2003). The majority of animals migrate for reproductive and seasonal purposes. Essentially what these two things have in common is that they portray animals as opportunistic beings

Zombies: Face-Eating Cannibal Attack

1073 words - 4 pages contagious and cause zombie-like humans; but it’s unlikely (The Truth Behind Zombies, 2010). Rabies itself is very improbably enough for people to contract but there is a parasite caused by animals that few biologists have been researching as a current source for an apocalypse. The common outdoor pet cat can transmit a parasite to their owners simply by using the litter box. Toxoplasmosis Gondii is an opportunistic parasite that can infect human hosts

Similar Essays

Aids: Complete Summary Essay

1048 words - 4 pages lymphatic system. The lymphatic system is a network of vessels and lymph glands that collect fluid and cells from tissues and deliver them to the bloodstream. The white blood cells can leave the blood vessels, travel between cells, enter the lymphatic system, and eventually return to the bloodstream. These cells patrol the body, searching for foreign invaders and attacking any they find. When invaders like HIV infect the body, white blood cells

Performance Comparison Of Dtn Routing Protocols Using Different Mobility Models

2223 words - 9 pages the performance of this protocol. The simulation results shows that Spray and Wait is able to deliver more messages than PROPHET Routing with a lower communication overhead. Keywords: Delay tolerant network, routing protocols, delivery ratio, average delay and overhead ratio, mobility model 1. Introduction Opportunistic networks [1-3] are sparse multi-hop ad hoc networks in which nodes exploit any pair-wise contact opportunities to share

History Of Acquired Immune Deficiency Syndrome

5232 words - 21 pages , fungus infections, and other common ailments. With the loss of immune function, a clinical syndrome (a group of various illnesses that together characterize a disease) develops over time and eventually results in death due to opportunistic infections (infections by organisms that do not normally cause disease except in people whose immune systems have been greatly weakened) or cancers. In the early 1980s deaths by opportunistic infections

The Role Of Value Chain Model

2183 words - 9 pages value networks, in opposition to the idea of value chains. These value networks are composed by firms that interact through complementary links and nodes that create value not in a linear mode, but in a simultaneous way. Although each part of the network is an independent firm, they work in an integrated way and the relationships they form determines their competitive position and the industry evolution (Peppard and Rylander, 2006). The competition