Center for Networked Computing

Similar documents
Mutually Exclusive Data Dissemination in the Mobile Publish/Subscribe System

A General Data and Acknowledgement Dissemination Scheme in Mobile Social Networks

Center for Networked Computing

Heterogeneous Community-based Routing in Opportunistic Mobile Social Networks

CHAPTER 7 COMPARISON OF DIFFERENT ROUTING SCHEMES

WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks

A Joint Replication-Migration-based Routing in Delay Tolerant Networks

Community-Based Adaptive Buffer Management Strategy in Opportunistic Network

BUBBLE RAP: Social-Based Forwarding in Delay-Tolerant Networks

InterestSpread: An Efficient Method for Content Transmission in Mobile Social Networks

Double-Loop Receiver-Initiated MAC for Cooperative Data Dissemination via Roadside WLANs

effsense: Energy-Efficient and Cost-Effective Data Uploading in Mobile Crowdsensing

Epidemic Routing for Partially-Connected Ad Hoc Networks

Lecture (08, 09) Routing in Switched Networks

Social-Similarity-based Multicast Algorithm in Impromptu Mobile Social Networks

Routing Performance Analysis in Delay Tolerant Networks

A Multi-Copy Delegation Forwarding Based On Short-term and Long-Term Speed in DTNs

On Exploiting Transient Contact Patterns for Data Forwarding in Delay Tolerant Networks

A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS

Incentive-Aware Routing in DTNs

Internetworking Protocols and Software (COMP416)

SMART: Lightweight Distributed Social Map Based Routing in Delay Tolerant Networks

Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product

DTN-based Delivery of Word-of-Mouth Information with Priority and Deadline

Incentives for Opportunistic Networks

Assignment 7: TCP and Congestion Control Due the week of October 29/30, 2015

OVERHEADS ENHANCEMENT IN MUTIPLE PROCESSING SYSTEMS BY ANURAG REDDY GANKAT KARTHIK REDDY AKKATI

Question 1 (6 points) Compare circuit-switching and packet-switching networks based on the following criteria:

Cont 2 : Social-Aware Content and Contact Based File Search in Delay Tolerant Networks

Community-home-based Multi-copy Routing in Mobile Social Networks

Analysis of Hop Limit in Opportunistic Networks by

Improvement of Buffer Scheme for Delay Tolerant Networks

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

Research Article Com-BIS: A Community-Based Barter Incentive Scheme in Socially Aware Networking

Energy Management Issue in Ad Hoc Networks

Reliable and Energy Efficient Protocol for Wireless Sensor Network

UMOBILE ACM ICN 2017 Tutorial Opportunistic wireless aspects in NDN

ECE4110 Internetwork Programming. Introduction and Overview

Energy Management Issue in Ad Hoc Networks

Different Layers Lecture 20

ChitChat: An Effective Message Delivery Method in Sparse Pocket-Switched Networks

Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1]

Chapter 3: Transport Layer Part A

CS 204: BGP. Jiasi Chen Lectures: MWF 12:10-1pm Humanities and Social Sciences

Ad hoc and Sensor Networks Chapter 13a: Protocols for dependable data transport

Wireless and Mobile Networks 7-2

Exploiting Heterogeneity in Mobile Opportunistic Networks: An Analytic Approach

Homing Spread: Community Home-based Multi-copy Routing in Mobile Social Networks

Network-on-chip (NOC) Topologies

===================================================================== Exercises =====================================================================

Advanced Networking: Routing & Switching 2 Chapter 7

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS

1. INTRODUCTION. Saravanan.A 1 and Dr.Sunitha Abburu 2

TCP/IP-2. Transmission control protocol:

Community-Aware Opportunistic Routing in Mobile Social Networks

Fast, Efficient, and Robust Multicast in Wireless Mesh Networks

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks

TCP /IP Fundamentals Mr. Cantu

Protocol Specification. Using Finite State Machines

Lecture 4: Intradomain Routing. CS 598: Advanced Internetworking Matthew Caesar February 1, 2011

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM

Routing protocols in WSN

Flow control: Ensuring the source sending frames does not overflow the receiver

CS 268: Computer Networking. Taking Advantage of Broadcast

Delay Tolerant Networks

Buffer Aware Routing in Interplanetary Ad Hoc Network

Social-Aware Routing in Delay Tolerant Networks

DIAL: A Distributed Adaptive-Learning Routing Method in VDTNs

Opportunistic Routing Algorithms in Delay Tolerant Networks

Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks

6. Node Disjoint Split Multipath Protocol for Unified. Multicasting through Announcements (NDSM-PUMA)

Towards a Robust Protocol Stack for Diverse Wireless Networks Arun Venkataramani

Coordination and Agreement

Chapter 7 CONCLUSION

CHAPTER 4 IMPACT OF ROUTING ATTACKS IN LOCATION BASED ROUTING PROTOCOL

2/22/2008. Outline Computer Networking Lecture 9 IP Protocol. Hop-by-Hop Packet Forwarding in the Internet. Internetworking.

Enhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization

Impact of Source Counter on Routing Performance in Resource Constrained DTNs

CS BGP v4. Fall 2014

ECE 598HH: Special Topics in Wireless Networks and Mobile Systems

Benefits of Network Coding for Unicast Application in Disruption Tolerant Networks

Routing in packet-switching networks

Chapter 12 Network Protocols

Problem 7. Problem 8. Problem 9

Archna Rani [1], Dr. Manu Pratap Singh [2] Research Scholar [1], Dr. B.R. Ambedkar University, Agra [2] India

Congestion Control 3/16/09

Lecture 7: Flow Control - I

Interference avoidance in wireless multi-hop networks 1

Network Layer: Routing

Problem Set 7 Due: Start of Class, November 2

Chapter 09 Network Protocols

Graph Algorithms. Many problems in networks can be modeled as graph problems.

Wireless Sensor Networks

IEEE/ACM TRANSACTIONS ON NETWORKING 1. Cooperative Data Offload in Opportunistic Networks: From Mobile Devices to Infrastructure

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017

ADVANCED COMPUTER NETWORKS

VShare: A Wireless Social Network Aided Vehicle Sharing System Using Hierarchical Cloud Architecture

Keywords: Detection, Disruption Tolerant Networks, Mitigation, Routing Misbehavior, Security.

Transcription:

Concept of mobile social networks (MSNs): People walk around with smartphones and communicate with each other via Bluetooth or Wi-Fi when they are within transmission range of each other. Characters: No end-to-end connectivity Using store-carry-forward design Exploiting node s mobility

Two main problems: Information dissemination Mobile ad, News, Twitter, Acknowledgement dissemination Mobile trade, incentive mechanism

A scenario (mobile ad dissemination) Information dissemination: The merchant node would like to send the message (ads) to the potential receivers (customers) soon. Acknowledgement dissemination: After the receiver gets the message, it would send back a receipt (ack.) to the sender. If the merchant receives this ack., it might pay some money for relays. The relay nodes would like to send the ack. to the merchant node soon.

A scenario (mobile ad dissemination) Data and ack. dissemination problem: We hope to find a scheme so that the ads can soon be sent to the receiver. At the same time, the relay can get the reward soon.

Message (data and acknowledgement): Single-copy unicast scenario. Time-to-live (TTL) is assigned. Nodes: Buffer is limited. a encounter b Msg Data1 Ack1 Ack2 Ack3 idle TTL 2 5 30 70 Msg Data2 Data3 Ack4 TTL 50 15 10 idle Node a s buffer Node b s buffer

Priority buffer exchange problem: Suppose two nodes encounter with limited contact opportunity: how should we design a buffer exchange scheme with so that: It can satisfy the data and ack. delivery objective. For example: maximize the delivery ratio of data and ack. minimize the delivery delay of data and ack.

How can we use the each node s ability? to evaluate keeping the message vs. exchanging the message What s the each time? Which one should be exchanged first? Data and ack. have different priorities.

Relay selection criteria: Strongly connected relationship with destination. Weakly connected relationship with destination. Priority buffer exchange: Message should reach the destination before the deadline. Combine the expected delivery time and TTL to assign priority. Assign data and ack. different priorities.

Relay selection criteria Priority buffer exchange Simulation

Two kinds of relationships: Contact probability: The encounter probability between node a and b is denoted as p a (b). ( ). Social status: The centrality of a node in the network. ( ). N(a) denotes node a s neighbor set

Is node b better than node a as a relay? Contact probability: p a (d) < p b (d) Transitive contact probability: p a (c) p c (d) > p b (d) Two-hop probability: 0.75 > 0.6 Multi-hop probability: larger than 0.75 > 0.6 a c 0.9 0.8 b 0.6 0.6 0.4 0.5 0.8 0.5 e 0.8 f d

Compare operation: Idea: social status has an influence on relay selection. Order the messages based on the contact probability. Only the m-k messages can be exchanged in each contact. m is the number of messages in node a s butter The higher the social status, the less the contact probability matters

Compare operation (cont d) An illustration about compare operation a encounter Destination set {d 1, d 2,, d m } Contact probability {p a (d 1 ), p a (d 2 ),, p a (d m ) } {p b (d 1 ), p b (d 2 ),, p b (d m ) } Probability difference vector { 1, 2,, m } i = p a (d i ) p b (d i ) b kth element partition Destination set {d 1, d 2,, d k } {d (k+1), d (k+2),, d m }

