Infrastructure of MANETs  MANETS are without a fixed infrastructure  Network Graphs in MANETS are rarely or ever connected  MANET routing protocols.

Slides:



Advertisements
Similar presentations
1 Workshop on Online Social Networks Microsoft Research Cambridge Elizabeth Daly and Mads Haahr Distributed Systems Group, Computer Science Department.
Advertisements

Robin Kravets Tarek Abdelzaher Department of Computer Science University of Illinois The Phoenix Project.
Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection Presented by: Vijay Kumar.
Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
Data and Computer Communications
Network Matrix and Graph. Network Size Network size – a number of actors (nodes) in a network, usually denoted as k or n Size is critical for the structure.
Multicast in Wireless Mesh Network Xuan (William) Zhang Xun Shi.
Λ14 Διαδικτυακά Κοινωνικά Δίκτυα και Μέσα Strong and Weak Ties Chapter 3, from D. Easley and J. Kleinberg book.
CSLI 5350G - Pervasive and Mobile Computing Week 6 - Paper Presentation “Exploiting Beacons for Scalable Broadcast Data Dissemination in VANETs” Name:
Routing Basics What’s going on the back … Faisal Karim Shaikh DEWSNet Group Dependable Embedded Wired/Wireless Networks.
Relationship Mining Network Analysis Week 5 Video 5.
By: Roma Mohibullah Shahrukh Qureshi
By Libo Song and David F. Kotz Computer Science,Dartmouth College.
Using Structure Indices for Efficient Approximation of Network Properties Matthew J. Rattigan, Marc Maier, and David Jensen University of Massachusetts.
Centrality and Prestige HCC Spring 2005 Wednesday, April 13, 2005 Aliseya Wright.
Graphs and Topology Yao Zhao. Background of Graph A graph is a pair G =(V,E) –Undirected graph and directed graph –Weighted graph and unweighted graph.
EECC694 - Shaaban #1 lec #7 Spring The OSI Reference Model Network Layer.
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
Wei Gao Joint work with Qinghua Li, Bo Zhao and Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University Multicasting.
Layer-3 Routing Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
Network Measures Social Media Mining. 2 Measures and Metrics 2 Social Media Mining Network Measures Klout.
Social Networks Corina Ciubuc.
Using Friendship Ties and Family Circles for Link Prediction Elena Zheleva, Lise Getoor, Jennifer Golbeck, Ugur Kuter (SNAKDD 2008)
1 Pertemuan 20 Teknik Routing Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
Presentation: Random Walk Betweenness, J. Govorčin Laboratory for Data Technologies, Faculty of Information Studies, Novo mesto – September 22, 2011 Random.
Section 8 – Ec1818 Jeremy Barofsky March 31 st and April 1 st, 2010.
Social Network Analysis for Information Flow in Disconnected Delay-Tolerant MANETs Presenter: Yong-Jin Jeong Korea University of Technology.
Social Network Analysis: A Non- Technical Introduction José Luis Molina Universitat Autònoma de Barcelona
Principles of Social Network Analysis. Definition of Social Networks “A social network is a set of actors that may have relationships with one another”
Authors: Ioannis Komnios Sotirios Diamantopoulos Vassilis Tsaoussidis ComNet Group.
On the Cost/Delay Tradeoff of Wireless Delay Tolerant Geographic Routing Argyrios Tasiopoulos MSc, student, AUEB Master Thesis presentation.
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
