000 07577nam a22005775i 4500
001 978-3-031-47866-6
003 DE-He213
005 20240423130333.0
007 cr nn 008mamaa
008 240311s2024 sz | s |||| 0|eng d
020 _a9783031478666
_9978-3-031-47866-6
024 7 _a10.1007/978-3-031-47866-6
_2doi
050 4 _aTK5105.5-5105.9
072 7 _aUKN
_2bicssc
072 7 _aCOM043000
_2bisacsh
072 7 _aUKN
_2thema
082 0 4 _a004.6
_223
100 1 _aFörster, Anna.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aOpportunistic Networks
_h[electronic resource] :
_bConcepts and Systems /
_cby Anna Förster, Pietro Manzoni, Enrique Hernández Orallo, Koojana Kuladinithi, Asanga Udugama.
250 _a1st ed. 2024.
264 1 _aCham :
_bSpringer Nature Switzerland :
_bImprint: Springer,
_c2024.
300 _aXVIII, 194 p. 56 illus., 42 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aI Foundations of Opportunistic Networks -- 1 Mobility of Opportunistic Networks -- 1.1 Scale and density -- 1.2 Collecting mobility traces -- 1.3 From mobility traces to location information -- 1.4 From mobility traces to contact information -- 1.4.1 Converting GPS traces into contact traces -- 1.4.2 Direct gathering of contact traces -- 1.5 Mobility metrics -- 1.6 Large-Scale Mobility Characteristics in OppNets -- 1.7 Impact of mobility on opportunistic networks -- 1.8 Chapter summary -- Problems -- 2 Data Dissemination in Opportunstic Networks -- 2.1 Terms and metrics -- 2.2 Optimal dissemination -- 2.3 Flooding protocols -- 2.3.1 Epidemic Routing -- 2.3.2 Spray and Wait -- 2.3.3 Optimal Stopping Theory -- 2.4 Mobility based protocols -- 2.4.1 Geocasting protocols -- 2.4.2 Speed/direction based protocols -- 2.4.3 Encounter based protocols -- 2.5 Social awareness based protocols -- 2.6 Data content based protocols -- 2.7 Network coding based protocols -- 2.8 Caching in Opportunistic Networks -- 2.9 Chapter summary -- Problems -- 3 Security in Opportunistic Networks -- 3.1 Overview -- 3.2 Types of Attacks -- 3.2.1 Masquerade -- 3.2.2 Eavesdropping . -- 3.2.3 Sabotage -- 3.2.4 Data Manipulation -- 3.2.5 Physical Attacks -- 3.2.6 Free-riding -- 3.3 Attacks Evaluation -- 3.3.1 Evaluation Methodology and Setup -- 3.3.2 Effects of the Attacks -- 3.4 Chapter summary -- Problems -- Part II Evaluation of Opportunistic Networks 4 Overview of Evaluation of Opportunistic Networks -- 4.1 Overview -- 4.2 Methods for evaluating Opportunistic Networks -- 4.3 Metrics for evaluating Opportunistic Networks -- 4.4 Chapter summary -- Problems -- 5 Theoretical Models for Opportunistic Networks -- 5.1 General assumptions and their validity -- 5.2 Markov Chain Models -- 5.2.1 Modeling epidemic diffusion in OppNet -- 5.2.2 Limitations and applications of Markov Chain Models -- 5.3 Compartmental models -- 5.3.1 Basic epidemic model -- 5.3.2 Epidemic model for an open area -- 5.3.3 Limitations and applicationsof Compartmental Models -- 5.4 Other methods -- 5.5 Chapter summary -- Problems -- 6 Simulation models for Opportunistic Networks -- 6.1 Simulation model stack for opportunistic networks -- 6.4 Mobility Models and Contact Traces -- 6.4.1 Terminology -- 6.4.2 Properties of mobility models -- 6.4.3 Contact traces -- 6.4.4 Discussion of mobility models -- 6.5 Simulation Speedup -- 6.6 Chapter summary -- Problems -- 7 Simulation tools for Opportunistic Networks -- 7.1 Discrete event-based simulation -- 7.2 OMNeT++ and the Opportunistic Network Simulator (OPS) -- 7.3 The ONE -- 7.4 Network Simulator 3 (ns-3) -- 7.5 Comparison of simulators -- 7.6 Mobility tools -- 7.7 Chapter summary -- Problems -- 8 Benchmarking Opportunistic Networks -- 8.1 Benchmarks for OppNets -- 8.2 Metrics for comparing opportunistic protocols -- 8.3 Comparing opportunistic protocols -- 8.4 Chapter summary -- Problems -- Part III Implementation of Opportunistic Networks 9 Connectivity Technologies for OpportunisticNetworks -- 9.1 Mobile Ad Hoc Networks -- 9.2 Communication Technologies -- 9.2.1 LoRa -- 9.2.2 Radio Frequency Identification (RFID) -- 9.2.3 Bluetooth Low Energy (BLE) -- 9.2.4 Wi-Fi Direct -- 9.2.5 ZigBee -- 9.2.6 802.11p -- 9.2.7 Satellite communication -- 9.3 Toward 5G and 6G Networks -- 9.4 Related software and libraries -- 9.4.1 Exposure Notifications System (ENS) -- 9.4.2 Apple Multipeer Connectivity.
520 _aThis textbook provides an exhaustive exploration of Opportunistic Networks (OppNets). Divided into three parts, it starts with the foundational principles and metrics of OppNets, detailing their mobility and data dissemination. Significant focus is given to the security challenges faced by OppNets, including strategies to counter various attacks. The second part evaluates OppNets, introducing methods and metrics for assessment, theoretical and simulation models, and tools such as OMNeT++, The ONE and ns-3. This textbook also offers comparative analyses and discussions on benchmarking. The third part delves into the implementation of OppNets, discussing technologies from Mobile Ad Hoc Networks to satellite communication and their integration with cellular technologies like 4G, 5G and 6G. Detailed insight into device characterization reveals the potential and limitations of devices within OppNets. Practical applications of OppNets in scenarios such as disaster management, remote communication, IoT challenges, smart cities and satellite networks are presented as well. Through detailed discussions and case studies, readers gain a comprehensive understanding of the structure, operation and practical implications of OppNets. It equips readers with knowledge to appreciate the vast potential of OppNets in various applications and settings. This textbook targets advanced-level students and postdocs in computer science and electrical engineering as well as researchers, who are starting new in the area and need a comprehensive view of opportunistic networks. Practitioners who are interested in applying the concepts of opportunistic networks in their products and services, and would like to have a jump start into the development and applications of opportunistic networks will also want to purchase this book as a reference.
650 0 _aComputer networks .
650 0 _aWireless communication systems.
650 0 _aMobile communication systems.
650 0 _aTelecommunication.
650 1 4 _aComputer Communication Networks.
650 2 4 _aWireless and Mobile Communication.
650 2 4 _aCommunications Engineering, Networks.
700 1 _aManzoni, Pietro.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
700 1 _aOrallo, Enrique Hernández.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
700 1 _aKuladinithi, Koojana.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
700 1 _aUdugama, Asanga.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031478659
776 0 8 _iPrinted edition:
_z9783031478673
776 0 8 _iPrinted edition:
_z9783031478680
856 4 0 _uhttps://doi.org/10.1007/978-3-031-47866-6
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c187491
_d187491