4th International ICST Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services

Research Article

Content Source Selection in Bluetooth Networks

  • @INPROCEEDINGS{10.1109/MOBIQ.2007.4451000,
        author={Liam McNamara and Cecilia Mascolo and Licia Capra},
        title={Content Source Selection in Bluetooth Networks},
        proceedings={4th International ICST Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services},
        publisher={IEEE},
        proceedings_a={MOBIQUITOUS},
        year={2008},
        month={2},
        keywords={Availability  Bars  Bluetooth  Cities and towns  Computer science  Data communication  Educational institutions  Motion pictures  Telecommunication network reliability  Wireless networks},
        doi={10.1109/MOBIQ.2007.4451000}
    }
    
  • Liam McNamara
    Cecilia Mascolo
    Licia Capra
    Year: 2008
    Content Source Selection in Bluetooth Networks
    MOBIQUITOUS
    IEEE
    DOI: 10.1109/MOBIQ.2007.4451000
Liam McNamara1,*, Cecilia Mascolo1,*, Licia Capra1,*
  • 1: Dept. of Computer Science University College London UK London WC1E 6BT
*Contact email: l.mcnamara@cs.ucl.ac.uk, c.mascolo@cs.ucl.ac.uk, l.capra@cs.ucl.ac.uk

Abstract

Large scale market penetration of electronic devices equipped with Bluetooth technology now gives the ability to share content (such as music or video clips) between members of the public in a decentralised manner. Achieved using opportunistic connections, formed when they are colocated, in environments where Internet connectivity is expensive or unreliable, such as urban buses, train rides and coffee shops. Most people have a high degree of regularity in their movements (such as a daily commute), including repeated contacts with others possessing similar seasonal movement patterns. We argue that this behaviour can be exploited in connection selection, and outline a system for the identification of long-term companions and sources that have previously provided quality content, in order to maximise the successful receipt of content files. We utilise actual traces and existing mobility models to validate our approach, and show how consideration of the colocation history and the quality of previous data transfers leads to more successful sharing of content in realistic scenarios.