Murtaza Abbas Asad Ali. NETWORKOLOGY THE SCIENCE OF NETWORKS.
A Graph-based Friend Recommendation System Using Genetic Algorithm
Advanced Methods and Analysis for the Learning and Social Sciences PSY505 Spring term, 2012 April 25, 2012.
On Exploiting Transient Contact Patterns for Data Forwarding in Delay Tolerant Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
Special Topics in Educational Data Mining HUDK5199 Spring 2013 March 25, 2012.
Group 3 Sandeep Chinni Arif Khan Venkat Rajiv. Delay Tolerant Networks Path from source to destination is not present at any single point in time. Combining.
CSCI 465 D ata Communications and Networks Lecture 15 Martin van Bommel CSCI 465 Data Communications & Networks 1.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
CSC 311 CHAPTER TEN CONNECTING NETWORKS. CSC 311 We have looked at several different network topologies Why do we have different types of networks? Why.
Data Communications and Networking Chapter 11 Routing in Switched Networks References: Book Chapters 12.1, 12.3 Data and Computer Communications, 8th edition.
Lecture 13: Network centrality Slides are modified from Lada Adamic.
PRoPHET+: An Adaptive PRoPHET- Based Routing Protocol for Opportunistic Network Ting-Kai Huang, Chia-Keng Lee and Ling-Jyh Chen.
A Sociability-Based Routing Scheme for Delay-Tolerant Networks May Chan-Myung Kim
Centrality in Social Networks Background: At the individual level, one dimension of position in the network can be captured through centrality. Conceptually,
A Scalable Routing Protocol for Ad Hoc Networks Eric Arnaud Id:
Slides are modified from Lada Adamic
1 Utilizing Shared Vehicle Trajectories for Data Forwarding in Vehicular Networks IEEE INFOCOM MINI-CONFERENCE Fulong Xu, Shuo Gu, Jaehoon Jeong, Yu Gu,
Graphs & Matrices Todd Cromedy & Bruce Nicometo March 30, 2004.
Teknik Routing Pertemuan 10 Matakuliah: H0524/Jaringan Komputer Tahun: 2009.
A Multi-Channel Cooperative MIMO MAC Protocol for Wireless Sensor Networks(MCCMIMO) MASS 2010.
On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay-Tolerant Networks 1 Wei Gao Guohong Cao Tom La Porta Jiawei Han Presented.
November 4, 2003Applied Research Laboratory, Washington University in St. Louis APOC 2003 Wuhan, China Cost Efficient Routing in Ad Hoc Mobile Wireless.
Selected Topics in Data Networking Explore Social Networks: Center and Periphery.
How to Analyse Social Network? Social networks can be represented by complex networks.
Improving Fault Tolerance in AODV Matthew J. Miller Jungmin So.
Routing in Delay Tolerant Network Qing Ye EDIFY Group of Lehigh University.
Distance Vector Routing
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
2010 IEEE Global Telecommunications Conference, GLOBECOM 2010 Zheng Guo; Bing Wang; Jun-Hong Cui Prediction Assisted Single-copy Routing in Underwater.
CRIM6660 Terrorist Networks Lesson 1: Introduction, Terms and Definitions.
1 New metrics for characterizing the significance of nodes in wireless networks via path-based neighborhood analysis Leandros A. Maglaras 1 Dimitrios Katsaros.
Delay-Tolerant Networks (DTNs)
Recommendation Based Trust Model with an Effective Defense Scheme for ManetS Adeela Huma 02/02/2017.
The Strength of Weak Ties
Network Science: A Short Introduction i3 Workshop
Kevin Lee & Adam Piechowicz 10/10/2009
Effective Replica Allocation
Presentation transcript:

