Delay Tolerant Networks over Near Field Communications: The Automatic Multi-packet Communication

Radosław Olgierd Schoeneich, Piotr Sadło

Abstract


The Near Field Communication is designed for sending small data, which size does not exceed the several dozen bytes, for distance not higher than two inches. The NFC can be used in store-carry-forward scenarios which are bases for Disruptive Tolerant Networks. The aim of this paper is proposal how to use NFC in transmission of large data in DTN. We propose an algorithm of fragmenting, sending and receiving data. We described software which was used in our prototype and discussed about implementation. Finally we showed results of tests performed on our model. Obtained results presents well characteristics of our solution.

Keywords


mobile communication, radio communication, wireless networks, personal communication networks, cooperative communication

Full Text:

PDF

References


Burleigh S., Hooke A., Torgerson L., Fall K., Cerf V., Durst B., Scott K., Weiss H. (2003); Delay-tolerant networking: an approach to interplanetary internet. IEEE Commun. Mag., 128-136, 2003.
https://doi.org/10.1109/MCOM.2003.1204759

Curran K., Millar A., Mc Garvey C. (2012); Near field communication, International Journal of Electrical and Computer Engineering, 2(3), 2012.

Domaszewicz J., Koziuk M., Schoeneich R.O. (2008); Context-Addressable Messaging Service with Ontology-Driven Addresses, in Proc. On the Move to Meaningful Internet Systems: OTM 2008, 1471-1481, 2008.

Dziekonski A.M., Schoeneich R.O. (2016); DTN Routing Algorithm for Networks with Nodes Social Behavior, in Proc. International Journal of Computers Communications and Control, 11(4), 457-471, 2016.
https://doi.org/10.15837/ijccc.2016.4.1454

Golanski M., Schoeneich R.O., Siwko M. (2010); The algorithm for distribution of large-size data in the Wireless Ad-hoc Sensor Network, in proc. Concepts and Implementation for Innovative Military Communications and Information Technologies, Military University of Technology, 577-584, 2010.

Ha P., Yamamoto H., Yamazaki K. (2013); Using Autonomous Air Vehicle in DTN Sensor Network for Environmental Observation, in Proc. Computer Software and Applications Conference (COMPSAC), 2013 IEEE 37th Annual. IEEE, 447-450, 2013.

Fall K. (2003); A delay-tolerant network architecture for chalenged internets, In Proc. of The 2003 conference on Applications, technologies, architectures, and protocols for computer communications (SIGCOMM '03), 27-34, 2003.

Fan C.-S. (2016); HIGH: A Hexagon-based Intelligent Grouping Approach in Wireless Sensor Networks, Advances in Electrical and Computer Engineering, 16(1), 41-46, 2016.
https://doi.org/10.4316/AECE.2016.01006

Fang W., Li S., Liang X., Li Z. (2012); Cluster-based Data Gathering in Long-Strip Wireless Sensor Networks, Advances in Electrical and Computer Engineering, 12(1), 3-8, 2012.
https://doi.org/10.4316/aece.2012.01001

Juang P., Oki H., Wang Y., Martonosi M., Peh L.S., Rubenstein D. (2002); Energy-efficient computing for wildlife tracking: design tradeoffs and early experiences with ZebraNet, SIGOPS Oper. Syst. Rev., 36(5) (October 2002), 96-107.
https://doi.org/10.1145/605397.605408

Kawecki M., Schoeneich R.O. (2016); Mobility-based routing algorithm in delay tolerant networks, in Proc. EURASIP Journal on Wireless Communications and Networking, 81, 1-9, 2016.

Koziuk M., Domaszewicz J., Schoeneich R.O., Jablonowski M., Boetzel P. (2008); Mobile Context-Addressable Messaging with DL-Lite Domain Model, in Proc. Smart Sensing and Context, 5279, 168-181, 2008. doi 10.1007/978-3-540-88793-5_13
https://doi.org/10.1007/978-3-540-88793-5_13

Lindgren A., Doria A., Schelen O. (2003); Probabilistic routing in intermittently connected networks, ACM SIGMOBILE Mobile Computing and Communications Review, 19-20, 2003.

Lu Z., Fan J. (2010); Delay/disruption tolerant network and its application in military communications, Proc. of computer design and applications, 2010. 2010.5541302

Matsuzaki R., Ebara H., Muranaka N. (2015); Rescue Support System with DTN for Earthquake Disasters, IEICE Trans. Commun., 98(9), 1832-1847, 2015,

Ondrus J., Pigneur Y. (2007); An Assessment of NFC for Future Mobile Payment Systems, Proceedings of the International Conference on the Management of Mobile Business (ICMB '07). IEEE Computer Society, 2007,

Quwaider M., Biswas S. (2010); DTN routing in body sensor networks with dynamic postural partitioning, Ad Hoc Networks, 8(8), 824-841, 2010, http://dx.doi.org/10.1016/j.adhoc.2010.03.002
https://doi.org/10.1016/j.adhoc.2010.03.002

