Rajapaksha, ChamaliChamaliRajapakshaFörster, AnnaAnnaFörsterKarunathilake, ThenukaThenukaKarunathilakeKuladinithi, KoojanaKoojanaKuladinithiUdugama, AsangaAsangaUdugamaHernández-Orallo, EnriqueEnriqueHernández-Orallo2025-08-212025-08-212012-02-24in: Opportunistic Networks by Anna Förster, Pietro Manzoni, Enrique Hernández Orallo, Koojana Kuladinithi, Asanga Udugama: 81-99 (2024)978-3-031-47866-6978-3-031-47865-9978-3-031-47867-3978-3-031-47868-0https://hdl.handle.net/11420/57102In this chapter, we introduce the different simulation models available and needed to simulate opportunistic networks in all their details. They include application (traffic) models, link abstraction models, mobility models, and contact traces. We discuss each of them individually, which concrete models exist, and how they work in general. Furthermore, we discuss possible techniques to speed up simulation.enApplication models | Contact traces | Link abstraction models | Mobility models | Opportunistic networks | Simulation models | Simulation speedup | Traffic models | User behavior modelsTechnology::600: TechnologySimulation models for opportunistic networksBook Part10.1007/978-3-031-47866-6_6Book Chapter