Are You Moved by Your Social Network Application? Gregory Peaker.

Slides:



Advertisements
Similar presentations
Mobility Entropy and Message Routing in Community-Structured Delay Tolerant Networks Hideya Ochiai Hiroshi Esaki The University of Tokyo / NICT Asia Future.
Advertisements

1 Routing Protocols I. 2 Routing Recall: There are two parts to routing IP packets: 1. How to pass a packet from an input interface to the output interface.
Supporting Cooperative Caching in Disruption Tolerant Networks
Mobility Increase the Capacity of Ad-hoc Wireless Network Matthias Gossglauser / David Tse Infocom 2001.
1 Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces Dmitri Krioukov CAIDA/UCSD Joint work with F. Papadopoulos, M.
A Presentation by: Noman Shahreyar
Queuing Network Models for Delay Analysis of Multihop Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute.
Rumor Routing in Sensor Networks David Braginsky and Deborah Estrin Presented By Tu Tran 1.
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
Identity and search in social networks Presented by Pooja Deodhar Duncan J. Watts, Peter Sheridan Dodds and M. E. J. Newman.
Common approach 1. Define space: assign random ID (160-bit) to each node and key 2. Define a metric topology in this space,  that is, the space of keys.
A Novel Cluster-based Routing Protocol with Extending Lifetime for Wireless Sensor Networks Slides by Alex Papadimitriou.
Forwarding Redundancy in Opportunistic Mobile Networks: Investigation and Elimination Wei Gao 1, Qinghua Li 2 and Guohong Cao 3 1 The University of Tennessee,
Are You moved by Your Social Network Application? Abderrahmen Mtibaa, Augustin Chaintreau, Jason LeBrun, Earl Oliver, Anna-Kaisa Pietilainen, Christophe.
Network Correlated Data Gathering With Explicit Communication: NP- Completeness and Algorithms R˘azvan Cristescu, Member, IEEE, Baltasar Beferull-Lozano,
Scribe: A Large-Scale and Decentralized Application-Level Multicast Infrastructure Miguel Castro, Peter Druschel, Anne-Marie Kermarrec, and Antony L. T.
Routing Strategies Fixed Routing
More routing protocols Alec Woo June 18 th, 2002.
Scalable Application Layer Multicast Suman Banerjee Bobby Bhattacharjee Christopher Kommareddy ACM SIGCOMM Computer Communication Review, Proceedings of.
Small Worlds and the Security of Ubiquitous Computing From : IEEE CNF Author : Harald Vogt Presented by Chen Shih Yu.
Teknik Routing Pertemuan 20 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
Dept. of Computer Science Distributed Computing Group Asymptotically Optimal Mobile Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
LPT for Data Aggregation in Wireless Sensor networks Marc Lee and Vincent W.S Wong Department of Electrical and Computer Engineering, University of British.
Bluenet a New Scatternet Formation Scheme * Huseyin Ozgur Tan * Zifang Wang,Robert J.Thomas, Zygmunt Haas ECE Cornell Univ*
Spring Routing & Switching Umar Kalim Dept. of Communication Systems Engineering 06/04/2007.
Mario Čagalj supervised by prof. Jean-Pierre Hubaux (EPFL-DSC-ICA) and prof. Christian Enz (EPFL-DE-LEG, CSEM) Wireless Sensor Networks:
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 21 Introduction to Computer Networks.
Layer-3 Routing Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
CECS 474 Computer Network Interoperability WAN Technologies & Routing
Potential-Based Entropy Adaptive Routing for Disruption Tolerant Networks Hideya Ochiai Hiroshi Esaki The University of Tokyo / NICT DTNRG, IETF 76 Hiroshima,
1 Pertemuan 20 Teknik Routing Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
A Distributed Scheduling Algorithm for Real-time (D-SAR) Industrial Wireless Sensor and Actuator Networks By Kiana Karimpour.
Hop-limited flooding over dynamic networks M. Vojnović and A. Proutiere Microsoft Research IEEE Infocom 2011, Shanghai, April 2011.
Wei Gao1 and Qinghua Li2 1The University of Tennessee, Knoxville
Social media is no longer a choice but a necessity.
LANGUAGE NETWORKS THE SMALL WORLD OF HUMAN LANGUAGE Akilan Velmurugan Computer Networks – CS 790G.
+ Mayukha Bairy Disk Intersection graphs and CDS as a backbone in wireless ad hoc networks.
IEEE Globecom 2010 Tan Le Yong Liu Department of Electrical and Computer Engineering Polytechnic Institute of NYU Opportunistic Overlay Multicast in Wireless.
Exploiting Temporal Dependency for Opportunistic Forwarding in Urban Vehicular Network [MANET-2] Presented by Cui Kai 2011/5/25 Hongzi Zhu, Sherman Shen,
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
CSCI 465 D ata Communications and Networks Lecture 15 Martin van Bommel CSCI 465 Data Communications & Networks 1.
Outline Introduction Existing solutions for ad hoc
A Scalable Routing Protocol for Ad Hoc Networks Eric Arnaud Id:
SR: A Cross-Layer Routing in Wireless Ad Hoc Sensor Networks Zhen Jiang Department of Computer Science West Chester University West Chester, PA 19335,
Social-Aware Stateless Forwarding in Pocket Switched Networks Soo-Jin SHIN
 Tree in Sensor Network Patrick Y.H. Cheung, and Nicholas F. Maxemchuk, Fellow, IEEE 3 rd New York Metro Area Networking Workshop (NYMAN 2003)
Teknik Routing Pertemuan 10 Matakuliah: H0524/Jaringan Komputer Tahun: 2009.
© 2008 Frans Ekman Mobility Models for Mobile Ad Hoc Network Simulations Frans Ekman Supervisor: Jörg Ott Instructor: Jouni Karvo.
Comparison of Tarry’s Algorithm and Awerbuch’s Algorithm CS 6/73201 Advanced Operating System Presentation by: Sanjitkumar Patel.
An Energy-Efficient Geographic Routing with Location Errors in Wireless Sensor Networks Julien Champ and Clement Saad I-SPAN 2008, Sydney (The international.
An Adaptive, High Performance MAC for Long-Distance Multihop Wireless Networks Sergiu Nedevschi *, Rabin K. Patra *, Sonesh Surana *, Sylvia Ratnasamy.
A Pseudo Random Coordinated Scheduling Algorithm for Bluetooth Scatternets MobiHoc 2001.
Mobility Increases the Connectivity of K-hop Clustered Wireless Networks Qingsi Wang, Xinbing Wang and Xiaojun Lin.
Structure-Free Data Aggregation in Sensor Networks.
CS 6401 Intra-domain Routing Outline Introduction to Routing Distance Vector Algorithm.
Repairing Sensor Network Using Mobile Robots Y. Mei, C. Xian, S. Das, Y. C. Hu and Y. H. Lu Purdue University, West Lafayette ICDCS 2006 Speaker : Shih-Yun.
Construction of Optimal Data Aggregation Trees for Wireless Sensor Networks Deying Li, Jiannong Cao, Ming Liu, and Yuan Zheng Computer Communications and.
Incrementally Improving Lookup Latency in Distributed Hash Table Systems Hui Zhang 1, Ashish Goel 2, Ramesh Govindan 1 1 University of Southern California.
1 Along & across algorithm for routing events and queries in wireless sensor networks Tat Wing Chim Department of Electrical and Electronic Engineering.
12.Nov.2007 Capacity of Ad Hoc Wireless Networks Jinyang Li Charles Blake Douglas S. J. De Coutu Hu Imm Lee Robert Morris Paper presentation by Tonio Gsell.
Ad-hoc Networks.
Pastry Scalable, decentralized object locations and routing for large p2p systems.
Impact of Neighbor Selection on Performance and Resilience of Structured P2P Networks Sushma Maramreddy.
Link-State Routing Protocols
Lecture 13 review Explain how distance vector algorithm works.
Link-State Routing Protocols
Intradomain Routing Outline Introduction to Routing
A Probabilistic Routing Protocol for Mobile Ad Hoc Networks
Link-State Routing Protocols
Presentation transcript:

Are You Moved by Your Social Network Application? Gregory Peaker

Overview This Research Paper is very well written Good introduction in the Title Outline: 1.Introduction 2.Reasons for work and related work 3.Properties of Nodes 4.Conclusions Relevant Today

Introduction Compare social graph containing friends vs. contact graph that is temporal network created by opportunistic contact 1.Prove most properties of nodes, links, and paths correlate among social and contact graphs 2.Describe how structure of social graph helps build forwarding paths in contact graph, allow two nodes communicate over time using opportunistic contact and intermediate nodes

Introduction Study relation between social interactions and physical meetings – remains largely unexplored –28 participants in ACM CoNEXT 2007 –Ask each participant to friend others in list of attendees –Ignore or add friend when within Bluetooth distance –Conference is reasonable group size and can be reproduced Applied to delay tolerant network

Related Work Properties of paths built in quickly varying graph is new topic –Opportunistic forwarding should be aware of social properties –Compare initial social network vs. opportunistic contacts –9024 opportunistic contacts made

Results Properties of paths built in quickly varying graph is new topic –Opportunistic forwarding should be aware of social properties –Compare initial social network vs. opportunistic contacts –9024 opportunistic contacts made

Results Figure 1

Results Table 1

Results Figure 2

Results The median inter-contact time grows from 6 minutes between two friends, to nearly an hour (ten time more) when nodes have distance three or four ins social graph 75% of contacts with friends are longer than 10 minutes. Where 75% of contact with nodes distance four are shorter than 13 minutes.

Applications and Future Work Tested rules for sending packets neighbor(k): (u → v) is allowed if and only if u and v are within distance k in the social graph. destination-neighbor(k): (u → v) is allowed if and only if v is within distance k of d. non-decreasing-centrality: (u → v) is allowed if and only if C(u) ≤ C(v). non-increasing-distance: (u → v) is allowed if and only if the social distance from v to d is no more than the one from u to d.

Applications and Future Work Neighbor rule performs as well as most other rules. Performs significantly better than random choice. Rule based on centrality outperforms all rules tested (reaching more than 95% of success with half the pairs) The combination of neighbor and centrality rules naturally improves selectivity, offering more flexibility and achieve some best trade-offs

Applications and Future Work Without infrastructure, must exchange information an social network allows this Future work wish approximate centrality of a node in distributed algorithm Centrality creates issue with targeting same set of nodes, fix this