Opportunistic Networking (aka Pocket Switched Networking)

Slides:



Advertisements
Similar presentations
Exploring User Social Behavior in Mobile Social Applications Konglin Zhu *, Pan Hui $, Yang Chen *, Xiaoming Fu *, Wenzhong Li + * University of Goettingen,
Advertisements

Milan Vojnović Joint work with: Jean-Yves Le Boudec Workshop on Clean Slate Network Design, Cambridge, UK, Sept 18, 2006 On the Origins of Power Laws in.
Supporting Cooperative Caching in Disruption Tolerant Networks
Capacity of wireless ad-hoc networks By Kumar Manvendra October 31,2002.
Mobility Increase the Capacity of Ad-hoc Wireless Network Matthias Gossglauser / David Tse Infocom 2001.
* Distributed Algorithms in Multi-channel Wireless Ad Hoc Networks under the SINR Model Dongxiao Yu Department of Computer Science The University of Hong.
Queuing Network Models for Delay Analysis of Multihop Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute.
Delay and Throughput in Random Access Wireless Mesh Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department Rensselaer Polytechnic Institute (RPI)
Rumor Routing in Sensor Networks David Braginsky and Deborah Estrin Presented By Tu Tran 1.
Finding Self-similarity in People Opportunistic Networks Ling-Jyh Chen, Yung-Chih Chen, Paruvelli Sreedevi, Kuan-Ta Chen Chen-Hung Yu, Hao Chu.
RelayCast: Scalable Multicast Routing in Delay Tolerant Networks
On Using Probabilistic Forwarding to Improve HEC-based Data Forwarding in Opportunistic Networks Ling-Jyh Chen 1, Cheng-Long Tseng 2 and Cheng-Fu Chou.
Are You moved by Your Social Network Application? Abderrahmen Mtibaa, Augustin Chaintreau, Jason LeBrun, Earl Oliver, Anna-Kaisa Pietilainen, Christophe.
By Libo Song and David F. Kotz Computer Science,Dartmouth College.
Arsitektur Jaringan Terkini
Finding Self-similarity in Opportunistic People Networks Yung-Chih Chen 1 Ling-Jyh Chen 1, Yung-Chih Chen 1, Tony Sun 2 Paruvelli Sreedevi 1, Kuan-Ta Chen.
Distributed Sensing and Data Collection Via Broken Ad Hoc Wireless Connected Networks Mobile Robots By Alan FT Winfield Presented By Navpreet Bawa.
1 Random Trip Stationarity, Perfect Simulation and Long Range Dependence Jean-Yves Le Boudec (EPFL) joint work with Milan Vojnovic (Microsoft Research.
Mobility Increases Capacity In Ad-Hoc Wireless Networks Lecture 17 October 28, 2004 EENG 460a / CPSC 436 / ENAS 960 Networked Embedded Systems & Sensor.
 Idit Keidar, Technion Intel Academic Seminars, February Octopus A Fault-Tolerant and Efficient Ad-hoc Routing Protocol Idit Keidar, Technion Joint.
CS541 Advanced Networking 1 Cognitive Radio Networks Neil Tang 1/28/2009.
Bubble Rap: Social-based Forwarding in DTNs Pan Hui, Jon Crowcroft, Eiko Yoneki University of Cambridge, Computer Laboratory Slides by Alex Papadimitriou.
How small labels create big improvements Pan Hui Jon Crowcroft Computer Laboratory University of Cambridge.
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
CHINACOM 2006, Beijing, China26 Oct 2006 Osmosis in Pocket Switched Network Pan (Ben) Hui University of Cambridge Computer Laboratory
Mobile Ad hoc Networks COE 549 Delay and Capacity Tradeoffs II Tarek Sheltami KFUPM CCSE COE 8/6/20151.
Yung-Chih Chen Jim Kurose and Don Towsley Computer Science Department University of Massachusetts Amherst A Mixed Queueing Network Model of Mobility in.
Mobility Assisted Networking Romit Roy Choudhury.
Detecting Node encounters through WiFi By: Karim Keramat Jahromi Supervisor: Prof Adriano Moreira Co-Supervisor: Prof Filipe Meneses Oct 2013.
Pocket Switched Networks: Real-world Mobility and its Consequences for Opportunistic Forwarding Jon Crowcroft,Pan Hui (Ben) Augustin Chaintreau, James.
1 CIS 6930: Workshop III Encounter-based Networks Presenter: Sapon Tanachaiwiwat Instructor: Dr. Helmy 2/5/2007.
1 National Research Council - Pisa - Italy Marco Conti Italian National Research Council (CNR) IIT Institute MobileMAN Architecture and Protocols 2nd MobileMAN.
When rate of interferer’s codebook small Does not place burden for destination to decode interference When rate of interferer’s codebook large Treating.
