BUBBLE Rap: Social-based Forwarding in Delay Tolerant Networks April 2013 Yong-Jin Jeong

Slides:



Advertisements
Similar presentations
Supporting Cooperative Caching in Disruption Tolerant Networks
Advertisements

Data and Computer Communications
1 Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces Dmitri Krioukov CAIDA/UCSD Joint work with F. Papadopoulos, M.
Jaringan Komputer Lanjut Packet Switching Network.
Delay bounded Routing in Vehicular Ad-hoc Networks Antonios Skordylis Niki Trigoni MobiHoc 2008 Slides by Alex Papadimitriou.
Generated Waypoint Efficiency: The efficiency considered here is defined as follows: As can be seen from the graph, for the obstruction radius values (200,
Identity and search in social networks Presented by Pooja Deodhar Duncan J. Watts, Peter Sheridan Dodds and M. E. J. Newman.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
By Libo Song and David F. Kotz Computer Science,Dartmouth College.
1 Complexity of Network Synchronization Raeda Naamnieh.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
SOCIAL-BASED FORWARDING SCHEMES Rance Fredericksen CMPE 257 Wireless Networks.
© nCode 2000 Title of Presentation goes here - go to Master Slide to edit - Slide 1 Reliable Communication for Highly Mobile Agents ECE 7995: Term Paper.
Imperial College LondonFebruary 2007 Bubble Rap: Forwarding in Small World DTNs in Ever Decreasing Circles Part 2 - People Are the Network Jon Crowcroft.
Slide Set 15: IP Multicast. In this set What is multicasting ? Issues related to IP Multicast Section 4.4.
Bubble Rap: Social-based Forwarding in DTNs Pan Hui, Jon Crowcroft, Eiko Yoneki University of Cambridge, Computer Laboratory Slides by Alex Papadimitriou.
How small labels create big improvements Pan Hui Jon Crowcroft Computer Laboratory University of Cambridge.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #5 Mobile Ad-Hoc Networks TBRPF.
Using Social Networks to Analyze Sexual Relations by Amanda Dargie.
Geographic Routing Without Location Information A. Rao, C. Papadimitriou, S. Shenker, and I. Stoica In Proceedings of the 9th Annual international Conference.
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
Wei Gao Joint work with Qinghua Li, Bo Zhao and Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University Multicasting.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
ROUTING ON THE INTERNET COSC Aug-15. Routing Protocols  routers receive and forward packets  make decisions based on knowledge of topology.
CECS 474 Computer Network Interoperability WAN Technologies & Routing
© Y. Zhu and Y. University of North Carolina at Charlotte, USA 1 Chapter 1: Social-based Routing Protocols in Opportunistic Networks Ying Zhu and.
1 Pertemuan 20 Teknik Routing Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
1 Contact Prediction, Routing and Fast Information Spreading in Social Networks Kazem Jahanbakhsh Computer Science Department University of Victoria August.
Network Aware Resource Allocation in Distributed Clouds.
Challenged Networking An Experimental Study of New Protocols and Architectures Erik Nordström.
Boundary Recognition in Sensor Networks by Topology Methods Yue Wang, Jie Gao Dept. of Computer Science Stony Brook University Stony Brook, NY Joseph S.B.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer.
A Graph-based Friend Recommendation System Using Genetic Algorithm
How Small Labels create Big Improvements April Chan-Myung Kim
Routing In Socially Selfish Delay Tolerant Networks Chan-Myung Kim
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
Group 3 Sandeep Chinni Arif Khan Venkat Rajiv. Delay Tolerant Networks Path from source to destination is not present at any single point in time. Combining.
Selfishness, Altruism and Message Spreading in Mobile Social Networks September 2012 In-Seok Kang
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
PRoPHET+: An Adaptive PRoPHET- Based Routing Protocol for Opportunistic Network Ting-Kai Huang, Chia-Keng Lee and Ling-Jyh Chen.
User-Centric Data Dissemination in Disruption Tolerant Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering Pennsylvania State University.
Efficient Labeling Scheme for Scale-Free Networks The scheme in detailsPerformance of the scheme First we fix the number of hubs (to O(log(N))) and show.
A Sociability-Based Routing Scheme for Delay-Tolerant Networks May Chan-Myung Kim
TELE202 Lecture 6 Routing in WAN 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »Packet switching in Wide Area Networks »Source: chapter 10 ¥This Lecture.
An Energy Efficient MAC Protocol for Wireless LANs, E.-S. Jung and N.H. Vaidya, INFOCOM 2002, June 2002 吳豐州.
Social-Aware Stateless Forwarding in Pocket Switched Networks Soo-Jin SHIN
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Teknik Routing Pertemuan 10 Matakuliah: H0524/Jaringan Komputer Tahun: 2009.
M. Veeraraghavan (originals by J. Liebeherr) 1 Need for Routing in Ethernet switched networks What do bridges do if some LANs are reachable only in multiple.
Author: Haoyu Song, Murali Kodialam, Fang Hao and T.V. Lakshman Publisher/Conf. : IEEE International Conference on Network Protocols (ICNP), 2009 Speaker:
On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay-Tolerant Networks 1 Wei Gao Guohong Cao Tom La Porta Jiawei Han Presented.
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
Multicasting in delay tolerant networks a social network perspective networks October2012 In-Seok Kang
© SITILabs, University Lusófona, Portugal1 Chapter 2: Social-aware Opportunistic Routing: the New Trend 1 Waldir Moreira, 1 Paulo Mendes 1 SITILabs, University.
A Multicast Routing Algorithm Using Movement Prediction for Mobile Ad Hoc Networks Huei-Wen Ferng, Ph.D. Assistant Professor Department of Computer Science.
Routing in Delay Tolerant Network Qing Ye EDIFY Group of Lehigh University.
Distance Vector Routing
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
2010 IEEE Global Telecommunications Conference, GLOBECOM 2010 Zheng Guo; Bing Wang; Jun-Hong Cui Prediction Assisted Single-copy Routing in Underwater.
1 New metrics for characterizing the significance of nodes in wireless networks via path-based neighborhood analysis Leandros A. Maglaras 1 Dimitrios Katsaros.
Spatial Aware Geographic Forwarding for Mobile Ad Hoc Networks Jing Tian, Illya Stepanov, Kurt Rothermel {tian, stepanov,
Delay-Tolerant Networks (DTNs)
Introduction to Wireless Sensor Networks
Jon Crowcroft Pan Hui Computer Laboratory University of Cambridge
Comp. Lab. Univ. Cambridge
Wireless Epidemic The wireless epidemic (Nature 449, ; 2007) by Jon Kleinberg ‘Digital traffic flows not only over the wired backbone of the Internet,
Kevin Lee & Adam Piechowicz 10/10/2009
Route Metric Proposal Date: Authors: July 2007 Month Year
Presentation transcript:

BUBBLE Rap: Social-based Forwarding in Delay Tolerant Networks April 2013 Yong-Jin Jeong

ABSTRACT –In this paper we seek to improve our understanding of human mobility in terms of social structures, and to use these structures in the design of forwarding algorithms for Pocket Switched Networks (PSNs). –We propose a social based forwarding algorithm, BUBBLE, which is shown empirically to improve the forwarding efficiency significantly compared to oblivious forwarding schemes and to PROPHET algorithm. –We also show how this algorithm can be implemented in a distributed way, which demonstrates that it is applicable in the decentralized environment of PSNs. 2

INTRODUCTION  Many MANET and some DTN routing algorithms [14] [19] provide forwarding by building and updating routing tables whenever mobility occurs.  We believe this approach is not cost effective for a PSN, since mobility is often unpredictable, and topology changes can be rapid.  Rather than exchange much control traffic to create unreliable routing structures, we prefer to search for some characteristics of the network which are less volatile than mobility.  A PSN is formed by people. –Those people’s social relationships may vary much more slowly than the topology, and therefore can be used for better forwarding decisions. 3

INTRODUCTION  In this paper, we focus on two specific aspects of society: community and centrality. –Community is an important attribute of PSNs. –Cooperation binds, but also divides human society into communities. –Human society is structured. –Within a community, some people are more popular, and interact with more people than others (i.e.have high centrality); we call them hubs. 4

INTRODUCTION  The main contributions of this paper are to answer these questions: –1. How does the variation in node popularity help us to forwarding a PSN? –2. Are communities of nodes detectable in PSN traces? –3. How well does social based forwarding work, and how does it compare to other forwarding schemes in a real (emulated) environment? –4. Can we devise a fully decentralised way for such schemes to operate? 5

INTRODUCTION  Quick answers to the above questions –We evaluate the impact of community and centrality on forwarding, and propose a hybrid algorithm, BUBBLE, that selects high centrality nodes and community members of destination as relays. 6

