Figure 9 - uploaded by Paulo Milheiro Mendes
Content may be subject to copyright.
Bluetooth operation flowchart.

Bluetooth operation flowchart.

Source publication
Conference Paper
Full-text available
This demo presents Oi!, an opportunistic data transmission tool. Implemented on Android and available as open source, Oi! relies on social interaction, device-to-device short-range wireless transmission, as well as on history of contact duration to perform opportunistic data transmission. In this demo we show how Oi! can be used with intermittent I...

Context in source publication

Context 1
... is responsible for detecting the presence of neighboring devices for the purposes of social weight compu- tation carried out by the Social Proximity module. As illustrated in Fig. 9, BT starts by initializing the Bluetooth communication interface (1) and registering the framework UUID (2). This UUID is used to identify among the neighboring devices those which are actually running the framework. Then, BT shifts to the idle state (3), where it expects for one of the four actions to take ...

Similar publications

Article
Full-text available
This article describes the application of Light Fidelity (Li-Fi) as an alternative to connectivity problems in areas where the quality of the Internet signal in relation to the Wireless Fidelity (Wi-Fi) system is limited or highly complex to data access. Li-Fi is a Visible Light Communication (VLC) technology, which performs wireless data transmiss...
Article
Full-text available
The 802.11 networks (wireless fidelity (WiFi) networks) have been the main wireless internet access infrastructure within houses and buildings. Besides access point placement, building architectures contribute to the WiFi signal spreading. Even dough WiFi installation in buildings becomes prevalent; the building architectures still do not take WiFi...
Article
Full-text available
Deploying and maintaining an Internet service in remote rural and mountainous areas is a challenging task specifically in developing countries. In this paper, we present a study to realize a low-cost sustainable Wireless Internet Service Provider (ISP) built for rural areas of developing countries. There was no Internet access in the area prior to...
Article
Full-text available
This paper demonstrates the use of Unlicensed National Information Infrastructure (UNII-3), 5.725-5.825GHz, Wi-Fi frequencies, in the IEEE802.11a/n standard in setting up long distance point-to-point links, capable of providing broadband internet in rural areas. Although this frequency band was intended for indoor wireless local area networks, its...