Palka P., Schoeneich R.O. (2013); Multi-commodity Trade Application to the Routing Algorithm for the Delay and Disruptive Tolerant Networks, in Proc. New Trends in Databases and Information Systems, 185, 241-250, 2013.
https://doi.org/10.1007/978-3-642-32518-2_23

Schoeneich R.O., Domaszewicz J., Koziuk M. (2009); Concept Based Routing in Ad-Hoc Networks, Lecture Notes In Computer Science, 5408, 43-48, 2009. 92295-7_8

Schoeneich R.O., Golanski M. (2007); Mesh Cluster Based Routing Protocol: Enhancing Multi-hop Internet Access using Cluster paradigm, Proc. EUROCON, 2007. The International Conference on Computer as a Tool, 962-965, 2007.
https://doi.org/10.1109/EURCON.2007.4400318

Spyropoulos T., Psounis K., Raghavendra C.S. (2005); Spray and wait: an efficient routing scheme for intermittently connected mobile networks, Proc. of The 2005 ACM SIGCOMM workshop on Delay-tolerant networking, 252-259, 2005.
https://doi.org/10.1145/1080139.1080143

Vladuta A.-V., Pura M.L., Bica I. (2016); MAC Protocol for Data Gathering in Wireless Sensor Networks with the Aid of Unmanned Aerial Vehicles, Advances in Electrical and Computer Engineering, 16(2), 51-56, 2016.
https://doi.org/10.4316/AECE.2016.02007

Want R. (2006); An introduction to RFID technology, IEEE Pervasive Computing 5(1), 25-33, 2006.
https://doi.org/10.1109/MPRV.2006.2

Want R. (2011); Near field communication, IEEE Pervasive Computing, 3(10), 4-7, 2011.
https://doi.org/10.1109/MPRV.2011.55

Zimmerman T.G. (1996); Personal area networks: near-field intrabody communication, IBM Syst. J., 35(3-4), 609-617, 1996.
https://doi.org/10.1147/sj.353.0609




DOI: http://dx.doi.org/10.15837/ijccc.2017.5.2942

Refbacks

  • There are currently no refbacks.




Copyright (c) 2017 Radosław Olgierd Schoeneich, Piotr Sadło

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

CC-BY-NC-ND   license for website user

Articles published in IJCCC user license are protected by copyright.

Users can access, download, copy, translate the IJCCC articles for non-commercial purposes provided that users, but cannot redistribute, display or adapt:

  • Cite the article using an appropriate bibliographic citation: author(s), article title, journal, volume, issue, page numbers, year of publication, DOI, and the link to the definitive published version on IJCCC website;
  • Maintain the integrity of the IJCCC article;
  • Retain the copyright notices and links to these terms and conditions so it is clear to other users what can and what cannot be done with the  article;
  • Ensure that, for any content in the IJCCC article that is identified as belonging to a third party, any re-use complies with the copyright policies of that third party;
  • Any translations must prominently display the statement: "This is an unofficial translation of an article that appeared in IJCCC. Agora University  has not endorsed this translation."
  • NoDerivatives — If you remix, transform, or build upon the material, you may not distribute the modified material.

This is a non commercial license where the use of published articles for commercial purposes is forbiden. 

Commercial purposes include: 

  • Copying or downloading IJCCC articles, or linking to such postings, for further redistribution, sale or licensing, for a fee;
  • Copying, downloading or posting by a site or service that incorporates advertising with such content;
  • The inclusion or incorporation of article content in other works or services (other than normal quotations with an appropriate citation) that is then available for sale or licensing, for a fee;
  • Use of IJCCC articles or article content (other than normal quotations with appropriate citation) by for-profit organizations for promotional purposes, whether for a fee or otherwise;
  • Use for the purposes of monetary reward by means of sale, resale, license, loan, transfer or other form of commercial exploitation;

    The licensor cannot revoke these freedoms as long as you follow the license terms.

[End of license]


INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL (IJCCC), With Emphasis on the Integration of Three Technologies (C & C & C),  ISSN 1841-9836.

IJCCC was founded in 2006,  at Agora University, by  Ioan DZITAC (A. Editor-in-Chief),  Florin Gheorghe FILIP (Editor-in-Chief), and  Misu-Jan MANOLESCU (Managing Editor).

This journal is a member of, and subscribes to the principles of, the Committee on Publication Ethics (COPE).

Ioan  DZITAC (A. Editor-in-Chief) at COPE European Seminar, Bruxelles, 2015:

IJCCC is covered/indexed/abstracted in Science Citation Index Expanded (since vol.1(S),  2006). IF=1.374 in JCR2016.

IJCCC is indexed in Scopus from 2008 (SNIP2016 = 0.701, SJR2016 =0.319):

Nomination by Elsevier for Journal Excellence Award Romania 2015 (SNIP2014 = 1.029): Elsevier/ Scopus

IJCCC was nominated by Elsevier for Journal Excellence Award - "Scopus Awards Romania 2015" (SNIP2014 = 1.029).

IJCCC is in Top 3 of 157 Romanian journals indexed by Scopus (in all fields) and No.1 in Computer Science field by Elsevier/ Scopus.