Abstract
With the advancement in technology, many users carry wireless computing de-vices e.g., PDAs, cell-phones etc. Such devices can form mobile ad hoc networks and communicate with one another via the help of intermediate nodes. Such ad hoc networks are very useful in several scenarios e.g., battlefield operations, vehicular ad hoc networks and disaster response scenarios. The ability to access important information in these scenarios is highly critical. Many ad hoc routing schemes have been designed for ad hoc networks but such routing schemes are not useful in some challenging network scenarios where the nodes have intermittent connectivity and suffer frequent partitioning. Recently, disruption tolerant network technologies [5, 12] have been proposed to allow nodes in such extreme network-ing environment to communicate with one another. Several DTN routing schemes [4, 14] have been proposed.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
A. R. Bharambe et al. (2004). Mercury: supporting scalable multi-attribute range queries. In Proceedings of ACM Sigcomm, Aug/Sept
L. Breslau et al. (1999). Web Caching and Zipf-like Distributions: Evidence and Implica-tions. In IEEE Infocom.
J. Broch et al. (1998). A Performance Comparison of Multhop wireless Adhoc Network Routing Protocols. In ACM Mobicom.
J. Burgess et al. (2006). MaxProp: Routing for vehicle-based disruption tolerant networks. In Proceedings of IEEE Infocom
V. Cerf et al. (2007). Delay Tolerant Networking Architecture. RFC4838
A. Chaintreau et al. (2007). Impact of Human Mobility on Opportunistic Forwarding Algorithms.IEEE Transaction on Mobile Computing, pp 606–620
M. Chuah, R. Metgzer (2008). Secure Data Retrieval System for DTNs. In Proceedings of IEEE Milcom, Oct/Nov
M. Chuah, P. Yang (2007). Data-Centric information retrieval schemes for Disruption Tolerant Net-works. In Lehigh CSE Department Technical Report.
M. Chuah, P. Yang (2007). Performance evaluations of a content-based information retrieval scheme for DTNs. In Proceedings of Milcom
E. Cohen, S. Shenker (2002). Replication strategies in unstructured peer-to-peer networks. In Proceedings of ACM Sigcomm
N. Eagle, A. Pentland (2005). Reality Mining: Sensing Complex Social Systems. Journal of Per-sonal and Ubiquitous Computing.
K. Fall (2003). A delay tolerant network architecture for challengednetworks. In Proceedings of ACM Sigcomm
T. Hara (2001). Effective Replica Allocation in AdHoc Networks for Improving Data Accessibility. In Proceedings of IEEE Infocom.
A. Lingren et al. (2004). Probabilistic Routing in Intermittently Connected Networks. In Proceedings of Workshop on Service Assurance with Partial and Intermittent Resources
B. Sheng et al. (2006). Data Storage Placement in Sensor Networks. In Proceedings of ACM Mobihoc
T. Spyropoulos et al. (2007). Efficient routing in intermittently connected mobile networks: multiple copy case. IEEE/ACM Transactions on Networking
In The network simulator ns-2. http://www.isi.edu/nsnam/ns/.
A. Vahdat, D. Becker. Epidemic Routing for partially connected adhoc networks. Technical Report CS-200006, Duke University
Y. Wang et al. (2005). Erasure-Coding Based Routing for Opportunistic Networks. In Proceedings of ACM workshop on DTN.
H. Wang et al. (2008). Snoogle: A search engine for the physical world. In Proceedings of IEEE Infocom.
L. Yin, G. Cao. (2004). Supporting Cooperative Caching in Adhoc Networks. In Proceedings of IEEE In-focom
E. Yoneki et al. (2007). A Social-Aware Overlay for Publish/Subscribe Communication in Delay Tolerant Networks. In Proceedings of ACM MSWiM, Oct
X. Zhang et al. (2007). Modeling of a Bus-based Disruption Tolerant Network Trace: Mobility Model-ing and Impact on Routing. In Proceedings of ACM Mobicom.
Acknowledgement
This work has been supported by DARPA under Contract W15P7T-06-C-P430. Any opinions, findings, and conclusions or recommendations expressed in this paper are those of the authors and do not necessarily reflect the views of the sponsor of this work. The authors would like to thank Peng Yang for helping to generate the simulation results for the CACHE data scheme.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Chuah, MC., Han, Jb. (2010). Opportunistic Information Retrieval in Sparsely Connected Ad Hoc Networks. In: Shen, X., Yu, H., Buford, J., Akon, M. (eds) Handbook of Peer-to-Peer Networking. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-09751-0_38
Download citation
DOI: https://doi.org/10.1007/978-0-387-09751-0_38
Published:
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-09750-3
Online ISBN: 978-0-387-09751-0
eBook Packages: Computer ScienceComputer Science (R0)