Hop-limited flooding over dynamic networks M. Vojnović and A. Proutiere Microsoft Research IEEE Infocom 2011, Shanghai, April 2011.
Gathering Data in Wireless Sensor Networks Madhu K. Jayaprakash.
Challenged Networking An Experimental Study of New Protocols and Architectures Erik Nordström.
Wei Gao1 and Qinghua Li2 1The University of Tennessee, Knoxville
Deadline-sensitive Opportunistic Utility-based Routing in Cyclic Mobile Social Networks Mingjun Xiao a, Jie Wu b, He Huang c, Liusheng Huang a, and Wei.
EE360 PRESENTATION On “Mobility Increases the Capacity of Ad-hoc Wireless Networks” By Matthias Grossglauser, David Tse IEEE INFOCOM 2001 Chris Lee 02/07/2014.
IDRM: Inter-Domain Routing Protocol for Mobile Ad Hoc Networks C.-K. Chau, J. Crowcroft, K.-W. Lee, S. H.Y. Wong.
1 Heterogeneity in Multi-Hop Wireless Networks Nitin H. Vaidya University of Illinois at Urbana-Champaign © 2003 Vaidya.
Exploiting Temporal Dependency for Opportunistic Forwarding in Urban Vehicular Network [MANET-2] Presented by Cui Kai 2011/5/25 Hongzi Zhu, Sherman Shen,
Delay-Throughput Tradeoff with Correlated Mobility in Ad-Hoc Networks Shuochao Yao*, Xinbing Wang*, Xiaohua Tian* ‡, Qian Zhang † *Department of Electronic.
Prediction Assisted Single-copy Routing in Underwater Delay Tolerant Networks Zheng Guo, Bing Wang and Jun-Hong Cui Computer Science & Engineering Department,
Lab for Advanced Network Design, Evaluation and Research Mobility Profile based Routing Within Intermittently Connected Mobile Ad hoc Networks (ICMAN)
1 Delay Tolerant Network Routing Sathya Narayanan, Ph.D. Computer Science and Information Technology Program California State University, Monterey Bay.
1 Mobility Increases the Capacity of Ad-hoc Wireless Networks Matthias Grossglauser, David Tse IEEE Infocom 2001 (Best paper award) Oct 21, 2004 Som C.
Distributed Maintenance of Cache Freshness in Opportunistic Mobile Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering Pennsylvania.
On Exploiting Transient Contact Patterns for Data Forwarding in Delay Tolerant Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering.
How Small Labels create Big Improvements April Chan-Myung Kim
Routing In Socially Selfish Delay Tolerant Networks Chan-Myung Kim
Routing Protocols in Ad-hoc Networks, OLSR Self configuring systems (SCS) TTM3 – Høst 2004 Jørn Andre Berntzen 22/10/2004.
Selfishness, Altruism and Message Spreading in Mobile Social Networks September 2012 In-Seok Kang
PRoPHET+: An Adaptive PRoPHET- Based Routing Protocol for Opportunistic Network Ting-Kai Huang, Chia-Keng Lee and Ling-Jyh Chen.
Converge-Cast: On the Capacity and Delay Tradeoffs Xinbing Wang Luoyi Fu Xiaohua Tian Qiuyu Peng Xiaoying Gan Hui Yu Jing Liu Department of Electronic.
User-Centric Data Dissemination in Disruption Tolerant Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering Pennsylvania State University.
MAIN RESULT: Depending on path loss and the scaling of area relative to number of nodes, a novel hybrid scheme is required to achieve capacity, where multihop.
Social-Aware Stateless Forwarding in Pocket Switched Networks Soo-Jin SHIN
© 2008 Frans Ekman Mobility Models for Mobile Ad Hoc Network Simulations Frans Ekman Supervisor: Jörg Ott Instructor: Jouni Karvo.
Opportunistic MANETs: Mobility Can Make Up for Low Transmission Power.
Dynamic Control of Coding for Progressive Packet Arrivals in DTNs.
Mobility Increases the Connectivity of K-hop Clustered Wireless Networks Qingsi Wang, Xinbing Wang and Xiaojun Lin.
Routing in Delay Tolerant Network Qing Ye EDIFY Group of Lehigh University.
Ad-hoc Storage Overlay System (ASOS): A Delay-Tolerant Approach in MANETs Guang Yang 1, Ling-Jyh Chen 2, Tony Sun 1, Biao Zhou 1, Mario Gerla 1 1 University.
Incrementally Improving Lookup Latency in Distributed Hash Table Systems Hui Zhang 1, Ashish Goel 2, Ramesh Govindan 1 1 University of Southern California.
Delay-Tolerant Networks (DTNs)
Jon Crowcroft Pan Hui Computer Laboratory University of Cambridge
Comp. Lab. Univ. Cambridge
Effectiveness of the 2-hop Routing Strategy in MANETS
Presentation transcript:

Opportunistic Networking (aka Pocket Switched Networking) Jon Crowcroft Jon.crowcroft@cl.cam.ac.uk

Pocket Switched Networks: Real-world Mobility and its Consequences for Opportunistic Forwarding Jon Crowcroft, Pan Hui, Augustin Chaintreau, Joint work with Christophe Diot, James Scott, Richard Gass, Intel Research Cambridge University of Cambridge

Outline Motivation and context Experiments Results Analysis of forwarding algorithms Consequences on mobile networking

The world is NOT connected! Users move between heterogeneous connectivity islands End-to-end is not always possible One or both ends may be disconnected Internet “routing” is a bad idea Device should make network decisions Shall I send by email, infrared or Bluetooth?

No alternative to the Internet Today OR … Tomorrow

[Grossglauser and Tse 2001] Pocket networking A packet can reach destination using network connectivity or user mobility Mobility increases capacity. [Grossglauser and Tse 2001]

State of the art Most efforts try to hack Internet legacy applications so that they work in Delay Tolerant Environments MANET DTN (even if DTN is more general by definition) Real “ad-hoc” approaches: Zebranet, Lapnet, Cyberpostman

Challenges Exploit massive aggregate bandwidth Distributed naming Devices with local connectivity Make use of MBs of local storage Heterogeneous network types Distributed naming Nodes need to “locate” themselves and their neighbours Forwarding decision Security, trust and reputation

Applications Asynchronous, local messaging Automatic address book or calendar updates Ad-hoc google File sharing, bulletin board Commercial transactions Alerting, tracking or finding people

Outline Motivation and context Experiments Results Analysis of forwarding algorithms Consequences on mobile networking

Three independent experiments In Cambridge Capture mobile users interaction. Traces from Wifi network : Dartmouth and UCSD

iMote data sets Easy to carry devices Scan other devices every 2mns Unsync feature log data to flash memory for each contact MAC address, start time, end time 2 experiments 20 motes, 3 days, 3,984 contacts, IRC employee 20 motes, 5 days, 8,856 contacts, CAM students

What an iMote looks like

Experimental device

UCSD and Dartmouth Traces WiFi access networks Client-based logs of AP (UCSD), SNMP logs from AP (Dartmouth). Assumption: Two clients logged on the same AP are in communication range. 3 months (UCSD), 4 months (Dartmouth).

