Sei sulla pagina 1di 6

Experimenting opportunistic networks with

WiFi Direct
Marco Conti, Franca Delmastro, Giovanni Minutiello, Roberta Paris
Institute of Informatics and Telematics (IIT)
National Research Council of Italy, Pisa
Email: firstname.lastname@iit.cnr.it

Abstract—WiFi Direct introduces new opportunities to de- by supporting both peer-to-peer and AP communications,
ploy real opportunistic networks through users’ mobile devices. promising a much easier set up and management by upper-
However, its original specification does not take into account layer applications, and regular Wi-Fi speeds up to 250 Mbps.
all the parameters that can emerge from an opportunistic
network scenario, not only in terms of technical requirements However, the original specifications of WiFi Direct does not
(e.g., available resources and connectivities) but also of users take into account all the parameters that can emerge from
characteristics and profiles, which can heavily influence the an opportunistic network scenario. Here, the system has to
system’s performances and devices’ interactions. In this work deal with both devices’ and users’ requirements, considering
we investigate the feasibility of creating opportunistic networks not only technical specifications (e.g., available resources
on top of WiFi Direct framework by analyzing the protocol’s
performances in real scenarios with a variable number of and connectivities) but also personal users’ profiles that can
mobile devices. Experimental results show the times required derived from multiple information (e.g., habits, interests, user-
to form a group of variable size and the best configurations generated contents, mobility, cooperative aptitude). To this
to support opportunistic networking operations and upper layer aim, the complexity of the network management increases
applications. while offering even more efficient and personalized services.
Index Terms—WiFi Direct, P2P, opportunistic networks, mo-
bile social networks Specifically, we move the attention from the standard notion
of network of devices to the emerging concept of network of
I. I NTRODUCTION people, in which the users, their contents and needs are the
core of the system. This follows the current trends of social
Opportunistic networks represent the natural evolution of networking applications in which users needs to exchange in-
mobile ad hoc networks (MANETs), overtaking limitations formation anywhere and anytime, always requiring an Internet
and constraints of this paradigm related to the continuous connectivity. Through opportunistic communications we can
update of highly dynamic network topologies. Opportunistic further extend this paradigm and its application scenarios by
networks takes advantage of the human mobility and the exploiting the physical interaction’s opportunities among per-
consequent network dynamism by defining new opportunities sonal devices generated by the users’ mobility, not requiring
of communication generated by the occasional encounter of any pre-existent social relationships among the involved users
users and their personal devices. In this scenario, when two and not necessarily requiring an Internet connectivity. This
users and devices come into contact, they can exploit direct new paradigm is known as Mobile Social Networks [3].
communications to exchange contents, to offer services, to Currently, a few works in literature presented real imple-
share resources and also to forward messages, even towards mentations of opportunistic networks. [4] presented WiFi-Opp,
other users/devices not currently in contact [1]. In this sce- an opportunistic networking setup based on the AP mode of
nario, available Internet connection represents just another mobile users’ devices and evaluated its performances through
communication opportunity. simulations based on real human mobility traces. We applied
Initial solutions to really implement ad hoc (and subse- a similar approach in [5], [6] through real experiments but
quently opportunistic) networks relied on WiFi ad-hoc mode we experienced issues related to real users’ mobility and
that was painful to set up (designed for expert users only) intermittent connectivity events. To the best of our knowledge,
and supported data transfer speeds at most around 11 Mbps. this is the first work on real experiments on the use of
In addition, devices configured to communicate in ad-hoc WiFi Direct for opportunistic networks based on Android
mode were not able to concurrently manage an infrastructured implementation and by using a variable number of nodes. [7]
communication (e.g., AP connections) keeping the two worlds, presented preliminary experimental results considering only
ad-hoc and Internet-connectivity, completely separated. WiFi on a two-nodes configuration and by using laptops with a
Alliance [2], by introducing Wi-Fi Direct technology and the customized implementation of WiFi Direct framework. In
related software protocol, practically overtakes these limitation order to compare our experimental results with those presented
in [7], we reproduce the same configuration with our nodes as
This paper has been partially funded by Regione Toscana under the project
SmartHealthyENV (POR-CREO FESR 2007-2013) and by Registro .it under explained in Section III. In addition, we evaluate the protocol
the project CAPP-Collective Awareness Participatory Platform. performances in different configurations involving up to six

