Multimedia sharing over opportunistic networks

Radu Dragan, Radu Ioan Ciobanu, Ciprian Dobre, Constandinos X. Mavromoustakis, George Mastorakis

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Citations (Scopus)

Abstract

The massive increase in the use of mobile devices lately led to the congestion of the mobile networks. One solution to offload part of the traffic is to send data, whenever possible, through direct phone-to-phone communication. Such opportunistic networks rely on wireless communication to support a decentralized model of communication where nodes can store, carry and forward data directly to others. Up-until-now most work focused on constructing algorithms designed to forward or disseminate data to nodes having a better chance of routing it to its destination. Here, we extend on our previous work, and propose Opportunistic Multimedia Sharing, an algorithm designed to support dissemination of multimedia content over an opportunistic communication model. The algorithm uses the predictability of the node encounters to determine which multimedia files a specific node can deliver closer to the interested nodes. Experimental results show the algorithm can deliver a high success rate (over 80% in same cases), while maintaining a low delivery latency and cost.

Original languageEnglish
Title of host publicationProceedings - 2016 IEEE 12th International Conference on Intelligent Computer Communication and Processing, ICCP 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages409-416
Number of pages8
ISBN (Electronic)9781509038992
DOIs
Publication statusPublished - 7 Nov 2016
Event12th IEEE International Conference on Intelligent Computer Communication and Processing, ICCP 2016 - Cluj-Napoca
Duration: 8 Sep 201610 Sep 2016

Other

Other12th IEEE International Conference on Intelligent Computer Communication and Processing, ICCP 2016
CityCluj-Napoca
Period8/09/1610/09/16

Fingerprint

Dive into the research topics of 'Multimedia sharing over opportunistic networks'. Together they form a unique fingerprint.

Cite this