Are You moved by Your Social Network Application? Abderrahmen Mtibaa, Augustin Chaintreau, Jason LeBrun, Earl Oliver, Anna-Kaisa Pietilainen, Christophe.

Slides:



Advertisements
Similar presentations
Low Overhead With Speed Aware Routing (LOWSAR) in VANETs By Kannikar Siriwong Na Ayutaya.
Advertisements

MobiClique: Middleware for Mobile Social Networking Anna-Kaisa Pietilainen (Thomson), with Earl Oliver (University of Waterloo), Jason LeBrun (UC Davis),
Cristian Lumezanu Neil Spring Bobby Bhattacharjee Decentralized Message Ordering for Publish/Subscribe Systems.
Supporting Cooperative Caching in Disruption Tolerant Networks
1 Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces Dmitri Krioukov CAIDA/UCSD Joint work with F. Papadopoulos, M.
Analysis and Modeling of Social Networks Foudalis Ilias.
1 K-clustering in Wireless Ad Hoc Networks Fernandess and Malkhi Hebrew University of Jerusalem Presented by: Ashish Deopura.
SILVIO LATTANZI, D. SIVAKUMAR Affiliation Networks Presented By: Aditi Bhatnagar Under the guidance of: Augustin Chaintreau.
Networks. Graphs (undirected, unweighted) has a set of vertices V has a set of undirected, unweighted edges E graph G = (V, E), where.
Forwarding Redundancy in Opportunistic Mobile Networks: Investigation and Elimination Wei Gao 1, Qinghua Li 2 and Guohong Cao 3 1 The University of Tennessee,
1 Sensor Relocation in Mobile Sensor Networks Guiling Wang, Guohong Cao, Tom La Porta, and Wensheng Zhang Department of Computer Science & Engineering.
Multicasting in Mobile Ad-Hoc Networks (MANET)
Are You Moved by Your Social Network Application? Gregory Peaker.
Scribe: A Large-Scale and Decentralized Application-Level Multicast Infrastructure Miguel Castro, Peter Druschel, Anne-Marie Kermarrec, and Antony L. T.
Mobile Agents for Adaptive Routing Presented by Hong-Jiun Chen & Manu Prasanna Gianni Di Caro & Marco Dorigo.
Semantic text features from small world graphs Jure Leskovec, IJS + CMU John Shawe-Taylor, Southampton.
Opportunistic Networking (aka Pocket Switched Networking)
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Dept. of Computer Science Distributed Computing Group Asymptotically Optimal Mobile Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
Dynamic Medial Axis Based Motion Planning in Sensor Networks Lan Lin and Hyunyoung Lee Department of Computer Science University of Denver
1 Load Balance and Efficient Hierarchical Data-Centric Storage in Sensor Networks Yao Zhao, List Lab, Northwestern Univ Yan Chen, List Lab, Northwestern.
Routing.
Spring Routing & Switching Umar Kalim Dept. of Communication Systems Engineering 06/04/2007.
1 Load Balance and Efficient Hierarchical Data-Centric Storage in Sensor Networks Yao Zhao, List Lab, Northwestern Univ Yan Chen, List Lab, Northwestern.
Routing Protocol Pertemuan 21 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 21 Introduction to Computer Networks.
1 Chapter 10 Introduction to Metropolitan Area Networks and Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
CS 453 Computer Networks Lecture 24 IP Routing. See…
© Y. Zhu and Y. University of North Carolina at Charlotte, USA 1 Chapter 1: Social-based Routing Protocols in Opportunistic Networks Ying Zhu and.
A Distributed and Privacy Preserving Algorithm for Identifying Information Hubs in Social Networks M.U. Ilyas, Z Shafiq, Alex Liu, H Radha Michigan State.