Citations

... Open-source code is available via GitHub 2 . DABBER has been tested in emergency scenarios with intermittent connectivity in the context of the H2020 UMOBILE project 3 , to assist data transmission with a novel ICN instant messenger, Oi! [6]. ...
Conference Paper
Full-text available
This poster describes DABBER, a protocol developed to extend the reach of Named Data Networking into wireless environments. Our key contribution lies in the fact that DABBER supports communication in op-portunistic wireless environments by relying on routing metrics that take into consideration node availability and centrality measures; data reachability metrics. The poster provides an overview to the DABBER architecture , and to the available open-source implementation.
... o The operation of the two communication methods: connection-oriented (Now@) [8,10] and connection-less (Oi!) [9,11]. ...
Technical Report
Full-text available
This technical report describes the architecture of NDN-OPP, an extension of the Named-Data Networking (NDN) framework for opportunistic networking scenarios. NDN-OPP was developed based on the NDN Android implementation. NDN-OPP code is open and is available as source code on https://github.com/COPELABS-SITI/ and will be released as APK on Google play. The research leading to these results has received funding from the European Union (EU) Horizon 2020 research and innovation programmer under grant agreement No 645124 (Action full title: Universal, mobile-centric and opportunistic communications architecture, Action Acronym: UMOBILE). This paper reflects only the authors’ views and the Community is not liable for any use that may be made of the information contained therein.
... This technical report describes the architecture of Oi! [6], a novel short messaging Android application for the Named-Data Networking (NDN) framework. Oi! can be used on top of NDN Android, and also on top of NDN-OPP [1,4,5], an extension of the Named-Data Networking (NDN) framework for opportunistic networking scenarios. ...
... In this technical report Oi! [6] is described, its components and operational flow chart are shown. With this application we attend to show the push model and Long Live Interest(LLI) capabilities exiting in NDN-OPP [1,4,5] allowing data to be exchanged even in the presence of intermittent connectivity. ...
Technical Report
Full-text available
This technical report describes the architecture of Oi! [6], a novel short messaging Android application for the Named-Data Networking (NDN) framework. Oi! can be used on top of NDN Android, and also on top of NDN-OPP [1,4,5], an extension of the Named-Data Networking (NDN) framework for opportunistic networking scenarios. Oi! code is open and is available as source code on https://github.com/COPELABS-SITI/ and its APK can be downloaded on Google play1. The available Oi! APK works on top of NDN-OPP, allowing Oi! to be used even in the presence of intermittent wireless connectivity. The research leading to these results has received funding from the European Union (EU) Horizon 2020 research and innovation programmer under grant agreement No 645124 (Action full title: Universal, mobile-centric and opportunistic communications architecture, Action Acronym: UMOBILE). This paper reflects only the authors views and the Community is not liable for any use that may be made of the information contained therein.
... However, we refrain from a deep analysis at these solutions since: i) separately, they do not bring any relevant knowledge for the development of CIMPL; ii) some of them provide too basic mechanisms (e.g., simple data exchange; help users analyze images instead of analyzing such images themselves); and iii) we are interested in solutions that actually bring these worlds together as intended with CIMPL. There is, however, a recent application, Oi! [5], that allows for opportunistic dissemination based on how users socially engage. This is rather interesting and can further complement CIMPL since its users do have social interactions that can be considered to improve the dissemination of public safety data (the potetial of social-based solutions are discussed on Sec. 4). ...
... For that, the OpenCV computer vision library shall be considered along with the adapted version of the TagActivity to allow the recognition of the authority to be notified upon the reporting of photo incident through the CIMPL application. Another potential future work concerns the employed opportunistic dissemination approach as the one employed by Oi! application [5] . The current version of CIMPL relies on an epidemic solution implemented at the WiFiDirect module , which is enough for the purpose of the application. ...
Conference Paper
Full-text available
Public safety plays an important role in what concerns the social welfare of citizens, thus impacting their quality of life. There are different mechanisms (e.g., police, firefighters) in place to help citizens feel safe, and the citizens themselves may have a more proactive posture (e.g., neighborhood watch). The proposed Android application, called CIMPL, targets the willingness of these model citizens in engaging in public safety efforts and the capabilities of their mobile personal devices to improve social welfare. CIMPL allows users to opportunistically exchange public safety content among their devices. This content, produced by users, identifies potential hazard situations, and is used to duly notify the authorities involved in the maintenance of public safety.
... Normally, Bluetooth and Wi-Fi Direct are readily available and shall serve for the realization of PSNs and respective routing solutions. The Oi! Android application [148] is an example of a PSN solution that relies on both Bluetooth and Wi-Fi Direct to allow users to opportunistically exchange messages based on their level of social interaction. In this case, Bluetooth is used to capture the social proximity among user devices, while Wi-Fi Direct allows for the exchange of messages among socially wellconnected nodes based on dLife [28]. ...
Article
A pocket switched network (PSN) is dynamically formed by people who carry portable handheld devices. Interest in PSNs is driven by the increasing number of handheld devices, the several wireless interfaces they possess, as well as their ability to store, carry and forward data. The lack of fixed network topology distinguishes PSNs from traditional networks, and unlike other types of mobile networks, nodes in PSNs closely follow human movement patterns. As a result, PSNs are faced with new challenges especially in the aspect of routing. Although various routing protocols have been proposed, most of them focus on optimizing the performance of networking primitives for traditional networks such as unicast, broadcast and multicast. However, these primitives themselves appear to be insufficient due to new application opportunities presented by PSNs. This paper adopts a user scenario based approach to determine the current state of PSN routing protocols. Specifically, four modes of data transfer are established from six generalized PSN user scenarios. Due to the wide range of existing routing proposals, a new taxonomy is proposed to facilitate analysis of their compatibility with the established modes of data transfer. The analysis provides new insights into application based routing approaches for realizing next-generation PSN routing protocols.
Technical Report
Full-text available
This draft describes the Data reAchaBility BasEd Routing (DABBER) protocol. DABBER aims to provide a name-based routing solution to support the operation of Information-centric Networking frameworks in opportunistic wireless networks. By "opportunistic wireless networks" it is meant multi-hop wireless networks where finding an end-to-end path between any pair of nodes at any moment in time may be a challenge. The goal is to assist in better defining opportunities for the transmission of Interest packets in a store- carry-and-forward manner, based on a proactive approach. The document describes how to integrate DABBER in a networking node that implements some ICN approach, such as Named-Data Networking (NDN) or Content Centric Networking (CCN), along with the specification of the proactive approach based on the dissemination of name-prefix information.