Selfishness, Altruism and Message Spreading in Mobile Social Networks September 2012 In-Seok Kang

Slides:



Advertisements
Similar presentations
Robin Kravets Tarek Abdelzaher Department of Computer Science University of Illinois The Phoenix Project.
Advertisements

Supporting Cooperative Caching in Disruption Tolerant Networks
Mobility Increase the Capacity of Ad-hoc Wireless Network Matthias Gossglauser / David Tse Infocom 2001.
BY PAYEL BANDYOPADYAY WHAT AM I GOING TO DEAL ABOUT? WHAT IS AN AD-HOC NETWORK? That doesn't depend on any infrastructure (eg. Access points, routers)
Minimum Energy Mobile Wireless Networks IEEE JSAC 2001/10/18.
Generated Waypoint Efficiency: The efficiency considered here is defined as follows: As can be seen from the graph, for the obstruction radius values (200,
Identity and search in social networks Presented by Pooja Deodhar Duncan J. Watts, Peter Sheridan Dodds and M. E. J. Newman.
Forwarding Redundancy in Opportunistic Mobile Networks: Investigation and Elimination Wei Gao 1, Qinghua Li 2 and Guohong Cao 3 1 The University of Tennessee,
1 Part 3. Research Themes Social-based Communication Epidemiology Complex Networks Human Mobility Social Phenomena DTN Capacity.
Are You moved by Your Social Network Application? Abderrahmen Mtibaa, Augustin Chaintreau, Jason LeBrun, Earl Oliver, Anna-Kaisa Pietilainen, Christophe.
By Libo Song and David F. Kotz Computer Science,Dartmouth College.
1 Data Persistence in Large-scale Sensor Networks with Decentralized Fountain Codes Yunfeng Lin, Ben Liang, Baochun Li INFOCOM 2007.
Peer-to-Peer Based Multimedia Distribution Service Zhe Xiang, Qian Zhang, Wenwu Zhu, Zhensheng Zhang IEEE Transactions on Multimedia, Vol. 6, No. 2, April.
© nCode 2000 Title of Presentation goes here - go to Master Slide to edit - Slide 1 Reliable Communication for Highly Mobile Agents ECE 7995: Term Paper.
NCKU CSIE CIAL1 Principles and Protocols for Power Control in Wireless Ad Hoc Networks Authors: Vikas Kawadia and P. R. Kumar Publisher: IEEE JOURNAL ON.
Imperial College LondonFebruary 2007 Bubble Rap: Forwarding in Small World DTNs in Ever Decreasing Circles Part 2 - People Are the Network Jon Crowcroft.
A Measurement -driven Analysis of Information Propagation in the Flickr Social Network Offense April 29.
Mobility Increases Capacity In Ad-Hoc Wireless Networks Lecture 17 October 28, 2004 EENG 460a / CPSC 436 / ENAS 960 Networked Embedded Systems & Sensor.
Bubble Rap: Social-based Forwarding in DTNs Pan Hui, Jon Crowcroft, Eiko Yoneki University of Cambridge, Computer Laboratory Slides by Alex Papadimitriou.
Dynamic Medial Axis Based Motion Planning in Sensor Networks Lan Lin and Hyunyoung Lee Department of Computer Science University of Denver
Bluenet a New Scatternet Formation Scheme * Huseyin Ozgur Tan * Zifang Wang,Robert J.Thomas, Zygmunt Haas ECE Cornell Univ*
On Self Adaptive Routing in Dynamic Environments -- A probabilistic routing scheme Haiyong Xie, Lili Qiu, Yang Richard Yang and Yin Yale, MR and.
Wei Gao Joint work with Qinghua Li, Bo Zhao and Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University Multicasting.
Performance Evaluation of Vehicular DTN Routing under Realistic Mobility Models Pei’en LUO.
Pocket Switched Networks: Real-world Mobility and its Consequences for Opportunistic Forwarding Jon Crowcroft,Pan Hui (Ben) Augustin Chaintreau, James.
Vikramaditya. What is a Sensor Network?  Sensor networks mainly constitute of inexpensive sensors densely deployed for data collection from the field.
Hongyu Gong, Lutian Zhao, Kainan Wang, Weijie Wu, Xinbing Wang
Network Aware Resource Allocation in Distributed Clouds.
Wei Gao1 and Qinghua Li2 1The University of Tennessee, Knoxville
1 Heterogeneity in Multi-Hop Wireless Networks Nitin H. Vaidya University of Illinois at Urbana-Champaign © 2003 Vaidya.
Authors: Ioannis Komnios Sotirios Diamantopoulos Vassilis Tsaoussidis ComNet Group.
1 Delay Tolerant Network Routing Sathya Narayanan, Ph.D. Computer Science and Information Technology Program California State University, Monterey Bay.