Pocket Switched Networks: Real-world Mobility and its Consequences for Opportunistic Forwarding Jon Crowcroft,Pan Hui (Ben) Augustin Chaintreau, James.
Introduction to Routing and Routing Protocols By Ashar Anwar.
1 Pertemuan 20 Teknik Routing Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
Hongyu Gong, Lutian Zhao, Kainan Wang, Weijie Wu, Xinbing Wang
Hop-limited flooding over dynamic networks M. Vojnović and A. Proutiere Microsoft Research IEEE Infocom 2011, Shanghai, April 2011.
Deadline-sensitive Opportunistic Utility-based Routing in Cyclic Mobile Social Networks Mingjun Xiao a, Jie Wu b, He Huang c, Liusheng Huang a, and Wei.
Multicast Routing in Mobile Ad Hoc Networks (MANETs)
Rate-based Data Propagation in Sensor Networks Gurdip Singh and Sandeep Pujar Computing and Information Sciences Sanjoy Das Electrical and Computer Engineering.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer.
Structural Properties of Networks: Introduction Networked Life NETS 112 Fall 2015 Prof. Michael Kearns.
Distributed Avatar Management for Second Life Matteo Varvello (Eurecom-Thomson) With Stefano Ferrari (Eurecom-Thomson), Ernst Biersack (Eurecom) Christophe.
Selfishness, Altruism and Message Spreading in Mobile Social Networks September 2012 In-Seok Kang
Peer Centrality in Socially-Informed P2P Topologies Nicolas Kourtellis, Adriana Iamnitchi Department of Computer Science & Engineering University of South.
Algorithms for Biological Networks Prof. Tijana Milenković Computer Science and Engineering University of Notre Dame Fall 2010.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. © The McGraw-Hill Companies, Inc. Internetworking, WANs, and Dynamic Routing.
1 Computer Communication & Networks Lecture 21 Network Layer: Delivery, Forwarding, Routing Waleed.
Teknik Routing Pertemuan 10 Matakuliah: H0524/Jaringan Komputer Tahun: 2009.
© 2008 Frans Ekman Mobility Models for Mobile Ad Hoc Network Simulations Frans Ekman Supervisor: Jörg Ott Instructor: Jouni Karvo.
Mobility Models for Wireless Ad Hoc Network Research EECS 600 Advanced Network Research, Spring 2005 Instructor: Shudong Jin March 28, 2005.
COS 420 Day 15. Agenda Finish Individualized Project Presentations on Thrusday Have Grading sheets to me by Friday Group Project Discussion Goals & Timelines.
1 Finding Spread Blockers in Dynamic Networks (SNAKDD08)Habiba, Yintao Yu, Tanya Y., Berger-Wolf, Jared Saia Speaker: Hsu, Yu-wen Advisor: Dr. Koh, Jia-Ling.
Spring 2000CS 4611 Routing Outline Algorithms Scalability.
Routing Protocols COSC 541 Data Commun. System & Networks Yue Dou.
Routing in Delay Tolerant Network Qing Ye EDIFY Group of Lehigh University.
Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network You-Chiun Wang, Chun-Chi Hu, and Yu-Chee Tseng IEEE Transactions on Mobile Computing.
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
Structural Properties of Networks: Introduction
Structural Properties of Networks: Introduction
Distributed voting application for handheld devices
Routing.
Structural Properties of Networks: Introduction
Network Science: A Short Introduction i3 Workshop
A Scalable content-addressable network
Robustness of wireless ad hoc network topologies
Department of Computer Science University of York
Robustness of wireless ad hoc network topologies
Korea University of Technology and Education
Routing.
2019/9/14 The Deep Learning Vision for Heterogeneous Network Traffic Control Proposal, Challenges, and Future Perspective Author: Nei Kato, Zubair Md.
Presentation transcript:

Are You moved by Your Social Network Application? Abderrahmen Mtibaa, Augustin Chaintreau, Jason LeBrun, Earl Oliver, Anna-Kaisa Pietilainen, Christophe Diot Thomson Paris Research Lab Avinash Patlolla

Outline Introduction ◦ Motivation Experimental setup Terminology and Definitions Topological comparisons ◦ Node properties ◦ Contact properties ◦ Path properties Social forwarding paths Summary and critiques

Outline Introduction ◦ Motivation Experimental setup Terminology and Definitions Topological comparisons ◦ Node properties ◦ Contact properties ◦ Path properties Social forwarding paths Summary and critiques

Introduction Before the Internet: socialize by physical meeting Today: Internet allows “virtual” socializing Tomorrow: Meet the virtual community using opportunistic contacts and locality

Motivation Explore the relation between virtual social interactions and human physical meetings Understand complex temporal properties based on simple social properties Forwarding based on social network properties

Outline Introduction ◦ Motivation Experimental setup Terminology and Definitions Topological comparisons ◦ Node properties ◦ Contact properties ◦ Path properties Social forwarding paths Summary and critiques

Experimental Setup Distributed smartphones with mobile opportunistic social networking application to 28 participants (but later reduced to 27) 3 days experiment at CoNext December ‘07 Initially, each participant was asked to identify friends among the 150 CoNext participants. Applications: ◦ Opportunistic socializing: make new friends based on friends ◦ Asynchronous messaging

Outline Introduction ◦ Motivation Experimental setup Terminology and Definitions Topological comparisons ◦ Node properties ◦ Contact properties ◦ Path properties Social forwarding paths Summary and critiques

Terminology and Definitions Social graph: Graph of friendship between participants. Denoted as G = (V, E) Contact graph: Collection of opportunistic Bluetooth contacts between the participants form the temporal network, which is called contact graph. Denoted as G t = (V, E t ) Delay- optimal path: A path, in contact graph, from s to d starting at time t0 is delay- optimal if it reaches the destination d in the earliest possible time. The delay optimal path can be computed via dynamic programming

Outline Introduction ◦ Motivation Experimental setup Terminology and Definitions Topological comparisons ◦ Node properties ◦ Contact properties ◦ Path properties Social forwarding paths Summary and critiques

Topological comparison Initial GraphFinal Graph # nodes # edges Average degree Diameter

Node properties Characterize Node heterogeneity ◦ High/low activity ◦ Popularity ◦ Contact rate Two metrics are measured ◦ Node degree  Social graph: number of friends  Contact graph: average number of devices seen per scan (every 2 min.) ◦ Centrality of nodes:  Social graph: measure the occurrence of the node inside all shortest paths  Contact graph: measure the occurrence of the node at each time t inside all shortest paths

Node degree Ordering error =

Centrality of nodes

Contact properties Compare contact according to: ◦ Social distance (friends have distance 1, friends of friends of friends have distance 2 and so on) ◦ time between two successive contacts

Path properties Delay-optimal paths as a function of the social distance between the source and the destination

Outline Introduction ◦ Motivation Experimental setup Terminology and Definitions Topological comparisons ◦ Node properties ◦ Contact properties ◦ Path properties Social forwarding paths Summary and critiques

Social forwarding paths General model: depending on the source s and the destination d, a rule defines a subset of directed pairs of nodes (u  v) so that only the contacts occurring for pairs in the subset are allowed in forwarding path. Path construction rules: ◦ neighbor(k): (u  v) is allowed if and only if u and v are within distance k in the social graph ◦ destination-neighbor(k): (u  v) is allowed if and only if v is within distance k of d ◦ non-decreasing-centrality: (u  v) is allowed if and only if C(u) <= C(v) ◦ non-increasing-distance: (u  v) is allowed if and only if the social distance from v to d is no more than the one from u to d

Performance of different path construction rule

Comparison of rules The neighbor rule performs reasonably well The rule based on centrality outperforms all the other rules considered The combination of neighbor and centrality rules reduce the cost (offers best trade-off)

Outline Introduction ◦ Motivation Experimental setup Terminology and Definitions Topological comparisons ◦ Node properties ◦ Contact properties ◦ Path properties Social forwarding paths Summary and critiques

Summary and Critiques Similarity in the properties of nodes, contacts and paths in the two graphs Highlighted the importance of centrality of nodes Using social neighbors to communicate can be effective to exchange messages with opportunistic bandwidth Critiques: ◦ Important issues not yet studied, like computing centrality of nodes in a distributed manner. ◦ Scalability and usability ◦ Not many technical details

References Questions???