2024-03-19T07:26:12Zhttps://repositori.uji.es/oai/requestoai:repositori.uji.es:10234/1649452023-02-10T12:56:39Zcom_10234_7037com_10234_9col_10234_8635
Repositori UJI
author
Hernández-Orallo, Enrique
author
murillo arcila, marina
author
Calafate, Carlos
author
Cano, Juan Carlos
author
Conejero, J. Alberto
author
Manzoni, Pietro
2016-12-07T17:57:55Z
2016-12-07T17:57:55Z
2016
HERNÁNDEZ-ORALLO, Enrique, et al. Analytical evaluation of the performance of contact-Based messaging applications. Computer Networks, 2016, vol. 111, p. 45-54.
1389-1286
http://hdl.handle.net/10234/164945
http://dx.doi.org/10.1016/j.comnet.2016.07.006
Communications in mobile opportunistic networks, instead of using the Internet infrastructure, take place upon the establishment of ephemeral contacts among mobile nodes using direct communication. In this paper, we analytically model the performance of mobile opportunistic networks for contact-based messaging applications in city squares or gathering points, a key challenging topic that is required for the effective design of novel services. We take into account several social aspects such as: the density of people, the dynamic of people arriving and leaving a place, the size of the messages and the duration of the contacts. We base our models on Population Processes, an approach commonly used to represent the dynamics of biological populations. We study their stable equilibrium points and obtain analytical expressions for their resolution.
The evaluations performed show that these models can reproduce the dynamics of message diffusion applications. We demonstrate that when the density of people increases, the effectiveness of the diffusion is improved. Regarding the arrival and departure of people, their impact is more relevant when the density of people is low. Finally, we prove that for large message sizes the effectiveness of the epidemic diffusion is reduced, and novel diffusion protocols should be considered.
eng
© 2016 Elsevier B.V. All rights reserved.
Opportunistic networks
Mobile networking in proximity
Contact-based messaging
Performance evaluation
Epidemic diffusion
Analytical evaluation of the performance of contact-Based messaging applications
info:eu-repo/semantics/article
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
URL
https://repositori.uji.es/xmlui/bitstream/10234/164945/1/74292.pdf
File
MD5
da40564c594907558264f1f64f85709d
1418804
application/pdf
74292.pdf
URL
https://repositori.uji.es/xmlui/bitstream/10234/164945/5/74292.pdf.txt
File
MD5
1227ace459ee7cc98da5566cca690807
48802
text/plain
74292.pdf.txt