MoB: A Mobile Bazaar for Wide Area Wireless Services. R.Chakravorty, S.Agarwal, S.Banerjee and I.Pratt mobicom 2005

Similar documents
P1: OKZ SJNW NO stylec.cls (2005/11/03 v1.0 LaTeX2e Springer document class) August 26, :6

Two Systems to Restructure Mobile Wireless Services

LTE and IEEE802.p for vehicular networking: a performance evaluation

LTE : The Future of Mobile Broadband Technology

Octoshape. Commercial hosting not cable to home, founded 2003

CSMA based Medium Access Control for Wireless Sensor Network

P2P. 1 Introduction. 2 Napster. Alex S. 2.1 Client/Server. 2.2 Problems

Mobile Ad Hoc Networks: Basic Concepts and Research Issues

Wireless networks: from cellular to ad hoc

DELIVERING MULTIMEDIA CONTENT FOR THE FUTURE GENERATION MOBILE NETWORKS

Mobile Computing Introduction

Network Support for Multimedia

Overview. M-commerce vs. E-commerce

Peer to Peer Infrastructure : QoS enabled traffic prioritization. Mary Barnes Bill McCormick

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

CS519: Computer Networks. Lecture 5, Part 5: Mar 31, 2004 Queuing and QoS

Interdomain Routing Design for MobilityFirst

Protecting Network Quality of Service Against Denial of Service Attacks

An Architecture for Personal Broadband. Broadband Working Group Elisabeth Maida, MIT May 25, 2006

Efficient Internet Routing with Independent Providers

Main area: Security Additional areas: Digital Access, Information Literacy, Privacy and Reputation

Truffle Broadband Bonding Network Appliance

GPRS and UMTS T

QUICK REFERENCE GUIDE

Agenda. What are we looking at? Introduction. Aim of the project. IP Routing

Wireless Wireline Convergence. Tod Sizer, Director Broadband and Wireless Research Center Bell Laboratories

Trends in WISP Backhaul. Christopher Geerdts

ARPA Mobile Information Systems Applications Workshop December 7-8, Mobile Networking

Fixed Mobile Convergence

CSE 123A Computer Netwrking

Game Traffic Analysis: An MMORPG Perspective

CSE 123b Communications Software

Quick announcements. CSE 123b Communications Software. Today s issues. Last class. The Mobility Problem. Problems. Spring 2004

Tiscali Business Services Wholesale IPVPN Services Summary

IEEE C /08

Quality-of-Service Option for Proxy Mobile IPv6

IPv6-based Beyond-3G Networking

New Value Chain through Service Platform

Roaming Among and Between WLAN Hotspots and CDMA2000

Emerging Trends and Opportunities

Interconnection and Roaming. Interconnection Business interfaces in Internet

ALL SAINTS COLLEGE OF TECHNOLOGY, BHOPAL

EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Overlay Networks: Motivations

Name Student ID Department/Year. Final Examination. Introduction to Computer Networks Class#: Fall :20-11:00 Tuesday January 13, 2004

NaaS Network-as-a-Service in the Cloud

IS THE INTERNET MOBILE?

Overview of Wi-Fi. Dr. Srikanth Subramanian CKO, Nanocell Networks Wi-Fi A Wireless Success Story

Computer Science 461 Final Exam May 22, :30-3:30pm

Wireless Technology Supported by SMBs

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.

Fundamental Issues. System Models and Networking Chapter 2,3. System Models. Architectural Model. Middleware. Bina Ramamurthy

Network Vision: Preparing Telefónica for the next generation of services. Enrique Blanco Systems and Network Global Director

Using Low-Speed Links for High-Speed Wireless Data Delivery

Lecture 14: Performance Architecture

4G Mobile Communications

MultiNet: Connecting to Multiple IEEE Networks Using a Single Wireless Card IEEE INFOCOM 2004

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks

Reliable and Efficient flooding Algorithm for Broadcasting in VANET

Communications Software. CSE 123b. CSE 123b. Spring Lecture 10: Mobile Networking. Stefan Savage

Quick announcement. CSE 123b Communications Software. Last class. Today s issues. The Mobility Problem. Problems. Spring 2003

Mobile Security Fall 2012

Wireless Network Security Spring 2013

of WebRTC-based Video Conferencing

ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols

Whither the Mobile Internet: Storage and Mobile Internets

Doctoral Written Exam in Networking, Fall 2008

Nissan Carwings connects driver to the world. Kenji Ikeura Nissan Motor Co., Ltd.

Cache and Forward Architecture

P2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli

Overlay Networks: Motivations. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Motivations (cont d) Goals.

