Opportunistic Networking: Data Forwarding in Disconnected Mobile Ad hoc Networks
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
seminar surveyer
Active In SP

Posts: 3,541
Joined: Sep 2010
08-10-2010, 09:52 AM


Opportunistic networks are one of the most interesting evolutions of MANETs. In opportunistic networks, mobile nodes are enabled to communicate with each other even if a route connecting them never exists. Furthermore, nodes are not supposed to possess or acquire any knowledge about the network topology, which is instead necessary in traditional MANET routing protocols. Routes are built dynamically, while messages are en route between the sender and the destination(s), and any possible node can opportunistically be used as next hop, provided it is likely to bring the message closer to the final destination. These requirements make opportunistic networks a challenging and promising research field. In this paper we survey the most interesting case studies related to opportunistic networking and discuss and organize a taxonomy for the main routing and forwarding approaches in this challenging environment. We finally envision further possible scenarios to make opportunistic networks part of the Next-Generation Internet.


During the last few years research on multi-hop ad hoc networks has focused on a number of application environments. Originally conceived for military applications, and aimed at improving battlefield communications and survivability, multi-hop ad hoc networks have lately been proposed in many civil scenarios. As the application environments of these networks increase, their traditional communication paradigms need adequacy. Two main evolutions of multi-hop ad hoc networks are envisioned namely Mesh Networks and Opportunistic Networks. In this paper we focus on Opportunistic Networks. In opportunistic networking no assumption is made on the existence of a complete path between two nodes wishing to communicate. Source and destination nodes might never be connected to the same network, at the same time. Nevertheless, opportunistic networking techniques allow such nodes to exchange messages between them. Usually, this comes at the price of additional delay in messages delivery, since messages are often buffered in the network waiting for a path towards the destination to be available. However, there is a wide range of applications able to tolerate this. Actually, this communication paradigm is reminiscent of widespread applications such as e-mailing. Furthermore, allowing nodes to connect and disconnect at will paves the way for a number of novel application scenarios in the field of mobile ad hoc networks. So far, the main focus of research on opportunistic networks has been on routing and forwarding issues, because finding routes towards the desired destination in such disconnected environments is regarded as the most compelling issue.
for more details, please visit

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Cut Detection in Wireless Sensor Networks pdf project girl 2 1,272 16-07-2015, 09:21 PM
Last Post: Guest
  seminar topics for computer networking with ppt jaseelati 0 295 18-02-2015, 02:37 PM
Last Post: jaseelati
  advantages and disadvantages of mobile phones in telugu jaseelati 0 232 07-02-2015, 02:21 PM
Last Post: jaseelati
  mobile phone based attendance tracking system ppt jaseelati 0 330 30-01-2015, 01:57 PM
Last Post: jaseelati
  mobile advantages and disadvantages in hindi wikipedia jaseelati 0 653 29-01-2015, 01:49 PM
Last Post: jaseelati
  mobile data internetworking standards jaseelati 0 333 29-01-2015, 01:15 PM
Last Post: jaseelati
  cloud data protection for the masses project documentation jaseelati 0 335 21-01-2015, 04:19 PM
Last Post: jaseelati
  computational intelligence in wireless sensor networks ppt jaseelati 0 368 10-01-2015, 03:10 PM
Last Post: jaseelati
  3d optical data storage technology seminar report jaseelati 0 424 06-01-2015, 04:47 PM
Last Post: jaseelati
  3d optical data storage technology seminar report jaseelati 0 338 30-12-2014, 03:23 PM
Last Post: jaseelati