This book introduces opportunistic networking by combining fundamental mathematical models, system architecture/ protocols, and practical applications. The book summarizes the main outcomes and investigation of opportunistic networks and provides the overview picture and system training for newcomers to this promising area
Introduction and Methodology. Modeling Opportunistic Networks. Mobility Models. Contact Models. Physical-MAC Layer Enabling Technology. Routing Protocol and Algorithms. Social-Aware Protocols and Evaluations. Security Mechanism and Considerations. Application 1: Mobile Data Offloading. Application 2: Vehicular Data Dissemination. Other Killer Applications.