On Exploiting Transient Contact Patterns for Data Forwarding in Delay Tolerant Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering.

Slides:



Advertisements
Similar presentations
Supporting Cooperative Caching in Disruption Tolerant Networks
Advertisements

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobility Increase the Capacity of Ad-hoc Wireless Network Matthias Gossglauser / David Tse Infocom 2001.
CSLI 5350G - Pervasive and Mobile Computing Week 6 - Paper Presentation “Exploiting Beacons for Scalable Broadcast Data Dissemination in VANETs” Name:
Preference-based Mobility Model and the Case for Congestion Relief in WLANs using Ad hoc Networks Wei-jen Hsu, Kashyap Merchant, Haw-wei Shu, Chih-hsin.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Forwarding Redundancy in Opportunistic Mobile Networks: Investigation and Elimination Wei Gao 1, Qinghua Li 2 and Guohong Cao 3 1 The University of Tennessee,
By Libo Song and David F. Kotz Computer Science,Dartmouth College.
Using Redundancy to Cope with Failures in a Delay Tolerant Network Sushant Jain, Michael Demmer, Rabin Patra, Kevin Fall Source:
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
On Appropriate Assumptions to Mine Data Streams: Analyses and Solutions Jing Gao† Wei Fan‡ Jiawei Han† †University of Illinois at Urbana-Champaign ‡IBM.
SOCIAL-BASED FORWARDING SCHEMES Rance Fredericksen CMPE 257 Wireless Networks.
Efficient Retrieval of User Contents in MANETs Δημόκας Νικόλαος Data Engineering Laboratory, Aristotle University of Thessaloniki.
Bubble Rap: Social-based Forwarding in DTNs Pan Hui, Jon Crowcroft, Eiko Yoneki University of Cambridge, Computer Laboratory Slides by Alex Papadimitriou.
Extending Network Lifetime for Precision-Constrained Data Aggregation in Wireless Sensor Networks Xueyan Tang School of Computer Engineering Nanyang Technological.
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
VADD: Vehicle-Assisted Data Delivery in Vehicular Ad-hoc Networks
Wei Gao Joint work with Qinghua Li, Bo Zhao and Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University Multicasting.
An adaptive framework of multiple schemes for event and query distribution in wireless sensor networks Vincent Tam, Keng-Teck Ma, and King-Shan Lui IEEE.
© Y. Zhu and Y. University of North Carolina at Charlotte, USA 1 Chapter 1: Social-based Routing Protocols in Opportunistic Networks Ying Zhu and.
Localization With Mobile Anchor Points in Wireless Sensor Networks
Stochastic sleep scheduling (SSS) for large scale wireless sensor networks Yaxiong Zhao Jie Wu Computer and Information Sciences Temple University.
Wei Gao1 and Qinghua Li2 1The University of Tennessee, Knoxville
Infrastructure of MANETs  MANETS are without a fixed infrastructure  Network Graphs in MANETS are rarely or ever connected  MANET routing protocols.
Your Friends Have More Friends Than You Do: Identifying Influential Mobile Users Through Random Walks Bo Han, Aravind Srinivasan University of Maryland.
Context-aware Adaptive Routing for Delay Tolerant Networking Mirco Musolesi Joint work with Cecilia Mascolo Department of Computer Science University College.
Primary Social Behavior aware Routing and Scheduling for Cognitive Radio Networks Shouling Ji and Raheem Beyah Georgia Institute of Technology Zhipeng.
UbiStore: Ubiquitous and Opportunistic Backup Architecture. Feiselia Tan, Sebastien Ardon, Max Ott Presented by: Zainab Aljazzaf.
Find regular encounter pattern from mobile users. Regular encounter indicates an encounter trend that is repetitive and consistent. Using this metric can.
Wireless Sensor Networks COE 499 Energy Aware Routing
Exploiting Temporal Dependency for Opportunistic Forwarding in Urban Vehicular Network [MANET-2] Presented by Cui Kai 2011/5/25 Hongzi Zhu, Sherman Shen,
Prediction Assisted Single-copy Routing in Underwater Delay Tolerant Networks Zheng Guo, Bing Wang and Jun-Hong Cui Computer Science & Engineering Department,
Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks.