978-1-4799-0543-0/13/$31.00 ©2013 IEEE


nodes as detailed in Sections IV and V. However, before same channel is guaranteed by the random periods in which
analyzing the experimental results, we present a technical each device stays in the Listen state (generally between 100
overview of the protocol and its Android implementation in and 300 ms) [2].
Section II. Conclusions and future works are then presented The Device Discovery procedure is followed by the Group
in Section VI. Formation in which the devices define the GO and establish
their first connection. WiFi Direct defines three different
II. W I F I D IRECT OVERVIEW
procedures for a P2P group formation: (i) standard, in case
WiFi Direct, initially called Wi-Fi P2P, is currently the there is a GO negotiation through a three-way handshake,
reference standard to support device-to-device (D2D) com- (ii) autonomous, in case a node elects itself as GO and
munications on WiFi channels. It exploits the same physical announces its presence to the others through beacon messages,
wireless interface to support both standard wireless commu- (iii) persistent, in case the involved nodes already participated
nications and D2D, defining one virtual interface for each in the same group and are able to rebuild it starting from
protocol. WiFi Direct relies on the concept of group. Devices their local information (in this case there is an Invitation
that want to establish D2D communications must organize procedure to join the group)1 . Once the GO is identified,
in groups assuming the roles of Group Owner (GO) and/or the protocol implements an authentication procedure based on
Client. A device can assume both roles only in case it has WiFi Protected Setup (WPS) in order to establish a secure
more wireless physical interfaces or it implements time sharing wireless connection mainly based on a PIN code exchange
techniques on the same interface. A GO is an ”AP-like” entity [2]. Then, there is the devices’ address configuration phase
that provides BSS functionalities to the associated clients, both in which nodes receive an IP address assigned by a DHCP
legacy (i.e., supporting standard 802.11 wireless access) and server running on the GO. It is worth noting that, in case of a
P2P. Legacy clients can communicate only with the GO by persistent group, the involved nodes are already authenticated
exploiting it as WLAN access, while P2P clients are also and they can directly exchange the wireless keys reducing the
able to establish client-to-client communications. The roles are WPS phase duration.
dynamically defined by implementing a two-phase protocol WiFi Direct specifications [2] describe in detail the behavior
(i.e., Device Discovery and Group Formation); the life of of the protocol in case of two nodes establishing a P2P group
the group and related communications are strictly connected in the three different ways, but the complexity increases with
to the GO’s behaviour. When a group is established, WiFi the number of nodes and the group size. In addition, the
Direct implements a set of operations to manage the group system’s performances related to the execution of the previous
and devices’ interactions supporting also power management procedures are strictly related to the implementation of the
mechanisms as specified in [2]. In this paper we focus only protocol and to its interaction with the operating system and
on the Device Discovery and Group Formation procedures in the upper layer applications.
order to investigate the feasibility of creating opportunistic
To better investigate the possibility of implementing a real
networks on top of WiFi Direct and to analyze the protocol’s
opportunistic network with users’ mobile devices, in this
performances in real scenarios involving a variable number of
paper we experimentally validate Android 4.2 implementation
mobile devices.
of WiFi Direct by deploying a real testbed with Google
A. Device Discovery and Group Formation Galaxy Nexus smartphones. We start from a two nodes group
formation, analyzing the three different procedures. Then, we
The first step in the definition of a WiFi Direct group is
analyze a case in which three nodes simultaneously try to
represented by the Device Discovery procedure. It consists of
connect to each other to create a group and, eventually, a case
two phases: Scan and Find. During the Scan phase each device
of incremental join of a group involving up to six devices.
collects information about the surrounding devices by scanning
all the supported wireless channels (specified by IEEE 802.11 The main target of this work is to experimentally set up an
standard). Considering that P2P devices uses only Social opportunistic network without neither modifying the internal
Channels (i.e., 1, 6, and 11 in the 2.4GHz band) to operate operating system drivers or requiring an explicit interaction
through WiFi Direct, the Scan phase allows them to discover from the user. In fact, in previous versions of Android it was
also potential legacy clients operating on different channels. not possible to establish D2D communications without rooting
The Scan phase has a predefined duration and is followed the device and forcing the use of ad-hoc communications [8].
by the Find phase, in which P2P devices alternate Search With the introduction of WiFi Direct, opportunistic commu-
and Listen states on the Social Channels for randomized time nications can become a reality even though several work is
periods. In this phase a device in the Search state sends needed to analyze the protocol performances in case of nodes’
Probe Request messages in order to discover other devices mobility and high churn rates (as general characteristics of
concurrently in the Listen state on the same channel. When opportunistic networks). This last investigation is currently a
a device receives a Probe Request on a specific channel, it work-in-progress.
replies with a Probe Response on the same channel, including
information to identify itself and the group it belongs to (if 1 Details on the execution of the three different procedures will be provided
the device is the GO). The convergence of two devices on the in Section III.
B. Android and WiFi Direct Device A Device B
Android provides Wi-Fi Direct APIs (also known as app wpa_s app wpa_s
WiFiP2P) [9] to mobile applications as a high-level access wifiP2PManager. wifiP2PManager.
discoverPeers() discoverPeers()
to networking operations internally managed by WiFi Di-
rect framework that, in case of Android/Linux OS, is the
discovery
wpa supplicant process [10]. The process maintains also a P2P-Device-Found B
discovery

