1 Exploiting Friendship Relations for Efficient Routing in Mobile Social Networks Eyuphan Bulut, Student Member, IEEE, and Boleslaw K Szymanski, Fellow,

Slides:



Advertisements
Similar presentations
Robin Kravets Tarek Abdelzaher Department of Computer Science University of Illinois The Phoenix Project.
Advertisements

Quality-of-Service Routing in IP Networks Donna Ghosh, Venkatesh Sarangan, and Raj Acharya IEEE TRANSACTIONS ON MULTIMEDIA JUNE 2001.
Supporting Cooperative Caching in Disruption Tolerant Networks
Multicast in Wireless Mesh Network Xuan (William) Zhang Xun Shi.
An Optimal Probabilistic Forwarding Protocol in Delay Tolerant Networks Chan-Myung Kim
University of Waterloo & UOIT & INRIA Lille Presenter: Rongxing Lu
Forwarding Redundancy in Opportunistic Mobile Networks: Investigation and Elimination Wei Gao 1, Qinghua Li 2 and Guohong Cao 3 1 The University of Tennessee,
A Mobile Infrastructure Based VANET Routing Protocol in the Urban Environment School of Electronics Engineering and Computer Science, PKU, Beijing, China.
By Libo Song and David F. Kotz Computer Science,Dartmouth College.
Novel Self-Configurable Positioning Technique for Multihop Wireless Networks Authors : Hongyi Wu Chong Wang Nian-Feng Tzeng IEEE/ACM TRANSACTIONS ON NETWORKING,
Layered Diffusion based Coverage Control in Wireless Sensor Networks Wang, Bang; Fu, Cheng; Lim, Hock Beng; Local Computer Networks, LCN nd.
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
Wei Gao Joint work with Qinghua Li, Bo Zhao and Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University Multicasting.
Detecting Node encounters through WiFi By: Karim Keramat Jahromi Supervisor: Prof Adriano Moreira Co-Supervisor: Prof Filipe Meneses Oct 2013.
© Y. Zhu and Y. University of North Carolina at Charlotte, USA 1 Chapter 1: Social-based Routing Protocols in Opportunistic Networks Ying Zhu and.
Hongyu Gong, Lutian Zhao, Kainan Wang, Weijie Wu, Xinbing Wang
Analyzing Reliability and Validity in Outcomes Assessment (Part 1) Robert W. Lingard and Deborah K. van Alphen California State University, Northridge.
Wei Gao1 and Qinghua Li2 1The University of Tennessee, Knoxville
Deadline-sensitive Opportunistic Utility-based Routing in Cyclic Mobile Social Networks Mingjun Xiao a, Jie Wu b, He Huang c, Liusheng Huang a, and Wei.
Your Friends Have More Friends Than You Do: Identifying Influential Mobile Users Through Random Walks Bo Han, Aravind Srinivasan University of Maryland.
Find regular encounter pattern from mobile users. Regular encounter indicates an encounter trend that is repetitive and consistent. Using this metric can.
Prediction Assisted Single-copy Routing in Underwater Delay Tolerant Networks Zheng Guo, Bing Wang and Jun-Hong Cui Computer Science & Engineering Department,
1 Delay Tolerant Network Routing Sathya Narayanan, Ph.D. Computer Science and Information Technology Program California State University, Monterey Bay.
How Small Labels create Big Improvements April Chan-Myung Kim
Routing In Socially Selfish Delay Tolerant Networks Chan-Myung Kim
Content Sharing over Smartphone-Based Delay- Tolerant Networks.
Gennaro Cordasco - How Much Independent Should Individual Contacts be to Form a Small-World? - 19/12/2006 How Much Independent Should Individual Contacts.