EXPERIMENTAL DATASETS 7

 In Infocom05, the devices were distributed to approximately fifty students attending the Infocom student workshop. Participants belong to different social communities (depending on their country of origin, research topic, etc.). However, they all attended the same event for 4 consecutive days and most of them stayed in the same hotel and attended the same sections (note, though, that Infocom is a multi-track conference).  In Hong-Kong, the people carrying the wireless devices were chosen independently in a Hong-Kong bar, to avoid any particular social relationship between them. These people have been invited to come back to the same bar after a week. They are unlikely to see each other during the experiment. 8 EXPERIMENTAL DATASETS

 In Cambridge, the iMotes were distributed mainly to two groups of students from University of Cambridge Computer Laboratory, specifically undergraduate year1 and year2 students, and also some PhD and Masters students. This dataset covers 11 days.  In Infocom06, the scenario was very similar to Infocom05 except that the scale is larger, with 80 participants. Participants were selected so that 34 out of 80 form 4 subgroups by academic affiliations.  In Reality, 100 smart phones were deployed to students and staff at MIT over a period of 9 months. These phones were running software that logged contacts with other Bluetooth enabled devices by doing Bluetooth device discovery every five minutes. 9 EXPERIMENTAL DATASETS

BUBBLE RAP FORWARDING  Introduced the LABEL scheme –Each node is assumed to have a label that informs other nodes of its affiliation; next-hop nodes are selected if they belong to the same affiliation (same label) as the destination –This is a beginning of social based forwarding in PSN, but without a concise concept of community and lack of mechanisms to move messages away from the source when the destinations are socially far away  Here we propose the BUBBLE algorithm, with the intention of bringing in a concise concept of community into PSN forwarding to achieve significant improvement of forwarding efficiency. 10

BUBBLE RAP FORWARDING  BUBBLE combines the knowledge of community structure with the knowledge of node centrality to make forwarding decisions.  Firstly, people have varying roles and popularities in society, and these should be true also in the network –the first part of the forwarding strategy is to forward messages to nodes which are more popular than the current node.  Secondly, people form communities in their social lives, and this should also be observed in the network layer –hence the second part of the forwarding strategy is to identify the members of destination communities, and to use them as relays. 11

BUBBLE RAP FORWARDING  For this algorithm, we make two assumptions: –Each node belongs to at least one community. Here we allow single node communities to exist. –Each node has a global ranking (i.e.global centrality) across the whole system, and also a local ranking within its local community. It may also belong to multiple communities and hence may have multiple local rankings. 12

BUBBLE RAP FORWARDING  Forwarding is carried out as follows. –If a node has a message destined for another node, this node first bubbles the message up the hierarchical ranking tree using the global ranking, until it reaches a node which is in the same community as the destination node. –Then the local ranking system is used instead of the global ranking, and the message continues to bubble up through the local ranking tree until the destination is reached or the message expires.  This method does not require every node to know the ranking of all other nodes in the system, but just to be able to compare ranking with the node encountered, and to push the message using a greedy approach. 13

BUBBLE RAP FORWARDING 14

BUBBLE RAP FORWARDING 15

BUBBLE RAP FORWARDING  The forwarding process fits our intuition and is taken from real life experiences. –First you try to forward the message via surrounding people more popular than you, and then you bubble it up to well-known popular people in the wider-community, such as a postman. –When the postman meets a member of the destination community, the message will be passed to that community. –The first community member who receives the message will try to identify more popular members within the community, and bubble the message up again within the local hierarchy, until the message reaches a very popular member, or the destination itself, or the message expires. 16

BUBBLE RAP FORWARDING  We answer the first question by looking at the human heterogeneity in the dataset. To calculate the individual centrality value for each node, we take an numerical approach. –1. How does the variation in node popularity help us to forwarding a PSN?  Then we count the number of times a node acts as a relay for other nodes on all the shortest delay deliveries. Here the shortest delay delivery refers to the case when the same message is delivered to the destination through different paths, and we only count the delivery with the shortest delay. –We call this number the betweenness centrality of this node in this temporal graph 17

BUBBLE RAP FORWARDING 18 This clearly shows that there is a small number of nodes which have extremely high relaying ability, and a large number of nodes have moderate or low centrality values, across all experiments.