Infrastructure of MANETs  MANETS are without a fixed infrastructure  Network Graphs in MANETS are rarely or ever connected  MANET routing protocols such as AODV,DSR,DSDV and LAR make the assumption that network graph is fully connected.

Workarounds?  Exploit the mobility of the network to transfer messages.  Mobility assisted routing that assist the store-and-forward model.  BUT NODES DO NOT HAVE AN EQUAL PROBABILITY OF ENCOUNTERING EACH OTHER.

Problems  Not all nodes are equally likely to encounter each other.  Nodes need to assess the probability of encountering the destination node. Social Networking to the rescue…..

Social Networking  Social Networking comes from the observation that individuals are linked by a small chain of acquaintances.  Milgram’s 1967 experiment and 6 degrees of separation.  Hsu and Helmy’s research promotes the idea that Social Network analysis techniques can be applied to disconnected MANETs.

Social Networking in MANETs  In Millgram’s experiment, the carriers of messages were not randomly selected. The participant sent the letter to the person who might be perceived as the best carrier.  Intelligent selection of good carriers based on the local information needs to be explored.  This paper proposes the use of social network analysis techniques in order to exploit the underlying social structure in order to provide information flow from source to destination in a DDTM.

Related Work  Data Mule Project  Message ferrying project  Time dependent network graphs  Epidemic Routing  PRoPHET Routing  Usage of KALMAN filters in selectively forwarding messages.

SimBetTS Routing Metric  SimBetTS Routing metric as proposed in this paper is comprised of both a node’s centrality and its social similarity.  SimBetTS Routing improves upon encounter-based strategies where direct or indirect encounters between source and destination may not be available.

Social Networks For Information Flow  Social network analysis is the study of relationships between entities and on the patterns and implications of these relationships.  Graphs may be used to represent the relational structure of social networks in a natural manner.  Each of the nodes may be represented by a vertex of a graph.  Relationships between nodes may be represented as edges of the graph.

Centrality in Graph Theory It is the quantification of the relative importance of a vertex within the graph.  Central node has a stronger capability of connecting other network members.  Three widely used centrality measures are Freeman’s degree, closeness, and betweenness measures

Centrality Measures  Freeman’s degree: - It is the number of direct ties that involve a given node. - Segregates the ‘popular’ from the ‘unpopular’ nodes. - Degree centrality (for a node pi) is calculated as follows:

Centrality Measures….  Closeness - Measures the reciprocal of the mean geodesic distance, which is the shortest path between the node and all other reachable nodes. - Closeness centrality can be measured by:

Centrality Measures….  Betweenness - This centrality measures the extent to which a node lies on the geodesic paths linking other nodes. - It can be regarded as how much a node can facilitate communication to other nodes in the network. - It can be calculated as follows:

Ego Networks  Freeman’s centrality metrics become difficult to evaluate in a network with large node populations.  This is the reason for the proposal of ego networks..  Ego networks can be defined as a network consisting of a single actor (ego) together with the actors they are connected to (alters) and all the links among those alters.  Ego network analysis can be performed locally by individual nodes without complete knowledge of the entire network.

Ego Networks vs. Sociocentric Networks  Degree centrality can easily be measured for an ego network where it is a simple count of the number of contacts.  Closeness centrality is uninformative in an ego network, since by definition an ego network only considers nodes directly related to the ego node.  Betweenness centrality in ego networks has shown to be quite a good measure when compared to that of the sociocentric measure.

Betweenness Centrality in Ego- Networks In the figure below, the rankings of the betweenness are identical for Sociocentric and Egocentric.

Drawbacks of routing based on Centrality  Central nodes suffer serious traffic congestion.  Centrality does not take into account the time varying nature of the links and the availibility of the link in the network

Strong Ties for Information Flow  Tie strength is a quantifiable property that characterizes the link between two nodes.  Brown and Reingen found that strong ties were more likely to be activated for information flow when compared to weak ties.  Tie strength factors in the time varying nature of the links.

Tie-Strength Indicators  Frequency  Intimacy/Closeness  Long Period of time (Longetivity)  Reciprocity  Recency  Multiple Social Contexts  Mutual-Confiding Trust

Usage of Tie-Strength Indicators  Tie strength indicators can be used for information flow to determine which contact has the strongest social relationship to a destination.  Messages can be forwarded through links possessing the strongest relationship, link representing a strong relationship will be more likely to be activated for information flow.

Utility of Weak ties  Granovetter emphasized that weak ties lead to information dissemination between groups.  Weak ties can act as ‘bridges’  Need is there to find routing based on a combination of strong ties and identified bridges.

Tie Predictors  Tie strength evaluates already existing connections whereas predictors use information from the past to predict likely future connections.  A network is said to show “clustering” if the probability of two nodes being connected by a link is higher when the nodes in question have a common neighbor.

