DocumentCode :
139658
Title :
Qualifying explore and exploit for efficient data dissemination in emergency adhoc networks
Author :
Kolios, Panayiotis ; Pitsillides, Andreas ; Mokryn, Osnat ; Papadaki, Katerina
fYear :
2014
fDate :
24-28 March 2014
Firstpage :
303
Lastpage :
307
Abstract :
The literature of wireless adhoc networks includes a plethora of alternative dissemination strategies that aim for efficient delivery of data traffic from source to destination. Hence, the majority of these strategies assume that the source-destination pair is known prior to any data forwarding. On the contrary, an adhoc network opportunistically formed by mobile devices in the aftermath of a disaster, lacks any actual knowledge with respect to the network topology and the response units´ availability. As such, distress nodes need to first understand their topological status in order to then be able to make informed forwarding decisions for alert message dissemination. The Explore and Exploit strategy, described hereafter, is purposefully envisioned to solve the latter issues and meet the stringent requirements for highly efficient data dissemination.
Keywords :
ad hoc networks; mobile radio; telecommunication network topology; telecommunication traffic; alert message dissemination; alternative dissemination; data dissemination; data forwarding; data traffic; emergency adhoc networks; mobile devices; network topology; response unit availability; source-destination pair; wireless adhoc networks; Batteries; Bridges; Conferences; Emergency services; Measurement; Mobile handsets; Peer-to-peer computing; Adhoc Com-munications; Complex Network Science; Data Dissemination; Emergency Response Networking;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Pervasive Computing and Communications Workshops (PERCOM Workshops), 2014 IEEE International Conference on
Conference_Location :
Budapest
Type :
conf
DOI :
10.1109/PerComW.2014.6815222
Filename :
6815222
Link To Document :
بازگشت