Selfishness, Altruism and Message Spreading in Mobile Social Networks September 2012 In-Seok Kang
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
PRoPHET+: An Adaptive PRoPHET- Based Routing Protocol for Opportunistic Network Ting-Kai Huang, Chia-Keng Lee and Ling-Jyh Chen.
User-Centric Data Dissemination in Disruption Tolerant Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering Pennsylvania State University.
A Sociability-Based Routing Scheme for Delay-Tolerant Networks May Chan-Myung Kim
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
Rate-Based Channel Assignment Algorithm for Multi-Channel Multi- Rate Wireless Mesh Networks Sok-Hyong Kim and Young-Joo Suh Department of Computer Science.
Social-Aware Stateless Forwarding in Pocket Switched Networks Soo-Jin SHIN
Rami Melhem Sameh Gobriel & Daniel Mosse Modeling an Energy-Efficient MAC Layer Protocol.
Joint Replication-Migration-based Routing in Delay Tolerant Networks Yunsheng Wang and Jie Wu Temple University Zhen Jiang Feng Li West Chester Unveristy.
On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay-Tolerant Networks 1 Wei Gao Guohong Cao Tom La Porta Jiawei Han Presented.
November 4, 2003Applied Research Laboratory, Washington University in St. Louis APOC 2003 Wuhan, China Cost Efficient Routing in Ad Hoc Mobile Wireless.
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
© SITILabs, University Lusófona, Portugal1 Chapter 2: Social-aware Opportunistic Routing: the New Trend 1 Waldir Moreira, 1 Paulo Mendes 1 SITILabs, University.
Zijian Wang, Eyuphan Bulut, and Boleslaw K. Szymanski Center for Pervasive Computing and Networking and Department of Computer Science Rensselaer Polytechnic.
An Optimal Probabilistic Forwarding Protocol in Delay Tolerant Networks ACM MobiHoc ’09 Cong Liu and Jie Wu Presenter: Hojin Lee.
Context-aware Adaptive Routing for Delay Tolerant Networking
Route Metric Proposal Date: Authors: July 2007 Month Year
Author:Zarei.M.;Faez.K. ;Nya.J.M.
2010 IEEE Global Telecommunications Conference (GLOBECOM 2010)
Authors: Jiang Xie, Ian F. Akyildiz
Agenda – Morning Session
Delay-Tolerant Networks (DTNs)
DELAY TOLERANT NETWORK
PROVEST: Provenance-based Trust Model for Delay Tolerant Networks
Feng Li, Jie Wu, Avinash Srinivasan
Introduction to Wireless Sensor Networks
Jon Crowcroft Pan Hui Computer Laboratory University of Cambridge
Comp. Lab. Univ. Cambridge
On Growth of Limited Scale-free Overlay Network Topologies
Lei Chen and Wendi B. Heinzelman , University of Rochester
Networks and Communication Systems Department
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
En Wang 1,2 , Yongjian Yang 1 , and Jie Wu 2
Effective Replica Allocation
Spectrum Sharing in Cognitive Radio Networks
Analyzing Reliability and Validity in Outcomes Assessment
Route Metric Proposal Date: Authors: July 2007 Month Year
Ling-Jyh Chen and Ting-Kai Huang
PPWEB: A Peer-to-Peer Approach for Web Surfing On the Go
On Constructing k-Connected k-Dominating Set in Wireless Networks
Data Communication: Routing algorithms
2019/9/14 The Deep Learning Vision for Heterogeneous Network Traffic Control Proposal, Challenges, and Future Perspective Author: Nei Kato, Zubair Md.
Presentation transcript:

1 Exploiting Friendship Relations for Efficient Routing in Mobile Social Networks Eyuphan Bulut, Student Member, IEEE, and Boleslaw K Szymanski, Fellow, IEEE

CONTENTS INTRODUCTION THE PROPOSED ALGORITHM FRIENDSHIP COMMUNITY FORMATION FORWARDING ALGORITHM EVALUATIONS SIMULATION RESULTS DISCUSSIONS AND FUTURE WORK CONCLUSION REFERENCES

INTRODUCTION Delay Tolerant Networks (DTN) are a class of wireless networks. These networks are usually sparse and the connection between their nodes changes frequently. Real life examples of DTNs, mobile social net- works (MSN).Due to the challenging network environment in these networks, efficient routing of messages is not an easy task. The relationship defining the frequency and duration of the connectivity between nodes has to be analyzed to route messages efficiently. exploiting friendship based social network features of an MSN, we present a new routing algorithm: Friendship Based Routing. To analyze social relations between nodes (i.e. people), we need to define their friendships in terms of their behaviors.

Friendship Based Routing To analyze social relations between nodes (i.e. people), we need to define their friendships in terms of their behaviors. A new metric measuring different aspects of friendship behavior fromthe encounter history of nodes need to be introduced. Utilizing this metric, we find both the direct and indirect close friends of each node we present Friendship Based Routing in which periodically differentiated friendship relations are used in forwarding of messages

THE PROPOSED ALGORITHM Analysis of Node Relations The intermittent connectivity between nodes in an MSN makes the routing of messages possible only in opportunistic manner. message exchanges occur only when two nodes come within the range of each other and one of them assesses that the other has higher delivery chance than itself. The link quality between each pair of nodes needs to be estimated accurately to consider the possible forwarding opportunity arising from the encounter.

Six different encounter histories between nodes i and j in the time interval [0, T]. All these metrics have some deficiencies in accurate representation of forwarding opportunity arising from encounters between nodes.

To find a link metric that reflects the node relations more accurately,considered the following three behavioral features of close friendships: high frequency, longevity, and regularity Frequency refers to average intermeeting time while regularity refers to the variance of the intermeeting time. New metric called social pressure metric (SPM) is a measure of a social pressure that motivates friends to meet to share their experiences The average message forwarding delay to node j if node i had a new message destined to node j at each time unit when the time unit tends to zero. The link quality (wi,j ) between each pair as the inverse of this value. f(t) represents the time remaining to the next encounter of the two nodes at time t

The larger the value of wi,j , the closer the friendship (the higher the forwarding opportunities) between nodes i and j Increasing the time the nodes are in contact decreases SPM as does equalizing the time between encounters. Splitting the inter-meeting times into larger number of smaller pieces also decreases the SPM SPM is computed from the history of the encounters of the node. As additional node encounters happen, the corresponding SPM value is updated easily.

FRIENDSHIP COMMUNITY FORMATION Using its encounter history, each node can compute qualities (wi,j values) of its links with other nodes. Friendship community is a set of nodes having a link quality with itself larger than a threshold(τ).This set will include only direct friends. Relations between nodes may show periodic changes. Both strong indirect relationships and periodic variations of relationships must be addressed when forming friendship communities.

Handling Indirect Relationships To find indirect friendships between nodes in a way relevant for routing, we propose to use relative SPM (RSPM) metric. Encounter history between nodes i and j (upper diagram) and between nodes j and k (lower diagram) in the same time interval [0, T]

Duration of this stages are ta,x and tb,x Duration of this stages are ta,x and tb,x. x denotes the number of indirect information passing occurring. There are three full information passing sessions between nodes i and k via node j, and the beginning of the fourth one. Denoting the number of such sessions as n, RSPMi,k|j is computed as: Since the intermediate node, j, records all of its past contact times with i and k, it can compute the value of RSPM

In Algorithms 1-3, we give the details of computation of SPM and RSPM values from a node’s point of view. At the beginning, each node j initializes its parameters as described in Algorithm1. when a new node m is encountered, it updates the value of SPM[m] and for each of its other contacts, i, it updates the value of RSPM[i][m] if node m is encountered first time after its meeting with node i (Algorithm 2) When the meeting of a node with another node m ends, it also updates the value of SPM[m] and sets the end time of current ta(m, k) and start time of next tb(m, k) to the current time t for each of its other contacts k (Algorithm 3).

In an MSN, each node can detect its direct friend ships from its own history (by computing SPM values). To detect indirect friendships, a node needs RSPM values from its friends. Once such RSPM values are received and updated at the encounter times with its friends Each node can form its friendship community using the following definition: where wi,j,k = 1/RSPMi,k|j . The above equation enables nodes to detect their one-hop direct and two-hop indirect friends.

