CHINACOM 2006, Beijing, China26 Oct 2006 Osmosis in Pocket Switched Network Pan (Ben) Hui University of Cambridge Computer Laboratory

Slides:



Advertisements
Similar presentations
S the of partnership power Evaluation Code 030 Presenter: Laura Key, Taylor University Monday, April 9th - 8:30 AM Building a Self- Refreshing MS Access.
Advertisements

Milan Vojnović Joint work with: Jean-Yves Le Boudec Workshop on Clean Slate Network Design, Cambridge, UK, Sept 18, 2006 On the Origins of Power Laws in.
IEEE INFOCOM 2004 MultiNet: Connecting to Multiple IEEE Networks Using a Single Wireless Card.
Supporting Cooperative Caching in Disruption Tolerant Networks
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science R3: Robust Replication Routing in Wireless Networks with Diverse Connectivity Characteristics.
Delay Tolerant and Opportunistic Networks Past, current and future work
Forwarding Redundancy in Opportunistic Mobile Networks: Investigation and Elimination Wei Gao 1, Qinghua Li 2 and Guohong Cao 3 1 The University of Tennessee,
By Libo Song and David F. Kotz Computer Science,Dartmouth College.
Peer-to-peer Multimedia Streaming and Caching Service Jie WEI, Zhen MA May. 29.
Prefix Caching assisted Periodic Broadcast for Streaming Popular Videos Yang Guo, Subhabrata Sen, and Don Towsley.
Efficient Content Location Using Interest-based Locality in Peer-to-Peer Systems Presented by: Lin Wing Kai.
Exploiting Content Localities for Efficient Search in P2P Systems Lei Guo 1 Song Jiang 2 Li Xiao 3 and Xiaodong Zhang 1 1 College of William and Mary,
Opportunistic Networking (aka Pocket Switched Networking)
Distributed Sensing and Data Collection Via Broken Ad Hoc Wireless Connected Networks Mobile Robots By Alan FT Winfield Presented By Navpreet Bawa.
Time & Location Sensitive Messaging Protocol for Automated Delivery CSE 237A: Final Project Presentation Presented by Jennifer Chiang & Jeffrey Kuramoto.
Bubble Rap: Social-based Forwarding in DTNs Pan Hui, Jon Crowcroft, Eiko Yoneki University of Cambridge, Computer Laboratory Slides by Alex Papadimitriou.
How small labels create big improvements Pan Hui Jon Crowcroft Computer Laboratory University of Cambridge.
Social Networks Online and in Real Life2009 Online Social Nets & Real Life Jon Crowcroft +gmail,
DAKNET Presented By: rreema.
Internet Basics 1 Internet Basic includes two lessons:  Lesson 1: The Internet  Lesson 2: The World Wide Web.
Yung-Chih Chen Jim Kurose and Don Towsley Computer Science Department University of Massachusetts Amherst A Mixed Queueing Network Model of Mobility in.
Layer 2 Switch  Layer 2 Switching is hardware based.  Uses the host's Media Access Control (MAC) address.  Uses Application Specific Integrated Circuits.
Fundamental of IP network ~ ping, traceroute ~ Practice 1 Information and Communications Technology Internet Engineering.
Networks Workbook.
Pocket Switched Networks: Real-world Mobility and its Consequences for Opportunistic Forwarding Jon Crowcroft,Pan Hui (Ben) Augustin Chaintreau, James.
Chapter 4. After completion of this chapter, you should be able to: Explain “what is the Internet? And how we connect to the Internet using an ISP. Explain.
Internet & Web Overview Fort Collins, CO Copyright © XTR Systems, LLC How the WWW & the Internet Work or "I didn't know they aren't the same thing." Instructor:
How the Internet Works CPA. Internet Addresses How do you get to the school’s website? What you as the user sees is a web address or URL – Uniform Resource.
MobiQuitous 2004Kimaya Sanzgiri Leveraging Mobility to Improve Quality of Service in Mobile Networks Kimaya Sanzgiri and Elizabeth Belding-Royer Department.
Chapter 1: Introduction to Web Applications. This chapter gives an overview of the Internet, and where the World Wide Web fits in. It then outlines the.
Challenged Networking An Experimental Study of New Protocols and Architectures Erik Nordström.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Context-aware Adaptive Routing for Delay Tolerant Networking Mirco Musolesi Joint work with Cecilia Mascolo Department of Computer Science University College.
The Internet Trisha Cummings ITE115. What is the Internet? The Internet is a world-wide network of computer networks that use a common communications.
An Overview of the Internet: The Internet: Then and Now How the Internet Works Major Features of the Internet.
The Inter-network is a big network of networks.. The five-layer networking model for the internet.
How Small Labels create Big Improvements April Chan-Myung Kim
Selfishness, Altruism and Message Spreading in Mobile Social Networks September 2012 In-Seok Kang
Chapter 12 - Packet Switching Introduction Sharing Saves Money –Arranging for multiple devices to share a single transmission path lowers cost because.
Lecture 6 Page 1 Advanced Network Security Review of Networking Basics Advanced Network Security Peter Reiher August, 2014.
PRoPHET+: An Adaptive PRoPHET- Based Routing Protocol for Opportunistic Network Ting-Kai Huang, Chia-Keng Lee and Ling-Jyh Chen.
Kaleidoscope – Adding Colors to Kademlia Gil Einziger, Roy Friedman, Eyal Kibbar Computer Science, Technion 1.
Google Voice Google is more than just a search engine & Gmail… - Google Voice - Picasa Web Albums - Google Calendar - Google Maps - many more…
IT ELECTRONIC COMMERCE THEORY NOTES
CSU - DCE Advanced Perl WWW Overview - Fort Collins, CO Copyright © XTR Systems, LLC How the WWW & the Internet Work Instructor: Joseph DiVerdi,
HINDU STYLE PORTFOLIO TEMPLATE
A Deafness Free MAC Protocol for Ad Hoc Networks Using Directional Antennas Jia Feng, Pinyi Ren, and Shuangcheng Yan Department of Electronic Engineering.
Using Ant Agents to Combine Reactive and Proactive strategies for Routing in Mobile Ad Hoc Networks Fredrick Ducatelle, Gianni di caro, and Luca Maria.
Chapter 9 Sending and Attachments. Sending and Attachments FAQs: – How does work? – How do I use local ? – How do I use Web-based.
#16 Application Measurement Presentation by Bobin John.
1587: COMMUNICATION SYSTEMS 1 Wide Area Networks Dr. George Loukas University of Greenwich,
Social Justice Post Survey Results May Social Justice & Technology Post-SurveyPlease answer all of the questions in the survey.: Please rate your.
Context-aware Adaptive Routing for Delay Tolerant Networking
Chapter 9 Introduction To Data-Link Layer 9.# 1
Day 8- The Need for Addressing
TECHNOLOGY GUIDE THREE
Day 10- The Need for Addressing
Packets & Routing Lower OSI layers (1-3) concerned with packets and the network Packets carry data independently through the network, and into other networks…
5G MOBILE TECHNOLOGY By J.YOGESH 08M31A0425.
Jon Crowcroft Pan Hui Computer Laboratory University of Cambridge
Comp. Lab. Univ. Cambridge
TECHNOLOGY GUIDE THREE
Foundations of Networking
Wireless Epidemic The wireless epidemic (Nature 449, ; 2007) by Jon Kleinberg ‘Digital traffic flows not only over the wired backbone of the Internet,
Online Social Nets & Real Life
Review of TCP/IP Internetworking
Foundations of Networking
Ling-Jyh Chen and Ting-Kai Huang
Changing the paradigm in forwarding : How transform daemons to angels?
TECHNOLOGY GUIDE THREE
Presentation transcript:

CHINACOM 2006, Beijing, China26 Oct 2006 Osmosis in Pocket Switched Network Pan (Ben) Hui University of Cambridge Computer Laboratory Jeremie Leguay, Jon Crowcroft, James Scott, Timur Friedman, Vania Conan

CHINACOM 2006, Beijing, China26 Oct 2006 Outline Pocket switched networks Osmosis scenario Osmosis analogy Penalty-based osmosis Evaluation methodology Results and discussion Conclusion

CHINACOM 2006, Beijing, China26 Oct 2006 Pocket switched networks Give it to me, I have 1G bytes phone flash. I have 100M bytes of data, who can carry for me? I can also carry for you! Thank you but you are in the opposite direction! Don’t give to me! I am running out of storage. Reach an access point. Internet Finally, it arrive… Search La Bonheme.mp3 for me There is one in my pocket…

CHINACOM 2006, Beijing, China26 Oct 2006 Is there a packet in your pocket or are you pleased to see me?

CHINACOM 2006, Beijing, China26 Oct 2006 Applications Asynchronous, local messaging Automatic address book or calendar updates Ad-hoc Google File sharing, bulletin board Commercial transactions Alerting, tracking or finding people

CHINACOM 2006, Beijing, China26 Oct 2006 Osmosis scenario Large scale Intermittently Connected Mobile Ad hoc Networks – Hundreds, thousands or more – Delays from minutes to days Query-driven data migrations Data usually much bigger than queries – E.g. file sharing Multiple possible paths

CHINACOM 2006, Beijing, China26 Oct 2006 Osmosis analogy Pic from:

CHINACOM 2006, Beijing, China26 Oct 2006 Penalty-based osmosis Data follows the query traces to requesters Penalties on paths without traces Control flooding

CHINACOM 2006, Beijing, China26 Oct 2006 Evaluation methodology(1) CRAWDAD Wi-Fi data from Dartmouth college January 26th 2004 and March 11th 2004 (45 days) Replay traces

CHINACOM 2006, Beijing, China26 Oct 2006 Evaluation methodology(2) File popularities and queries – Zipf’s law USNET newsgroup survey, 145 answers File sizes – Zipf’s law – Distortion at 3M

CHINACOM 2006, Beijing, China26 Oct 2006 Results and discussion Close success rate to Epidemic Half medium accesses, data transferred Reasonable mean delay

CHINACOM 2006, Beijing, China26 Oct 2006 Conclusion and future work Reasonable good lookup satisfactory Much reduce in transmission cost, buffer utilization Packets erasure algorithm Further evaluations – Haggle iMote traces – MIT RealityMining traces

CHINACOM 2006, Beijing, China26 Oct 2006 Thank you!