Strengthening Unlicensed Band Wireless Backhaul

Eliminating Handoff latencies in WLANs using Multiple Radios: Applications, Experience, and Evaluation

Etiquette protocol for Ultra Low Power Operation in Sensor Networks

WHITE PAPER. Mobility Services Platform (MSP) Using MSP in Wide Area Networks (Carriers)

Mobility and Media. How mobile computing is evolving at HP. Mark Smith Mobile and Media Systems Lab Hewlett Packard Laboratories

Wireless Network Security Spring 2014

1xEV Opportunities in Broadband Workshop

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Concepts, Technology, and Applications of Mobile Commerce

INTRODUCTION TO WIRELESS COMMUNICATION

Wireless Ad-Hoc Networks

Context-Aware Network Stack Optimization

MEASUREMENT STUDY OF A P2P IPTV SYSTEM: SOPCAST

Lecture 21 P2P. Napster. Centralized Index. Napster. Gnutella. Peer-to-Peer Model March 16, Overview:

On the Internet, nobody knows you re a dog.

Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM)

Multimedia Document Communications over Wireless Network

> *** Strengths: What are the major reasons to accept the paper? [Be brief.]

SocialLink: Utilizing Social Network and Transaction Links for Effective Trust Management in P2P File Sharing Systems

Enhanced Power Saving Scheme for IEEE DCF Based Wireless Networks

SmartSiren: Virus Detection and Alert for Smartphones. Jerry Cheung, Starsky Wong, Hao Yang and Songwu Lu MOBISYS 2007

Crash Course in Wireless Video

Cooperative Mobile Internet Access with Opportunistic Scheduling

OSCAR: A Collaborative Bandwidth Aggregation System

Bi-directional Route Optimization in Mobile IP Over Wireless LAN

1-1. Switching Networks (Fall 2010) EE 586 Communication and. September Lecture 10

What s the magic of real-time video streaming with hyper-low latency?

Demonstration of Remote Wireless Access to a Database for Communicating Water Quality Data

09. Mobile Commerce. Contents. Mobile Computing and Commerce

JAVA IEEE TRANSACTION ON CLOUD COMPUTING. 1. ITJCC01 Nebula: Distributed Edge Cloud for Data Intensive Computing

Transcription:

MoB: A Mobile Bazaar for Wide Area Wireless Services R.Chakravorty, S.Agarwal, S.Banerjee and I.Pratt mobicom 2005

What is MoB? It is an infrastructure for collaborative wide-area wireless data services. Mobile users can trade services with each other in a wide area network setting. This allows a decoupling of services and infrastructure provisioning I don t have to necessarily obtain everything from the Internet via my infrastructure provider. I could rely on other mobile devices to help me.

Contributions in Brief The authors present a new open market architecture that allow mobile users to trade various services in a flexible manner. They address issues such as billing, security, etc. They do an implementation of the architecture (as a middleware). Augment the implementation with simulations to provide additional insight.

Roadmap Motivation for MoB and possibility of fine grained service provisioning. The Architecture Examples of operations. Some Implementation details Results Conclusions

The High Level Problem Cellular coverage is adequate at best. Public WLAN hotspots are also emerging --using these one can connect to the Internet -- however coverage is spotty. Typically, users connect to the networks provided by their infrastructure providers (such as T-Mobile). These are long term relationships. Connectivity problems are location and provider specific -- these can result in poor performance of most Internet protocols (as we all know). Can users obtain services on a fine-grained basis?

What does MoB give? MoB -- standing for Mobile bazaars tries to provide an open market. It supports collaboration to improve data services. The key features are: It decouples infrastructure providers from service provisioning and thus enable fine grained competition. Allows service interactions on finer grained (they claim arbitrary) timescales Promotes flexible composition of these fine-grained service interactions based on user needs.

Coffee Shop Study There could be users who spend long durations in coffee shops! Significant opportunities for MoB interactions

An Example C1 is the customer device. Others (called traders)-- T1 is a 3G enabled cell phone, T2 is a PDA that connects through a WLAN Infrastructure (Boingo Wireless) etc. The traders are idle. C1 chooses a subset of the traders and uses them as if they were its own interfaces. C1 achieves high bandwidth due to aggregation, T1 and T3, their revenue.

Example Continued Notice -- we need Vito -- a reputation and trust management system, a Billing and Accounting System and a proxy that allows the application layer packets to be spliced between three networks. Also note that these are connected to the Internet. Finally, note that different networks are possible.

Services with MoB Bandwidth Aggregation (as seen before). Location determination -- a mobile user carrying a PDA with street map software can provide this to other users. Time Synchronization -- important in wireless gaming-- each gaming device connects to a cellphones using a common provider and acquire timing from these. Web Proxy Caching -- locally stored web pages may be faster to get.

More Services with MoB Media streaming -- high bandwidth video applications may be striped over multiple interfaces to improve user performance. Peer to Peer data search: A downloader from Kazaa or Gnutella may suffer poor connectivity and thus suffer loss of performance and monetary costs over cellular links. Traffic Filtering: The MoB trader can also filter and remove malicious content targeted at the end user.