local configuration file (p2p supplicant.conf) in which it stores wifiP2PManager.connect(B)


P2P-Device-Found A

the local device’s configuration parameters and information wifiP2PManager.connect(A)

Provision Discovery Request


about possible persistent groups. In case the local node is a Provision Discovery Response

GO, it includes also the list of peers participating to the same Go Negotiation Request

group. WiFiP2P APIs allows mobile applications to: Go Negotiation Response

Go Negotiation Confirmation
• discover, request information, and connect to other peers; Become Go
Beacon

• be notified of the success or failure of the previous


operations in terms of local interactions between the wps wps

application and the framework; dhcp dhcp


• register intents that notify the application of specific
events detected by the framework through networking op- Connected (GO) Connected (CLIENT)

erations (e.g., a dropped connection or a newly discovered


Fig. 1. Standard Group Formation
peer).
It is worth noting that WiFi Direct communications gen- standard, autonomous and persitent), comparing the obtained
erally request the user’s authorization through a PushButton results with those presented in [7]. Then, by increasing the
mechanism during a Provision Discovery procedure that fol- number of nodes, we analyze the protocol reactions to specific
lows the device discovery phase. In order to allow the real events, like the simultaneous request to create a group and the
implementation of opportunistic networks in which the device incremental join of a group, in order to evaluate the protocol’s
could experience high frequency connection’s attempts and time response and the reaction to possible errors.
consequent user’s authorization requests, it would be useful
to allow mobile applications to avoid this procedure, at least III. T WO - NODES E XPERIMENTAL RESULTS
for the nodes running the same application, requiring a general Let us consider two devices, A and B. Figure 1 shows
authorized consent by the user (just once). However, this is not a sequence diagram explaining the main interactions be-
possible by using standard WiFiP2P APIs, while it can be done tween an Android app and wpa supplicant process running
by exploiting some procedures implemented as Android hid- on the two nodes in order to discover each other and to
den APIs. Applications can invoke hidden APIs through Java establish a P2P group based on the standard procedure.
reflection or customized SDK. However, their implementation To start a device discovery procedure, the application must
is not fully guaranteed since they are not officially released call WiFiP2PManager.DiscoverPeers() that requests
[11]. Applications can benefit from the use of hidden APIs wpa supplicant to start the Scan and Find phases. The dis-
also for other operations, like the request to remove a persistent covery remains active until a connection is initiated or a
group from the wpa supplicant configuration file, or to recover group is formed, otherwise it is stopped automatically after
the information related to a group identifier to execute specific 120s (timeout introduced by the Android implementation).
operations. In this way, the application developer has a greater Every time a new node is discovered, wpa supplicant notifies