ACN: RED paper1 Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson, IEEE Transactions on Networking, Vol.1, No. 4, (Aug.
Energy Efficient Phone-to-Phone Communication Based on WiFi Hotspots in PSN En Wang 1,2, Yongjian Yang 1, and Jie Wu 2 1 Dept. of Computer Science and.
Distributed Maintenance of Cache Freshness in Opportunistic Mobile Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering Pennsylvania.
How Small Labels create Big Improvements April Chan-Myung Kim
Routing In Socially Selfish Delay Tolerant Networks Chan-Myung Kim
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
Group 3 Sandeep Chinni Arif Khan Venkat Rajiv. Delay Tolerant Networks Path from source to destination is not present at any single point in time. Combining.
Communication Paradigm for Sensor Networks Sensor Networks Sensor Networks Directed Diffusion Directed Diffusion SPIN SPIN Ishan Banerjee
PRoPHET+: An Adaptive PRoPHET- Based Routing Protocol for Opportunistic Network Ting-Kai Huang, Chia-Keng Lee and Ling-Jyh Chen.
2007/03/26OPLAB, NTUIM1 A Proactive Tree Recovery Mechanism for Resilient Overlay Network Networking, IEEE/ACM Transactions on Volume 15, Issue 1, Feb.
User-Centric Data Dissemination in Disruption Tolerant Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering Pennsylvania State University.
A Sociability-Based Routing Scheme for Delay-Tolerant Networks May Chan-Myung Kim
Complex Contagions Models in Opportunistic Mobile Social Networks Yunsheng Wang Dept. of Computer Science, Kettering University Jie Wu Dept. of Computer.
Maximizing the lifetime of WSN using VBS Yaxiong Zhao and Jie Wu Computer and Information Sciences Temple University.
Void Traversal for Guaranteed Delivery in Geometric Routing
1 Utilizing Shared Vehicle Trajectories for Data Forwarding in Vehicular Networks IEEE INFOCOM MINI-CONFERENCE Fulong Xu, Shuo Gu, Jaehoon Jeong, Yu Gu,
SOCIAL HOUSEKEEPING THROUGH INTERCOMMUNICATING APPLIANCES AND SHARED RECIPES MERGING IN A PERVASIVE WEB-SERVICES INFRASTRUCTURE WP8 – Tests Ghent CREW.
Social-Aware Stateless Forwarding in Pocket Switched Networks Soo-Jin SHIN
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Interconnect Networks Basics. Generic parallel/distributed system architecture On-chip interconnects (manycore processor) Off-chip interconnects (clusters.
On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay-Tolerant Networks 1 Wei Gao Guohong Cao Tom La Porta Jiawei Han Presented.
1 Part 3. Research Themes Social-based Communication Epidemiology Complex Networks Human Mobility Social Phenomena DTN Capacity.
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
Multicasting in delay tolerant networks a social network perspective networks October2012 In-Seok Kang
Mix networks with restricted routes PET 2003 Mix Networks with Restricted Routes George Danezis University of Cambridge Computer Laboratory Privacy Enhancing.
Energy-Efficient Randomized Switching for Maximizing Lifetime in Tree- Based Wireless Sensor Networks Sk Kajal Arefin Imon, Adnan Khan, Mario Di Francesco,
© SITILabs, University Lusófona, Portugal1 Chapter 2: Social-aware Opportunistic Routing: the New Trend 1 Waldir Moreira, 1 Paulo Mendes 1 SITILabs, University.
Speaker : Yu-Hui Chen Authors : Dinuka A. Soysa, Denis Guangyin Chen, Oscar C. Au, and Amine Bermak From : 2013 IEEE Symposium on Computational Intelligence.
Load Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department RPI Costas Busch CSCI Department.
Network Dynamics and Simulation Science Laboratory Structural Analysis of Electrical Networks Jiangzhuo Chen Joint work with Karla Atkins, V. S. Anil Kumar,
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
BUBBLE Rap: Social-based Forwarding in Delay Tolerant Networks April 2013 Yong-Jin Jeong
Jon Crowcroft Pan Hui Computer Laboratory University of Cambridge
Comp. Lab. Univ. Cambridge
Effective Social Network Quarantine with Minimal Isolation Costs
Kevin Lee & Adam Piechowicz 10/10/2009
Effectiveness of the 2-hop Routing Strategy in MANETS
Korea University of Technology and Education
Presentation transcript:

Selfishness, Altruism and Message Spreading in Mobile Social Networks September 2012 In-Seok Kang

Abstract  Many kinds of communication networks, in particular social and opportunistic networks, rely at least partly on humans to help move data across the network.  In this paper, we study the impact of different distributions of altruism on the throughput and delay of mobile social communication system.  To the best of our knowledge, this is the first complete study of the impact of altruism on mobile social networks, including the impact of topologies and traffic patterns. 2

INTRODUCTION  We aim to build Pocket Switched Networks (PSN) for such environments.  A PSN is a type of Delay Tolerant Networks (DTN) which uses contact opportunities to allow humans to communicate without network infrastructure.  Since humans constitute the network, human altruistic behavior impacts the throughput of the communication system.  In this paper, we aim to give a systematic study of the impact of altruism on communication, particularly on opportunistic networks, but we expect our results to be applicable to other social networks. 3

MOBILE SOCIAL EXPERIMENTS  In this paper, we use three experimental datasets gathered by the Haggle Project 1 over two years, referred to as Cambridge, Infocom05, and Infocom06; and one dataset from the MIT Reality Mining Project, referred to as Reality.  Cambridge –University of Cambridge Computer Laboratory –undergraduate Year 1 and Year 2 students, some PhD and Masters students.  Infocom05 –mobile devices were distributed to approximately fifty students attending the Infocom student workshop.  Infocom06 –The scenario was very similar to Infocom05 except that the scale is larger 4

 Reality –100 smart phones were deployed to students and staff at MIT over a period of 9 months. MOBILE SOCIAL EXPERIMENTS 5

ALTRUISM AND TRAFFIC MODELS  Altruism Models –Altruism is observed in many aspects of the modern societies. –In general, each node (or person) can have different altruism values with respect to other nodes (or people). –Here we examine several altruism distributions, including a fixed percentage of selfish nodes, and uniform, normal, and geometric distributions of altruistic values for the whole population. –All altruism values are distributed between 0 and 1, where 0 stands for totally selfish and 1 stands for totally altruistic. 6

ALTRUISM AND TRAFFIC MODELS  Percentage of Selfishness, the percentage of selfish nodes varies between 0 and 100, and the other nodes are totally altruistic.  Uniform Distribution, the altruistic value of the whole population is uniformly distributed between 0 and 1. –Uniform and normal are distributions popularly encountered in nature and can be possible models for altruism.  Normal Distribution, the altruistic value of the whole population follows the normal distribution with the values normalised to between 0 and 1. 7

ALTRUISM AND TRAFFIC MODELS 8

ALTRUISM AND TRAFFIC MODELS  Degree-biased –where k min and k max are respectively the smallest and the largest degrees in the network. –With this formula, independently of the value of α, we have a i = 0 for k i = k min, and a i = 1 for k i = k max, that is the node with lowest degree always has a = 0, while the hub has a = 1. The scenario for this is that in social network if a person has too many friends, he may not have enough resource to help all of them, while a person with only one single friend will probably be very willing to help out this friend. 9

ALTRUISM AND TRAFFIC MODELS  Community-biased Distribution, considers also the heterogeneity of altruism towards different people. –we model the altruism on each node using two variables, a and e, for intra-community and inter-community altruism, respectively. –For convenient presentation later, we would use (0.7,0.1) to represent 0.7 probability to carry data for intra-community and 0.1 for carrying data for intercommunity

ALTRUISM AND TRAFFIC MODELS  Traffic Models –Here we assume asynchronous communication for the application scenario.  Uniform Traffic: The source-destination pairs are uniformly distributed throughout the whole population.  Community-biased Traffic: Each node tend to communicate more with people inside their community and less with people in other communities. –Pintra = intra-community –Pinter = inter-community –Pintra + Pinter = 1 11

RESULTS AND EVALUATIONS It seems that the delivery ratio decreases linearly with the percentage of selfish nodes. It is less tolerant to selfish nodes than the static network cases, but it makes sense here that the delivery ratio of a mobile network is proportional to the number of users participating in the system. 12

RESULTS AND EVALUATIONS Each graph shows the delivery ratio under all-altruistic, normal, uniform, high-degree-biased, and low-degree-biased altruism distribution. 13

RESULTS AND EVALUATIONS we can see that normal, uniform, and high-degree-biased distributions yield very similar delivery ratios 14

RESULTS AND EVALUATIONS In addition the delivery ratios of these distributions are very close to the performance of the “All Altruistic” case, especially for the Cambridge datasets. The low-degree-biased case has lower delivery ratio in both cases. 15 Fig. 2. MIT(reality) Fig. 3. Cambridge

RESULTS AND EVALUATIONS –We set the TTL to one day for Cambridge and one week for Reality 16

EVALUTION USING SOCIAL NETWORK MODELS  Social Network Models –Caveman Model A graph is built starting from K fully connected graphs. According to this model, every edge of the initial network is re-wired to point to a node of another cave with a certain probability p 17

EVALUTION USING SOCIAL NETWORK MODELS  Kumpula Model –The Kumpula model is characterised by two attachment schemes, the local attachment (LA) where links are added between neighbour nodes, and the global attachment (GA) where links are added between nodes pairs further away on the topology. –The Kumpula model also implements the node deletion (ND) mechanism, where some nodes are removed and replace with new nodes, which is similar to the forgotten process of social life. 18

EVALUTION USING SOCIAL NETWORK MODELS 19

EVALUTION USING SOCIAL NETWORK MODELS 20

EVALUTION USING SOCIAL NETWORK MODELS 21

CONCLUSION AND FUTURE WORK  Opportunistic communication and information dissemination in social networks are surprisingly robust toward the form of altruism distribution, largely due to their multiple forwarding paths.  In the future, we can study variations of this. For example, limit the number of delivery requests for a single user to avoid excessive requests, which can result in higher delivery.  One more thing that would be interesting to look at would be the power consumption of nodes, and how it is affected by altruism, for example to see how much power a node might save by choosing to be selfish compared with being only altruistic within its community. 22