Relay selection criteria Priority buffer exchange Simulation

An example about the compare operation Destination set {d 1, d 2, d 3, d 4, d 5 } Social status 6 9 From node a s view: Destination set {d 1, d 2, d 3, d 4, d 5 } Social status 6 9 Contact probability {0.6, 0.2, 0.7, 0.4, 0.7} {0.4, 1, 0.4, 0.5, 0.6} Probability difference vector {0.2, -0.8, 0.3, -0.1, 0.1} Partition {1, 3} {2, 4, 5}

Priority buffer exchange Within one type of message: Estimate the expected delay The effect of contact probability and social status: Priority setting Balance the and.

Priority buffer exchange Between two types of messages: The relative important factor is considered as. In different scenarios, we have different The delivery cost, such as message size, can also be embedded into Two typical scenarios: Data-first: Acknowledgement-first:

Priority buffer exchange An example Destination set {d 1, d 2, d 3, d 4, d 5 } Partition {1, 3} {2, 4, 5} Priority of the data {5, 4, 3, 2, 1} Priority of the acknowledgement {0, 0.5, 1, 1.5, 0} Buffer size of a node is 4. The number under the destination is the number of messages for that destination respectively. a encounter b Dest. 1 2 3 4 5 Data 1 1 0 0 0 Ack. 0 1 0 1 0 Dest. 1 2 3 4 5 Data 0 0 1 1 1 Ack. 0 0 1 0 0

Priority buffer exchange An example (cont d) a encounter b a encounter b Dest. 1 2 3 4 5 Dest. 1 2 3 4 5 Dest. 1 2 3 4 5 Dest. 1 2 3 4 5 Data 1 1 0 0 0 Data 0 0 1 1 1 Data 1 0 1 0 0 Data 0 1 0 1 1 Ack. 0 1 0 1 0 Ack. 0 0 1 0 0 Ack. 0 1 1 0 0 Ack. 0 0 0 1 0 Before buffer exchange After buffer exchange Sum of delivery probability Node a: 1.4 Node b: 1.9 Sum of delivery probability Node a: 2.2 Node b: 2.6

Multiple-copy single destination Difference: A node can see the duplicated message many times. Idea: Priority decreases as the encounter time increases. Solution: The priority of data i is determined by a tuple <times, P(i)>.

Relay selection criteria Priority buffer exchange Simulation

Synthetic dataset 20 nodes Uniform mobility distribution 5 source nodes and 5 destination nodes. Real trace (Infocom2006): 78 mobile nodes + 20 stable nodes 10 source nodes and 10 destination nodes.

Algorithms: As for relay selection, we compare our algorithm with 1-hop and 2-hop routing. As for the priority, we compare our method with the deadline The combination from above is 6 algorithms.

Delivered The delivered message # of (Number) data 70 60 50 40 30 compare priority compare deadline 1 hop priority 1 hop deadline 2 hop priority 2 hop deadline 20 0 0.2 0.4 0.6 0.8 1 The alpha The alpha The number of delivered acknowledgement Delivered # of ack. 25 20 15 10 5 0 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 The alpha The alpha compare priority compare deadline 1 hop priority 1 hop deadline 2 hop priority 2 hop deadline Along with the increase of alpha, the message delivery ratio decreases, and the ack. delivery ratio increases. Our proposed algorithm achieves the highest delivery ratio

Delivered # of data The delivered message (Number) 120 100 80 60 40 20 0 0.5 1 1.5 2 The alpha The alpha compare priority compare deadline 1 hop priority 1 hop deadline 2 hop priority 2 hop deadline The delivered acknowledgement (Number) Delivered # of ack. 45 40 35 30 25 20 15 10 5 compare priority compare deadline 1 hop priority 1 hop deadline 2 hop priority 2 hop deadline 0 0 0.5 1 1.5 2 The alpha The alpha Along with the increase of alpha, the message delivery ratio decreases, and the ack. delivery ratio increases. Our proposed algorithm achieves the highest delivery ratio

Simulation results: Delivered ratio increase with TTL. The factor alpha can adjust the priority well. Algorithm: Relay selection o Proposed scheme > 2-hop > 1-hop Priority setting o Proposed scheme > deadline driven scheme

We investigate a general scheme for the message dissemination problem in MSNs, considering the time constraint and buffer constraint. A novel localized buffer exchange scheme is proposed to maximize the achievable objective. Two dimensions are jointly considered to evaluate the relay The message type, expected delivery time, and deadline are considered to assign priority.

Thank you, any Questions? Ning Wang ning.wang@temple.edu