control on the group’s management operations that can be the application with a ”P2P Device Found” event and the
really useful, for example, in case of forwarding protocols application can invoke the function to extract the node’s
implementation. information necessary to execute a connection. The connection
In order to validate Android 4.2 implementation of WiFi request is followed by a Provision Discovery phase (to require
Direct, according to the general description provided by of- the user’s authorization) and the negotiation procedure.
ficial specifications, we decided to analyze both application In case of autonomous mode, the discovery is limited to
level messages and those exchanged at the network level. To the Scan phase and the negotiation is completely removed
this aim, we used Google Galaxy Nexus smartphones as nodes since the GO simply announces its presence through Bea-
participating in the group formation, and three laptops, with con messages on the Social channels. Instead, in case of
wireless cards in monitor mode, as sniffers. In this way, we a persistent group formation, the nodes execute the device
were able to observe all the packets sent on the network on discovery followed by an Invitation procedure (instead of
each Social Channel (especially for the discovery phase). In GO negotiation) in which both a client or a GO (prefixed
the next sections we present the performance results obtained roles) can invoke the creation of the group. In the Invitation
through real experiments with two, three and six smartphones. Request/Response messages the nodes specify a configuration
In the first case we focus on the analysis of device discovery timeout as the interval of time needed by each device to be
and group formation phases in the three different settings (i.e., ready for establishing the group after receiving a successful
Invitation response. The introduction of this additional time Device A Device B Device C
should reduce the probability of a join failure. In addition, in a app wpa_s app wpa_s app wpa_s
persistent group formation, since the nodes already know each wifiP2PManager. wifiP2PManager. wifiP2PManager.
discoverPeers() discoverPeers() discoverPeers()
other, they don’t require the execution of the authentication
phase and the WPS phase is limited to the keys’ exchange. discovery
discovery
Figures 2 (a) and (b) show the cumulative distribution P2P-Device-Found B
P2P-Device-Found A
wifiP2PManager.connect(B) P2P-Device-Found B
function (cdf) of times required for the discovery and group wifiP2PManager.connect(A)
wifiP2PManager.connect(B) discovery

formation phases obtained by 250 experiments for each of the


negotiation negotiation
three different procedures. Each plot represents the average of with B with A

P2P-Device-Found B
the times experienced by the two nodes. We can note that in wifiP2PManager.connect(B)

wps wps
the autonomous case each node spends about 1s to discover the
other in all the experiments. This is related to the configuration dhcp dhcp

of the autonomous mode in which the discovery is limited to P2P-GO-NEG-FAILURE|


Connection Failed
the Scan phase. Instead, persistent and standard configurations GROUP-FORM-FAILURE|
P2P-DEVICE-LOST
Connected (GO) Connected (CLIENT)
experience discovery times in the range [1.48s, 15.35s] and Beacon
discovery