Energy Efficient Phone-to-Phone Communication Based on WiFi Hotspots in PSN En Wang 1,2, Yongjian Yang 1, and Jie Wu 2 1 Dept. of Computer Science and.
Distributed Maintenance of Cache Freshness in Opportunistic Mobile Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering Pennsylvania.
Routing In Socially Selfish Delay Tolerant Networks Chan-Myung Kim
ECO-DNS: Expected Consistency Optimization for DNS Chen Stephanos Matsumoto Adrian Perrig © 2013 Stephanos Matsumoto1.
Content Sharing over Smartphone-Based Delay- Tolerant Networks.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Connectivity-Aware Routing (CAR) in Vehicular Ad Hoc Networks Valery Naumov & Thomas R. Gross ETH Zurich, Switzerland IEEE INFOCOM 2007.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
PRoPHET+: An Adaptive PRoPHET- Based Routing Protocol for Opportunistic Network Ting-Kai Huang, Chia-Keng Lee and Ling-Jyh Chen.
User-Centric Data Dissemination in Disruption Tolerant Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering Pennsylvania State University.
Content Dissemination in Mobile Social Networks Cheng-Fu Chou.
Efficient Energy Management Protocol for Target Tracking Sensor Networks X. Du, F. Lin Department of Computer Science North Dakota State University Fargo,
A Sociability-Based Routing Scheme for Delay-Tolerant Networks May Chan-Myung Kim
1 A Framework for Measuring and Predicting the Impact of Routing Changes Ying Zhang Z. Morley Mao Jia Wang.
SR: A Cross-Layer Routing in Wireless Ad Hoc Sensor Networks Zhen Jiang Department of Computer Science West Chester University West Chester, PA 19335,
1 Utilizing Shared Vehicle Trajectories for Data Forwarding in Vehicular Networks IEEE INFOCOM MINI-CONFERENCE Fulong Xu, Shuo Gu, Jaehoon Jeong, Yu Gu,
UCLA ENGINEERING Computer Science RobustGeo: a Disruption-Tolerant Geo-routing Protocol Ruolin Fan, Yu-Ting Yu *, Mario Gerla UCLA, Los Angeles, CA, USA.
Social-Aware Stateless Forwarding in Pocket Switched Networks Soo-Jin SHIN
Ching-Ju Lin Institute of Networking and Multimedia NTU
Joint Replication-Migration-based Routing in Delay Tolerant Networks Yunsheng Wang and Jie Wu Temple University Zhen Jiang Feng Li West Chester Unveristy.
On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay-Tolerant Networks 1 Wei Gao Guohong Cao Tom La Porta Jiawei Han Presented.
Multicasting in delay tolerant networks a social network perspective networks October2012 In-Seok Kang
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Chien-Shiu Lin, Wei-Shyh Chang, Ling-Jyh Chen, Cheng-Fu Chou, and Ting-Kai Huang.
Efficient Geographic Routing in Multihop Wireless Networks Seungjoon Lee*, Bobby Bhattacharjee*, and Suman Banerjee** *Department of Computer Science University.
Courtesy Piggybacking: Supporting Differentiated Services in Multihop Mobile Ad Hoc Networks Wei LiuXiang Chen Yuguang Fang WING Dept. of ECE University.
Distributed Localization Using a Moving Beacon in Wireless Sensor Networks IEEE Transactions on Parallel and Distributed System, Vol. 19, No. 5, May 2008.
Nov. 29, 2006GLOBECOM /17 A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks Stephen S. Yau, Wei Gao, and Dazhi.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks Zhao, J.; Cao, G. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 鄭宇辰
National Taiwan University Department of Computer Science and Information Engineering Vinod Namboodiri and Lixin Gao University of Massachusetts Amherst.
2010 IEEE Global Telecommunications Conference, GLOBECOM 2010 Zheng Guo; Bing Wang; Jun-Hong Cui Prediction Assisted Single-copy Routing in Underwater.
1 ICCCN 2003 Modelling TCP Reno with Spurious Timeouts in Wireless Mobile Environments Shaojian Fu School of Computer Science University of Oklahoma.
Context-aware Adaptive Routing for Delay Tolerant Networking
Mingze Zhang, Mun Choon Chan and A. L. Ananda School of Computing
En Wang 1,2 , Yongjian Yang 1 , and Jie Wu 2
Ling-Jyh Chen and Ting-Kai Huang
Presentation transcript:

On Exploiting Transient Contact Patterns for Data Forwarding in Delay Tolerant Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering Pennsylvania State University

Outline Introduction Trace-based Pattern Formulation Data Forwarding Approach Performance Evaluation Summary & Future Work

Data Forwarding in DTNs Carry-and-Forward methods Mobile nodes physically carry data as relays Major problem: appropriate data forwarding metric for relay selection Data forwarding metric measures the node’s capability of contacting others in the future

Our Focus Effective data forwarding metric for a short time constraint Transient node contact pattern Consider different time periods in a day Node contact pattern may vary temporally Relays selected based on cumulative contact patterns may not be the best choice during a short time period

Transient Contact Pattern Transient contact distribution Highly skewed during different time periods Example: different people contact during different time periods in a day Cannot be differentiated from the cumulative contact rate Contact frequency

Transient Contact Pattern Transient connectivity Some nodes remain connected during specific time periods to form Transient Connected Subnets (TCS) Example: a student remains connected with his classmates during the class Multi-hop communication within the TCS TCS 10:00AM 11:00AM

Transient Contact Pattern Node A sends data to a destination at 12pm with a 6-hour time constraint Valid time period: 12pm-18pm A node forwards data to another node with higher data forwarding metric Cumulative contact rate Transient contact rate Direct contact Transient connected subnet

Major Contributions Formulate transient node contact patterns based on realistic DTN traces Develop data forwarding metrics to analytically predict node contact capability with better accuracy

Outline Introduction Trace-based Pattern Formulation Data Forwarding Approach Performance Evaluation Summary & Future Work

Traces Record user contacts at university campus Various wireless interfaces Bluetooth: periodically detect nearby peers WiFi: associate to the best Access Point (AP)

Transient Contact Distribution Skewed distribution of node contacts Over 50% between 12pm and 16pm Less than 7% between 22pm and 7am

Transient Contact Distribution Alternative appearances of on-period and off-period Contact process during on-periods is stable and predictable Contacts during off-periods are random and unpredictable On-period An on-period is determined by a set of contacts happened at time. For, EndStart

Distribution of On/Off-Period Length Accurately approximated by normal distribution hours for both traces On-periods are short

Transient Connectivity Distribution of contact duration Many contacts with non-negligible duration Over 20% last longer than 1 hour

Transient Connectivity The temporal change of TCS size of a mobile node Formulated as Gaussian function

Outline Introduction Trace-based Pattern Formulation Data Forwarding Approach Performance Evaluation Summary & Future Work

Data Forwarding Metric The capability C i of node i to contact other nodes during time t c : the current time t e : the data expiration time The expected number of nodes that node i can contact N: the total number of nodes in the network c ij : pairwise contact probability between node i and j

Pairwise Contact Probability Basic idea: only based on the contact process during on-periods Case 1: t c is within an on-going on-period Case 2: the next on- period starts before t e

Case 1: t c is within an on-going on-period, where Pairwise Contact Probability Contact process within an on- period is modeled as Poisson PDF of the on-period length T = t e – t c

Case 2: the next on-period starts before t e, where Pairwise Contact Probability The last on-period ends before t c PDF of the off-period length

Exploiting Transient Connectivity A node indirectly contacts all the nodes in a TCS if it contacts any one node in the TCS Temporal change of TCS size:

Outline Introduction Trace-based Pattern Formulation Data Forwarding Approach Performance Evaluation Summary & Future Work

Comparisons Data forwarding metrics Contact Counts (CC) Betweenness Cumulative Contact Probability (CCP) Data forwarding strategies Compare-and-Forward Delegation Forwarding Spray-and-Wait

Performance Comparison Compare-and-Forward in the UCSD trace 100% 20% Better delivery ratio Similar forwarding cost

Two Cases of Contacts 70% 30%

Summary Effective data forwarding metrics for data forwarding in DTNs with a short time constraint Improves delivery ratio with similar forwarding cost Transient node contact patterns Transient contact distribution Transient connectivity Future work The overhead of identifying transient contact pattern The temporal evolution of social network structure

Thank you! The paper and slides are also available at:

Length Distribution of On/Off-Period On-periods are generally short Most contacts are covered by on-periods We have hours for both traces

Characterizing Transient Contact Pattern Transient contact patterns are characterized at real-time at each node For nodes i and j, the parameters of their on/off-period are updated every time they contact Each node detects its TCS whenever it contacts another node A detecting beacon message is broadcasted within the TCS Each node in the TCS replies to the original sender upon receiving the beacon.

Prediction Error The start of a new on-period? Random contact in an off-period? Node contact randomness Unclassifiable contact Off-periods longer than 24 hours Most contacts happen during on-periods The two cases are only found at nodes with low contact frequency

Different values of T on 88

Node Buffer Constraint Forwarding only one data item A node simply drops the data in cases of limited buffer The consideration of node buffer constraint is trivial Forwarding multiple data items The consideration of node buffer constraint is formulated as a knapsack problem Various data forwarding metrics can be applied

Related Work Node contact capability is estimated from various ways Prediction of node mobility and co-location events Semi-Markov chain, Kalman filter Node contact pattern as abstraction of node mobility Exploitation of social network concepts Centrality, social community, homophily Various metrics apply to the same forwarding strategy Single-copy Multiple-copy Spray-and-Wait, Delegation Forwarding