Outline Motivation and context Experiments Results Analytical analysis Consequences on mobile networking

What we measure For a given pairs of nodes: contact times and inter-contact times. Duration of the experiment a contact time an inter-contact t

What we measure (cont’d) Distribution per event. ≠ seen at a random instant in time. Plot log-log distributions. We aggregate the data of different pairs. (see the following slides).

Example: a typical pair α cutoff

Examples : Other pairs

Aggregation (1): for one fixed node

Aggregation (2) : among iMotes

Summary Some heterogeneity among iMotes. Inter-contact distributions seem to follow a power law on [2mn; 1day]. What about other nodes ? Campus WiFi experiments ? the time of the day ?

Inter-contact with External nodes

Inter-contact time for WiFi traces

Inter-contact time during the day

Inter-contact time during the day

Summary of observations Inter-contact time follows an approximate power-law shape in all experiments. α < 1 most of the time (very heavily tailed). Variation of parameter with the time of day, or among pairs.

Outline Motivation and context Experiments Results Analysis of forwarding algorithms Consequences on mobile networking

Problem Given that all data set exhibit approximate power law shape of the inter-contact time distribution: Would a purely opportunistic point-to-point forwarding algorithm converge (i.e. guarantee bounded transmission delays) ? Under what conditions ?

Forwarding algorithms Based on opportunities, and “Stateless” : Decision does not depend on the nodes you meet. Between two extreme relaying strategies : Wait-and-forward. Flooding. Upper and Lower bounds on bandwidth: Short contact time. Full contact time (best case, treated here).

Two-hop relaying strategy Grossglauser & Tse (2001) : Maximizes capacity of dense ad-hoc networks. Authors assume nodes location i.i.d. uniform.

Our assumptions on Mobility Homogeneity Inter-contact for every pairs follows power law. No cut-off bound. Independence In “time”: contacts are renewal instants. In “space”: pairs are independent.

Two-hop: stability/instability The two hop relaying algorithm converges, and it achieves a finite expected delay. a < 2 The expected delay grow to infinity with time.

Two-hop: extensions Power laws with cut-off: Short contact case: Large expected delay. Short contact case: By comparison, all the negative results hold. Convergence for α > 3 by Kingman’s bound. We believe the same result holds for α > 2.

The Impact of redundancy The Two-hop strategy is very conservative. What about duplicate packet ? Or epidemics forwarding ? This comes to the question:

Forwarding with redundancy: For a > 2 Any stateless algorithm achieves a finite expected delay. For and : There exist a forwarding algorithm with m copies and a finite expected delay. For a < 1 No stateless algorithm (even flooding) achieve a bounded delay (Orey’s theorem).

Forwarding w. redundancy (cont’d) Further extensions: The short contact case is open for 1<α<2. Can we weaken the assumption of independence between pairs ?

Outline Motivation and context Experiments Results Analysis of forwarding algorithms Consequences on mobile networking

Consequences on mobile networking Mobility models needs to be redesigned Exponential decay of inter contact is wrong. Mechanisms tested with that model need to be analyzed with new mobility assumptions. Stateless forwarding does not work Can we benefit from heterogeneity to forward by communities ? Scheme for peer-to-peer information sharing.

Tech Report available at: THANK YOU Tech Report available at: http://www.cl.cam.ac.uk/TechReports/UCAM-CL-TR-617.html Jon.Crowcroft@cl.cam.ac.uk, Pan.Hui@cl.cam.ac.uk, augustin.chaintreau@intel.com

Next steps Collect more data Design algorithms that work More motes Other crowds of users Collect contact time data Design algorithms that work New mobility models

Contact time distribution

Inter-contact for all pairs