[1.5s, 15.9s], respectively. This is due to the random duration


of the Find phase in which the two nodes must converge on
Fig. 3. Three nodes Group Formation.
the same channel and receive the probe messages.
By analyzing the group formation procedures, we can note
in 20% of cases due to the implementation issues described
that the autonomous case maintains a large distance from the
above. In any case, we can summarize that the autonomous
other two cases by experiencing 3s to form the group in the
mode has the best performances to complete a group formation
92% of the experiments, and an additional delay of 5s in the
of two nodes. However, in a highly dynamic environment such
last 8%. Looking at wpa supplicant log files, we discovered
as opportunistic networks, the a priori selection of a GO should
that in those cases an error occurred during the WPS phase
include the analysis of several parameters in order to guarantee
and the process introduces a delay of 5s before re-starting
a minimum network stability. The autonomous configuration
the WPS procedure. The same error has been experienced
is suitable indeed for an incremental group formation as we
in the standard configuration (in 9.5% of cases) requiring an
can observe in the last set of experiments.
average time of 12.26s to form the group. However, there are
additional cases with higher times (3.5%), not influenced by IV. T HREE NODES : SIMULTANEOUS GROUP FORMATION
WPS errors, but presenting delays in other phases: (i) during REQUEST
the GO negotiation phase due to a message loss, (ii) during the
addressing phase due to a delay in the DHCP server response. In these experiments three devices simultaneously try to
Considering that the discovery and group formation procedures build up a WiFi Direct group. Since the group formation is a
are independent in their execution, we can note in Figure 2 (c) procedure involving only two nodes, the request of the third
that in the worst cases a standard group formation can require one is rejected with different error messages and consequent
about 23s to successfully complete. different delays to form the entire group. Figure 3 shows the
A surprising result arises from the evaluation of the per- sequence diagram of the operations executed by the Android
sistent group formation. In this case we expect to experience application and related wpa supplicant process on the three
lower times to form the group with respect to the standard nodes.
configuration by reducing the WPS phase, but this never All the nodes start the discovery phase simultaneously. A
happens. In fact, even though in all the experiments the and B find each other and start the GO negotiation phase
invitation procedure successfully completes, the client initially in the standard configuration. In the meanwhile, C finds
fails to join the group. This is due to the immediate tentative one of the other two nodes and tries to connect to it. The
of the client to connect to the GO while it is still configuring protocol’s reaction to this event differs depending on several
the group (GO spends around 600ms to start the P2P group parameters: (i) the time in which C starts the connection
session and to send the group ID on the network, essential operation with respect to the status of the other two nodes
information for the client to join the group). In this case, (i.e., GO negotiation completed or not, group formed or not),
wpa supplicant delays the subsequent client’s tentative of (ii) if C selects the GO or the client as destination of the
exactly 5s. This problem could be solved by setting the connection request. We ran 30 experiments and we are able to
appropriate timeout for the client before trying to join the distinguish among 7 different cases as shown in Figure 42 . Let
group after the invitation procedure (currently set to 200ms). us assume that A is always elected as GO, we identified the
Comparing all the results with those presented in [7], we following situations including a single optimal case (without
can note that we always experienced lower times in the errors):
autonomous configuration (especially in the discovery phase, 2 The figure shows the type of error occurred, the percentage of occurrences,
with a difference of about 2s), while in the standard and average time to complete the group (including the discovery phase) and 95%
persistent configurations we experienced higher times only confidence intervals.
1 1 1

0.8 0.8 0.8

P(X<t) 0.6 0.6 0.6

P(X<t)

P(X<t)
0.4 0.4 0.4

0.2 0.2 0.2


autonomous autonomous autonomous
persistent persistent persistent
standard standard standard
0 0 0
0 2 4 6 8 10 12 14 16 0 5 10 15 20 25 30 0 5 10 15 20 25 30
t - sec t - sec t - sec

(a) Cdf Discovery (b) Cdf Group Formation (c) Cdf Discovery and Group Formation
Fig. 2.

