Mobile Opportunistic Networks

Book description

From fundamentals to advanced concepts, this book provides comprehensive technical coverage of this rapidly emerging communications technology. The first section focuses on modeling, networking architecture, and routing problems. The second section examines opportunistic networking technologies and applications. Supplying detailed discussions of key research challenges and open issues, this comprehensive resource provides a clear understanding of industrial and professional standards, communication architectures, network algorithms and protocols, emerging applications, and the latest experimental studies-including simulation tools and implementation test beds.

Table of contents

  1. Front Cover
  2. Contents
  3. Preface
  4. About the Editor
  5. Chapter 1: Routing in Mobile Opportunistic Networks (1/5)
  6. Chapter 1: Routing in Mobile Opportunistic Networks (2/5)
  7. Chapter 1: Routing in Mobile Opportunistic Networks (3/5)
  8. Chapter 1: Routing in Mobile Opportunistic Networks (4/5)
  9. Chapter 1: Routing in Mobile Opportunistic Networks (5/5)
  10. Chapter 2: State of the Art in Modeling Opportunistic Networks (1/6)
  11. Chapter 2: State of the Art in Modeling Opportunistic Networks (2/6)
  12. Chapter 2: State of the Art in Modeling Opportunistic Networks (3/6)
  13. Chapter 2: State of the Art in Modeling Opportunistic Networks (4/6)
  14. Chapter 2: State of the Art in Modeling Opportunistic Networks (5/6)
  15. Chapter 2: State of the Art in Modeling Opportunistic Networks (6/6)
  16. Chapter 3: Credit-Based Cooperation Enforcement Schemes Tailored to Opportunistic Networks (1/7)
  17. Chapter 3: Credit-Based Cooperation Enforcement Schemes Tailored to Opportunistic Networks (2/7)
  18. Chapter 3: Credit-Based Cooperation Enforcement Schemes Tailored to Opportunistic Networks (3/7)
  19. Chapter 3: Credit-Based Cooperation Enforcement Schemes Tailored to Opportunistic Networks (4/7)
  20. Chapter 3: Credit-Based Cooperation Enforcement Schemes Tailored to Opportunistic Networks (5/7)
  21. Chapter 3: Credit-Based Cooperation Enforcement Schemes Tailored to Opportunistic Networks (6/7)
  22. Chapter 3: Credit-Based Cooperation Enforcement Schemes Tailored to Opportunistic Networks (7/7)
  23. Chapter 4: Opportunism in Mobile Ad Hoc Networking (1/7)
  24. Chapter 4: Opportunism in Mobile Ad Hoc Networking (2/7)
  25. Chapter 4: Opportunism in Mobile Ad Hoc Networking (3/7)
  26. Chapter 4: Opportunism in Mobile Ad Hoc Networking (4/7)
  27. Chapter 4: Opportunism in Mobile Ad Hoc Networking (5/7)
  28. Chapter 4: Opportunism in Mobile Ad Hoc Networking (6/7)
  29. Chapter 4: Opportunism in Mobile Ad Hoc Networking (7/7)
  30. Chapter 5: Opportunistic Routing for Load Balancing and Reliable Data Dissemination in Wireless Sensor Networks (1/5)
  31. Chapter 5: Opportunistic Routing for Load Balancing and Reliable Data Dissemination in Wireless Sensor Networks (2/5)
  32. Chapter 5: Opportunistic Routing for Load Balancing and Reliable Data Dissemination in Wireless Sensor Networks (3/5)
  33. Chapter 5: Opportunistic Routing for Load Balancing and Reliable Data Dissemination in Wireless Sensor Networks (4/5)
  34. Chapter 5: Opportunistic Routing for Load Balancing and Reliable Data Dissemination in Wireless Sensor Networks (5/5)
  35. Chapter 6: Trace-Based Analysis of Mobile User Behaviors for Opportunistic Networks (1/8)
  36. Chapter 6: Trace-Based Analysis of Mobile User Behaviors for Opportunistic Networks (2/8)
  37. Chapter 6: Trace-Based Analysis of Mobile User Behaviors for Opportunistic Networks (3/8)
  38. Chapter 6: Trace-Based Analysis of Mobile User Behaviors for Opportunistic Networks (4/8)
  39. Chapter 6: Trace-Based Analysis of Mobile User Behaviors for Opportunistic Networks (5/8)
  40. Chapter 6: Trace-Based Analysis of Mobile User Behaviors for Opportunistic Networks (6/8)
  41. Chapter 6: Trace-Based Analysis of Mobile User Behaviors for Opportunistic Networks (7/8)
  42. Chapter 6: Trace-Based Analysis of Mobile User Behaviors for Opportunistic Networks (8/8)
  43. Chapter 7: Quality of Service in an Opportunistic Capability Utilization Network (1/7)
  44. Chapter 7: Quality of Service in an Opportunistic Capability Utilization Network (2/7)
  45. Chapter 7: Quality of Service in an Opportunistic Capability Utilization Network (3/7)
  46. Chapter 7: Quality of Service in an Opportunistic Capability Utilization Network (4/7)
  47. Chapter 7: Quality of Service in an Opportunistic Capability Utilization Network (5/7)
  48. Chapter 7: Quality of Service in an Opportunistic Capability Utilization Network (6/7)
  49. Chapter 7: Quality of Service in an Opportunistic Capability Utilization Network (7/7)
  50. Chapter 8: Effective File Transfer in Mobile Opportunistic Networks (1/5)
  51. Chapter 8: Effective File Transfer in Mobile Opportunistic Networks (2/5)
  52. Chapter 8: Effective File Transfer in Mobile Opportunistic Networks (3/5)
  53. Chapter 8: Effective File Transfer in Mobile Opportunistic Networks (4/5)
  54. Chapter 8: Effective File Transfer in Mobile Opportunistic Networks (5/5)
  55. Chapter 9: Stationary Relay Nodes Deployment on Vehicular Opportunistic Networks (1/4)
  56. Chapter 9: Stationary Relay Nodes Deployment on Vehicular Opportunistic Networks (2/4)
  57. Chapter 9: Stationary Relay Nodes Deployment on Vehicular Opportunistic Networks (3/4)
  58. Chapter 9: Stationary Relay Nodes Deployment on Vehicular Opportunistic Networks (4/4)
  59. Chapter 10: Connection Enhancement for Mobile Opportunistic Networks (1/6)
  60. Chapter 10: Connection Enhancement for Mobile Opportunistic Networks (2/6)
  61. Chapter 10: Connection Enhancement for Mobile Opportunistic Networks (3/6)
  62. Chapter 10: Connection Enhancement for Mobile Opportunistic Networks (4/6)
  63. Chapter 10: Connection Enhancement for Mobile Opportunistic Networks (5/6)
  64. Chapter 10: Connection Enhancement for Mobile Opportunistic Networks (6/6)
  65. Back Cover

Product information

  • Title: Mobile Opportunistic Networks
  • Author(s): Mieso K. Denko
  • Release date: April 2016
  • Publisher(s): Auerbach Publications
  • ISBN: 9781420088137