Handling Periodic Variation in Node Relations Node relations in an MSN often change with time periodically. Such periodic changes must be addressed for accurate computation of link qualities between nodes. To reflect the periodic variation of the strength of friendship, we propose to use periodic friendship communities in our protocol. Each node i computes its Fi for different periods of the day and has different friendship communities in different periods

The encounter history has to be updated for each period Corresponding periods of the contact history in a day (global time) are concatenated to form the updated contact history of a period (local time)

In Algorithm 4, we show how each period forms and maintains its own contact history as the events (neighbor detection or neighbor leaving) occur in global time. Once each node generates an event handler for each of its periods with given start and end indexes .local contact history for each period can be generated following the steps in Algorithm 4 First the global time of the event is converted to local time (in seconds) using the update time() method (Algorithm 5), then with the help of a stack, the start and end times of contacts within the period are detected In Algorithm 4, when the event handler of a period notices that a full encounter according to the local clock of the period has finished, it calls neighborDetected() (Algorithm 2) and neighborLeft() (Algorithm 3) methods to compute the SPM and RSPM values within the period

FORWARDING ALGORITHM After a node constructs its friendship community for each period based on its current encounter history, it decides whether to forward a message to the encountered node node i having a message for node d meets with node j, it forwards the message to j if and only if node j’s friendship community (Fj(pid)) in the current period pid includes node d and node j is a stronger friend of node d than node i is. if node j has a stronger link with node d than node i has, if node j does not include d in its current friendship community (i.e. weight of link between j and d is less than ), node i will not forward the message to node j.

EVALUATIONS Data Sets Real DTN Traces MIT Reality Dataset Haggle Project Dataset Synthetic Mobility Traces

Haggle Project Dataset MIT Reality Dataset it consists of the traces of 97 Nokia 6600 smart phones which were carried by students and staff at MIT over nine months. In our simulations, we used the contacts logged during a three month period from the beginning of February to the end of April. This is the time of the second academic semester where human relations are relatively stable and participants are active on campus Haggle Project Dataset consists of many traces from different experiments. .We selected theBluetooth sightings recorded between the iMotes carried by 41 attendants of Infocom 2005 Con-ference held in Miami. Devices were distributed on March 7th, 2005 between lunch time and 5 p.m. and collected on March 10th, 2005 in the afternoon.

In evaluations, we use the following three metrics: Algorithms in Comparison and Performance Metrics In simulations, we compare the proposed routing algorithm with three other benchmark algorithms prophet SimBet Fresh In evaluations, we use the following three metrics: message delivery ratio average cost routing efficiency.

Simulation Comparison of algorithms using MIT traces

Comparison of algorithms using Synthetic traces

Results

DISCUSSIONS AND FUTURE WORK Complexity of the Algorithm The Effects of Number of Periods and Thresholds Extension of the Algorithm

2626 CONCLUSION First, we introduce a new metric to detect friendship based node relations accurately. . We also treat indirect relations between nodes novel way making them amenable to routing we present a new routing algorithm in which a node forwards its messages to those nodes that contain the destination node in their friendship communities We evaluate the proposed algorithm through simulations using two real DTN traces and a synthetic data The results show that our algorithm performs better than three benchmark algorithms proposed previously.

REFERENCES T. Spyropoulos, K. Psounis,C. S. Raghavendra, Efficient routing in intermittently connected mobile networks: The single-copy case,IEEE/ACM Transactions on Networking, vol. 16, no. 1, Feb.2008 E. P. C. Jones, L. Li, and P. A. S. Ward, Practical routing in delay tolerant networks, in Proceedings of ACM SIGCOMM workshop on Delay Tolerant Networking (WDTN), 2005. Y. Wang, S. Jain, M. Martonosi, and K. Fall, Erasure-coding based routing for opportunistic networks, in Proceedings of ACM SIGCOMM Workshop on Delay-Tolerant Networking, 2005.

2828 THANK YOU THANK YOU 

? ? ?