Some Key Issues Single hop or multihop Multi-hop possible. However, since MoB is application layer, the connections need to be independent on each of the hops. How would you go about doing pricing? How would you choose the MoB traders? A system that is fixed -- they call the reputation system Vito -- similar to ebay. Each user has an ability to rate the MoB trader with which it had an interaction. The billing system is also on the fixed Internet.

Pricing and Reputation Individual traders can name their own price (as in ebay) --however, intelligent traders will consider the competitive forces in the market. The authors propose Vito -- a system that is based on what is in ebay. The idea is that ebay has been largely successful due to its reputation management system.

In summary MoB has the following features: Open market architecture -- flexibility, fine grained service provisioning. Better performance through Wireless diversity. Incentive-based collaboration. Customization and support for diverse applications.

The MoB architecture It has three basic components: An infrastructure that allows wireless devices to connect to the Internet -- cellular, WLAN, or any combination thereof. Mobile devices with the ability to communicate with each other and with the infrastructure. (Key!) third party services for accounting and billing as well as for reputation and trust management.

Sequence of Operations

Reputation and Vito Each user registers with Vito and obtains a reputation certificate (has a timestamp). This certificate has to be provided to customers. Negotiated price can depend on reputation. Note that the reputations are then refreshed at a later time to Vito. Vito will periodically distribute reputation certificates.

Service Location Protocol The authors suggest that the service location protocol be used for transactions. To request a service SLP Agent sends a service request to the SLP multicast address 239.255.255.253 and port 427 with a TTL of 1. A response includes the trader s certificate, a price quote and the service description. The customer can choose the right service based on the responses received. Straightforward -- I won t go into it.

Feedback Again straightforward. Payment in the form of a token prior to service (else, it is difficult to determine if the customer will pay). If service is not delivered, can report to the billing and accounting system. Each party has an opportunity to rate the other on Vito. Vito charges a transaction fee -- can discourage fake reputation uploads etc.

Implementation Implemented as a middleware. Connection manager -- provides the interface with applications. Cache manager -- check for locally stored objects. Stripe manager -- stripes between different networks. Transport layer typically TCP

Neighbor Discovery Via link-specific mechanisms as provided by various wireless interfaces. In 802.11, the authors set aside one channel for neighbor discovery. In tranquil state, MoB device monitors traffic on this channel --announcements are sent as well periodically -- SSID set to MoB and the mode to ad hoc. With Bluetooth (the authors perform experiments with this) -- the device initiates a scan procedure to detect other MoB devices at large. I will skip the few details that are provided in the paper.

Evaluations A full implementation. Bluetooth, 802.11a, 802.11b and 3G EVDO and 3G 1xRTT data services were also used. They look at File transfer, Web browsing and data aggregation via media streaming. They also do simulations for other things (such as location determination).

The set up

Example Scenario 1 Single customer C, using a Bluetooth wireless interface with two mobile traders T1 and T2. T1 has a CDMA 1xRTT interface (max rate 144 Kbps and uplink data rate of 64 Kbps) and T2 has a CDMA -EVDO (maximum downlink data rate of 2.4 Mbps and uplink data rate of 153 Kbps). Initially, only T1 is in range of C Later T2 moves into range. Finally, T1 moves out of range.

Example Scenario 2 The idea is to show the impact of mobility (churn) on Gnutella and Kazaa applications. High churn -- potential trader stays in customer s range for 10-20 seconds. Medium churn -- trader stays in range for 40-60 seconds. Low churn -- trader stays in range for 60-120 seconds. No churn. Customer locates a trader device that has the queried data object and starts block-based data download. If trader moves out, then, a search occurs for a new (alternate) trader. In their study they use a 5 MB (audio MP3) file -- block sizes are varied.

Example Scenario 2 (cont) Block size important. If it is large, then customer pays all at once and if there is a problem, then liability becomes an issue. Second, smaller block sizes can lead to more parallel downloads. Note -- optimal block size depends on churn. If no churn, a smaller block size -- higher overhead -- more time taken. For higher churn, there is an optimal since if block size is large, trader may move out.

Other experiments I won t go over other experiments. However, they are similar in spirit. The authors also look at how web downloads can be done more efficiently using collaborative caching (nodes have cached pages). They do simulations with regards to location accuracy -- how can they obtain location info from GPS equipped devices -- for this simulation, it seems that they simulate the Manhattan street network -- roads and vehicles in mid-town Manhattan.

Evaluating Vito Based on simulations. Different policies considered for choosing traders: Reputation Price Price with reputation threshold Ratio of Reputation to Price.

Price Changes A price reduction factor γ and a price increment factor λ. When a user does not get chosen, he lowers the price p by the factor γp for the next service offering. Similarly, if a user gets chosen, he increases the price by λp for the next offering. Note -- the values of γ and λ are arbitrary.

Sample Results

What did I learn? A complete system design taking into account the intricacies of system interactions (even if some details are missing) is of interest. Application driven -- could be something that we want to think about. What are the implementation challenges? TCP Impact of mobility on striping

Comments?