Common Neighbor Metrics Here ‘score’ is the future collaboration between nodes x and y. N(x) and N(y) are neighbors of x and y respectively. P(x,y) weighs the ‘rarer’ neighbors more heavily than common neighbors.

Usage of Tie-Predictors  Tie predictors can be used in order to predict the evolution of the graph and evaluate the probability of future links occurring.  Tie predictors may be used not only to reinforce already existing contacts but to anticipate contacts that may evolve over time.

Routing based on Social Metrics  In this paper it is proposed that the combination of centrality, tie strengths, and tie predictors are highly useful in routing based on local information when the underlying network exhibits a social structure.  The combined metric is known as SimBetTS utility.

Sim-Bet-TS utility  Sim(Similarity)Bet(Betweenness)TS(Tie-Strength)  When two nodes meet, they exchange a list of encountered nodes.  this list is used to locally calculate the betweenness utility, the similarity utility, and the tie strength utility.  Each node then examines the messages it is carrying and computes the SimBetTS utility of each message destination.  Messages are then exchanged where the message is forwarded to the node holding the highest SimBetTS utility for the message destination node.

Betweenness in SimBetTS The betweenness centrality is calculated by computing the number of nodes that are indirectly connected through the ego node. Betweenness in SimBetTS relies on the Adjacency Matrix representation of the ego-nodes and its neighbors.

Similarity in SimBetTS  The adjacency matrix allows for the calculation of similarity for nodes that have been met directly, but during the exchange of the node’s contact list, information can be obtained with regard to nodes that have yet to be encountered. In the above similarity calculation Nn and Ne are the set of contacts held by node n and e, respectively.

Tie-Strength in SimBetTS  Frequency  Intimacy/Closeness  Recency The tie strength of node n for an encountered node m, where T is the set of social indicators, is given by:

Node-Utility in SimBetTS  The aim is to select the node that provides the maximum utility for carrying the message. This is achieved using a pairwise comparison matrix on the normalized relative weights of the attributes  The attributes here are the ‘Similarity’, ‘Betweenness’ and ‘Tie-Strength’

Node-Utility in SimBetTS Here U is {TSUtil,SimUtil,BetUtil}

Replication in SimBetTS  Replication may be used in order to increase the probability of message delivery.  Messages are assigned a replication value R. When two nodes meet, if the replication value R > 1 then a message copy is made. The value of R is divided between the two copies of the message. The Replication values are dependant upon the SimBetTS utility of the node

Performance of SimBetTS  SimBetTS Routing achieves the highest delivery performance by combining the three metrics. The load distribution shows that routing based on the combined metrics reduces congestion on highly central nodes.

Performance of SimBetTS

SimBetTS Routing Protocol Behavior  Similarity+Tie-Strength: The sending node has a nonzero tie strength value for the destination node and has a nonzero similarity to the destination node

SimBetTS Routing Protocol Behavior  Similarity: The sending node has never encountered the destination node resulting in a zero tie strength.

SimBetTS Routing Protocol Behavior  None: The sending node has never encountered the destination node and has no common neighbors, hence a zero similarity value.

Conclusions from the Routing Protocol Behavior  The message is forwarded to nodes with a high betweenness and social similarity, until a node with a high tie strength for the destination node is found.  In all cases, the tie strength utility for the final hop is the highest contributing utility value.  In all cases, the betweenness utility value is much reduced in its influence of the forwarding decision as the message is routed closer to the destination

SimBetTS vs. Epidemic/PRoPHET  Single-copy and multicopy SimBetTS Routing show higher message delivery when compared to that of PRoPHET.  Multicopy SimBetTS Routing achieves delivery performance similar to that of Epidemic Routing with short path lengths and low end-to-end delay.  The use of replication comes at the cost of an increased number of forwards and an increase in control data. However, when compared to that of Epidemic Routing, these metrics are still relatively low in terms of overhead

Questions???