INFERRING HUMAN COMMUNITIES  A social network consists of a set of people forming socially meaningful relationships, where prominent patterns or information flow are observed  In PSN, social networks could map to computer networks since people carry the computer devices.  To answer the second question we need community detection algorithms –2. Are communities of nodes detectable in PSN traces? 19

INFERRING HUMAN COMMUNITIES  K-CLIQUE by Palla et al –K-CLIQUE method can satisfy this requirement, but was designed for binary graphs, thus we must threshold the edges of the contact graphs in our mobility traces to use this method and it is difficult to choose an optimum threshold manually.  weighted network analysis (WNA) by Newman –WNA can work on weighted graphs directly, and doesn’t need thresholding, but it cannot detect overlapping communities  Thus we chose to use both K-CLIQUE and WNA; they have favourable features and can compli(e?)ment each other. 20

K-CLIQUE Community Detection  Palla et al. define a k-clique community as a union of all k-cliques (complete subgraphs of size k) that can be reached from each other through a series of adjacent k-cliques, where two k-cliques are said to be adjacent if they share k - 1 nodes  As k is increased, the k-clique communities shrink, but on the other hand become more cohesive since their member nodes have to be part of at least one k-clique. 21

K-CLIQUE Community Detection 22

 Modularity : – is the value of the weight of the edge between vertices v and w, if such an edge exists, and 0 otherwise –The -function (i; j) is 1 if i = j and 0 otherwise –k v is the degree of vertex v defined as ∑ w A vw ; Weighted Network Analysis

Weighted Network Analysis 24

DISTRIBUTED BUBBLE RAP  Hui et al. proposed three algorithms, named SIMPLE, K-CLIQUE and MODULARITY, for distributed community detection.  Here we introduce our distributed BUBBLE algorithm, DiBuBB, which uses the methods of Hui et al. 25

DISTRIBUTED BUBBLE RAP 26 Therefore the number of people you know is less important matter too much, but how frequently you interact with these people does matter

DISTRIBUTED BUBBLE RAP  We then consider the degree for previous unit-time slot (we call this the slot window) such that when two nodes meet each other, they compare how many unique nodes they have met in the previous unit-time slot (e.g. 6 hours).  We call this approach the single window (S-Window).  Another approach is to calculate the average value on all previous windows, such as from yesterday to now, then calculate the average degree for every 6 hours.  We call this approach the cumulative window (C-Window). 27

RESULTS AND EVALUATIONS  For each emulation in this paper, 1000 messages are created, uniformly sourced between all node pairs. Each emulation is repeated 20 times with different random seeds for statistical confidence. –Delivery ratio: The proportion of messages that have been delivered out of the total unique messages created. –Delivery cost: The total number of messages (include duplicates) transmitted across the air. To normalize this, we divide it by the total number of unique messages created. –Hop-distribution for deliveries: The distribution of the number of hops needed for all the deliveries. This reveals the social distance between sources and destinations. 28

RESULTS AND EVALUATIONS –WAIT: Hold on to a message until the sender encounters the recipient directly, which represents the lower bound for delivery and cost. –FLOOD: Messages are flooded throughout the entire system, which represents the upper bound for delivery and cost. –MCP: Multiple-Copy-Multiple-Hop. Multiple Copies are sent subject to a time-to-live hop count limit on the propagation of messages. 29

RESULTS AND EVALUATIONS –LABEL: A social based forwarding algorithm introduced by Hui et. al [11]. Messages are only forwarded to the nodes in the same community (i.e.with the same label) as the destination. –PROPHET: It calculates the delivery predictability at each node for each destination by using history of encounters and transitivity. A message is forwarded to a node if it has higher delivery predictability than the current node for that particular destination. 30

Two-Community Case  The Cambridge data can clearly be divided into two communities the undergraduate year 1 (Group A) and year 2 (Group B) groups, both by experimental design, and as confirmed by our community detection algorithms. 31 Forwarding messages to the popular nodes would make delivery more cost effective for messages within the same community.

Two-Community Case 32 Figure 6(a) shows the individual node centrality when traffic is created from one group to another. Figure 6(b) shows the correlation of node centrality within an individual group and inter-group centrality.

Two-Community Case 33

Multiple-Community Case 34

Multiple-Community Case 35

Multiple-Community Case 36

Multiple-Community Case 37

Approximating Centrality 38 In RANK, messages are pushed to nodes which have a higher ranking than the current node, until either they reach the destinations or they expire.

CONCLUSION AND FUTUREWORK  We have shown that it is possible to detect characteristic properties of social grouping in a decentralised fashion from a diverse set of real world traces.  We have demonstrated that such characteristics can be effectively used in forwarding decisions.  Our algorithms are designed for a delay-tolerant network environment, built out of human-carried devices, and we have shown that they have similar delivery ratio to, but much lower resource utilisation than flooding, control flooding, and PROPHET 39