• A-B negotiation phase is successfully completed and C 7%


140
discovers A as GO. C’s connection request represents a 40%
10%
120
request to join an autonomous group, but when A receives
100
the request it is still completing the WPS phase with B. 7%
80

sec
A immediately sends a Group Formation Failure (GFF)
60
to C that starts a new discovery phase and successfully
40
join the group. In this case, C requires on average 12.3s 20
3% 13% 20%

to complete the operation (13% of cases). 0


C tries to connect to B, client of the original group.

newdiscovery

GO-Neg-Fail
No failure

Request

Double

Device
In this case it receives a Provision Discovery Failure

error
PDF
GFF

lost
(c)
(PDF) 8s after the connection request and starts a new
discovery phase in which it receives a beacon message
from A (GO). At this point it is able to join the group.
Fig. 4. Times and errors during the three-nodes experiments.
In this case C experiences 16.1s on average to join
the group (20%). It is worth noting that, in general,
when a new group starts, all the participants remove
the other discovered devices from their internal lists,
maintaining only the group participants. Therefore, it can
happens that the third node successfully completes the
Provision Discovery phase with the GO and waits to be
accepted as member of the group, but since the other two
nodes already formed a group it is forced to start a new
discovery phase. This introduces a delay of about 60s to
complete the operation (7%).
• C sends a Negotiation Request to A while it is completing
the negotiation phase with B. In this case C receives a
P2P GO negotiation failure (GO-Neg-Fail) message from
A about 99s after the connection request. This happens Fig. 5. Six nodes: incremental join.
in 40% of the experiments, requiring on average 109s to
C to join the group.
• C does not receive any message after the connection case of simultaneous requests from three nodes to create
request. wpa supplicant notifies a Device Lost event, a WiFi Direct group. Replicating the same experiments by
which invokes a new discovery phase. This represents the using four nodes, we could expect that nodes organize in two
worst case, requiring on average 130s to join the group different groups with the same probability that they discover
(7%). each other as two separate couples. Actually, we found that
the protocol is able to successfully form a single group in 90%
Finally, we also experienced a few cases in which C fails of cases with times in the range [86.5s, 275s].
twice in the join operation. The first failure due to one of
These configurations reflect a possible situation in which
the previous cases and the second one trying to connect to
three/four friends meet in a location and their devices tries
the client node even after the group has been formed. This
to establish simultaneously an opportunistic network in order
is mainly due to a delay in wpa supplicant notifications of
to exchange contents. Even though this case is possible, it is
discovered nodes. In this case C discovers B as the first node
more likely that users and mobile devices start to discover
available and tries to connect to it before being notified of the
each other not really at the same time, but incrementally, with
GO’s presence. In those cases, the join operation can require
variable delays in the joining procedure. To test the reaction
up to 2min to complete.
of the protocol to this situation we performed the following
These experiments show the application’s performances in set of experiments.
1 1

0.8 0.8

0.6 0.6

P(X<t)

P(X<t)
0.4 0.4

A/B (A,B)
0.2 C 0.2 (A,B,C)
D (A,B,C,D)
E (A,B,C,D,E)
F (A,B,C,D,E,F)
0 0
2 3 4 5 6 7 8 10 16 32 64 128 8 10 12 14 16 22 32 64 128
t - sec t - sec

(a) Cdf Single node group’s join. (b) Cdf Incremental group formation.
Fig. 6.

