𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Opportunistic resource utilization networks—A new paradigm for specialized ad hoc networks

✍ Scribed by Leszek Lilien; Ajay Gupta; Zill-E-Huma Kamal; Zijiang Yang


Publisher
Elsevier Science
Year
2010
Tongue
English
Weight
972 KB
Volume
36
Category
Article
ISSN
0045-7906

No coin nor oath required. For personal study only.

✦ Synopsis


We present opportunistic resource utilization networks or oppnets, a novel paradigm of specialized ad hoc networks. We believe that applications can benefit from using specialized ad hoc networks that provide a natural basis for them, the basis more efficient and effective than what general-purpose ad hoc networks can offer. Oppnets constitute the subcategory of ad hoc networks where diverse systems, not employed originally as nodes of an oppnet, join it dynamically in order to perform certain tasks they have been called to participate in. Oppnets have a significant potential to improve a variety of applications, and to create new application niches. We categorize opportunistic networks currently known in the literature as class 1 opportunistic networks that use opportunistically only communication resources, and class 2 opportunistic networks or oppnets that use opportunistically all kinds of resources, including not only communication but also computation, sensing, actuation, storage, etc. After describing the oppnets and the basics of their operation, we discuss the Oppnet Virtual Machine (OVM)-a proposed standard implementation framework for oppnet applications. It is followed by a discussion of an example application scenario using the OVM primitives. Next, we discuss the design and operations of a small-scale oppnet, named MicroOppnet, originally developed as a proof of concept. MicroOppnet is now being extended to serve as a testbed for experimentation and pilot implementations of oppnet architectures and their components. We conclude with a summary and a list of some open issues for oppnets.


📜 SIMILAR VOLUMES


A distributed intrusion detection system
✍ Adrian P. Lauf; Richard A. Peters; William H. Robinson 📂 Article 📅 2010 🏛 Elsevier Science 🌐 English ⚖ 848 KB

This paper describes the design and implementation of a two-stage intrusion detection system (IDS) for use with mobile ad-hoc networks. Our anomaly-based intrusion detection is provided by analyzing the context from the application-level interactions of networked nodes; each interaction corresponds