Applications in Delay-Tolerant and Opportunistic Networks

Teemu Kärkkäinen, Mikko Pitkanen, Joerg Ott

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

5 Scopus citations

Abstract

The characteristics of delay-tolerant and opportunistic communication require fundamentally different approaches at the network layer for routing and forwarding. Unpredictable or large latencies require task divisions according to traditional layering to be reconsidered: Larger messages take the place of series of individual packets exchanged within end-to-end transport connections as virtually instant feedback loops between endpoints disappear. This (forced) move to message-based communication brings along new opportunities for application protocol design; at the same time, the lack of instant feedback and of instant infrastructure access creates a new set of challenges. In this chapter we will explore these challanges and opportunities. Since application design and development is more about practice than theory, this chapter extensively uses examples from real DTN applications and experiments. In this chapter we will explore the challenges that face application designers working on DTNs. We will first introduce typical scenarios in Section 9.1, and we will then look at some of the typical challenges in Section 9.2.We then look in more depth at some of the critical issues including security, legacy system support, and user interfaces in Section 9.3. Section 9.4 presents four in-depth case studies that look at different aspects of DTN applications.

Original languageEnglish
Title of host publicationMobile Ad Hoc Networking
Subtitle of host publicationCutting Edge Directions: Second Edition
PublisherJohn Wiley and Sons
Pages315-359
Number of pages45
ISBN (Print)9781118087282
DOIs
StatePublished - 4 Mar 2013
Externally publishedYes

Keywords

  • DTN/opportunistic, applications
  • Disruptions, and design
  • Offload/connectivity in real-time
  • Opportunistic networking
  • Real DTN, predictability/control

Fingerprint

Dive into the research topics of 'Applications in Delay-Tolerant and Opportunistic Networks'. Together they form a unique fingerprint.

Cite this