V. I NCREMENTAL GROUP FORMATION VI. C ONCLUSION


Experimental analysis of WiFi Direct through real testbeds
We set up a testbed with six Google Galaxy Nexus smart- allows us to analyze advantages and constraints of using this
phones as shown in Figure 5. A and B start creating a standard protocol in order to actually deploy opportunistic networks on
group, followed sequentially by nodes C, D, E and F that a large scale. However, this represents only the first work in
directly request to join the group after receiving GO’s beacon this direction since opportunistic networks are characterized by
messages. We ran 30 experiments during which each join several dynamic parameters that must be taken into account
request is delayed of 150s in order to allow the previous nodes and that can highly influence the performances of this protocol.
to complete their operations and to avoid error situations in To this aim, we are planning to integrate the support of
the group formation phase. Figure 6 (a) shows the cdf of the WiFi Direct protocol inside our middleware platform CAMEO
times required by each node to complete its join procedure (Context-Aware Middleware for Opportunistic Networks) [5]
as absolute time (i.e., starting from its discovery phase). The aimed at implementing context- and social-aware policies for
line representing the higher times is related to the standard the smart management of users’/devices’ resources and the op-
group formation between A and B, which includes the GO timized dissemination and sharing of useful contents through
negotiation procedure. The other nodes measure less than 15s the Mobile Social Network (MSN) paradigm [3]. CAMEO
to complete the procedure except for the last node (i.e., F) represents a common platform to develop MSN applications in
which experiences additional delays in 13% of cases due to several applications domains, by exploiting multi-dimensional
repeated failures in the original join request. This is due to context information related to the user, her devices and the
the wpa supplicant notification of the list of discovered nodes surrounding environment. In this scenario WiFi Direct can
with separate ”P2P Device Found” events. Since the local pave the way for the large scale use of opportunistic networks
node cannot know a priori who is the GO (if not notified and MSN applications.
by the framework), we select the first available neighbor as R EFERENCES
connection’s destination in order to join the group. In this [1] L. Pelusi, A. Passarella, and M. Conti, “Opportunistic networking: data
forwarding in disconnected mobile ad hoc networks,” Communications
case the local node experiences one of the error explained Magazine, IEEE, vol. 44, no. 11, pp. 134–141, 2006.
in the previous section, introducing a variable delay in the [2] “Wifi alliance: Wifi direct specifications.” [Online]. Available:
join procedure up to a maximum value of 120s in case of http://www.wi-fi.org/discover-and-learn/wi-fi-direct
[3] M. Conti and M. Kumar, “Opportunities in opportunistic computing,”
connection’s timeout expiration. Also other nodes experience Computer, vol. 43, no. 1, pp. 42–50, 2010.
some failure in the join procedure but always managed with a [4] S. Trifunovic, B. Distl, D. Schatzmann, and F. Legendre, “Wifi-opp:
ad-hoc-less opportunistic networking,” in Proceedings of the 6th ACM
rapid notification (e.g., 6s on average), making the new client workshop on Challenged networks. ACM, 2011, pp. 37–42.
able to successfully conclude the operation with a limited [5] V. Arnaboldi, M. Conti, and F. Delmastro, “Implementation of cameo:
A context-aware middleware for opportunistic mobile social networks,”
delay. Figure 6 (b) shows the cdf of times required to form in IEEE International Symposium on World of Wireless, Mobile and
the incremental group. We can note that, up to five nodes, Multimedia Networks (WoWMoM), 2011. IEEE, 2011.
[6] V. Arnaboldi, M. Conti, F. Delmastro, G. Minutiello, L. Ricci,
the group formation has a similar cdf behaviour, translating “DroidOppPathFinder: A Context and Social-Aware Path Recommender
each case of about 5s, which is also the average time required System Based on Opportunistic Sensing,” IEEE WoWMoM 2013 Demo
session.
to complete the join of an autonomous group without errors. [7] D. Camps-Mur, A. Garcia-Saavedra, and P. Serrano, “Device to device
Only in the last case we experience higher delays, reaching communications with wifi direct: overview and experimentation,” IEEE
Wireless Communications Magazine, 2012.
the maximum time of 159s due to the same reasons explained [8] [Online]. Available: http://android-developers.blogspot.it/2010/12/its-
above. These results reflect the complexity of WiFi Direct to not-rooting-its-openness.html
[9] “Wifi direct android apis.” [Online]. Available:
manage a variable number of nodes joining the same group http://developer.android.com/guide/topics/connectivity/wifip2p.html
and the need to introduce additional policies at the appli- [10] wpa supplicant and WiFi P2P. [Online]. Available:
https://android.googlesource.com/platform/external/wpa supplicant 8
cation/middleware layer to manage additional constraints of [11] A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner, “Android
opportunistic networks like nodes’ mobility and heterogeneous permissions demystified,” in Proceedings of the 18th ACM conference
on Computer and communications security. ACM, 2011, pp. 627–638.
devices.

Potrebbero piacerti anche