Paradigm Shift in Protocol Design –May end up with suboptimal performance or failures due to lack of context in the design Design general purpose protocols.

Slides:



Advertisements
Similar presentations
Robin Kravets Tarek Abdelzaher Department of Computer Science University of Illinois The Phoenix Project.
Advertisements

Supporting Cooperative Caching in Disruption Tolerant Networks
Data and Computer Communications
Energy-Efficient Computing for Wildlife Tracking: Design Tradeoffs and Early Experiences with ZebraNet Presented by Eric Arnaud Makita
Analysis and Modeling of Social Networks Foudalis Ilias.
CSLI 5350G - Pervasive and Mobile Computing Week 6 - Paper Presentation “Exploiting Beacons for Scalable Broadcast Data Dissemination in VANETs” Name:
Preference-based Mobility Model and the Case for Congestion Relief in WLANs using Ad hoc Networks Wei-jen Hsu, Kashyap Merchant, Haw-wei Shu, Chih-hsin.
Delay and Throughput in Random Access Wireless Mesh Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department Rensselaer Polytechnic Institute (RPI)
On Selfish Routing In Internet-like Environments Lili Qiu (Microsoft Research) Yang Richard Yang (Yale University) Yin Zhang (AT&T Labs – Research) Scott.
Trace-driven Context-aware Mobile Networks Towards Mobile Social Networks Ahmed Helmy Computer and Information Science and Engineering (CISE) Dept Mobile.
An Approach to Evaluate Data Trustworthiness Based on Data Provenance Department of Computer Science Purdue University.
Topology Generation Suat Mercan. 2 Outline Motivation Topology Characterization Levels of Topology Modeling Techniques Types of Topology Generators.
Forwarding Redundancy in Opportunistic Mobile Networks: Investigation and Elimination Wei Gao 1, Qinghua Li 2 and Guohong Cao 3 1 The University of Tennessee,
1 William Lee Duke University Department of Electrical and Computer Engineering Durham, NC Analysis of a Campus-wide Wireless Network February 13,
Emulatore di Protocolli di Routing per reti Ad-hoc Alessandra Giovanardi DI – Università di Ferrara Pattern Project Area 3: Problematiche di instradamento.
Multi-Variate Analysis of Mobility Models for Network Protocol Performance Evaluation Carey Williamson Nayden Markatchev
1 Next Century Challenges: Scalable Coordination in sensor Networks MOBICOMM (1999) Deborah Estrin, Ramesh Govindan, John Heidemann, Satish Kumar Presented.
By Libo Song and David F. Kotz Computer Science,Dartmouth College.
Using Structure Indices for Efficient Approximation of Network Properties Matthew J. Rattigan, Marc Maier, and David Jensen University of Massachusetts.
Graphs and Topology Yao Zhao. Background of Graph A graph is a pair G =(V,E) –Undirected graph and directed graph –Weighted graph and unweighted graph.
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Routing Protocols II.
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
Yung-Chih Chen Jim Kurose and Don Towsley Computer Science Department University of Massachusetts Amherst A Mixed Queueing Network Model of Mobility in.
Ahmed Helmy Computer and Information Science and Engineering (CISE) Department University of Florida Founder.
Detecting Node encounters through WiFi By: Karim Keramat Jahromi Supervisor: Prof Adriano Moreira Co-Supervisor: Prof Filipe Meneses Oct 2013.
Ahmed Helmy Computer and Information Science and Engineering (CISE) Department University of Florida Founder.
1 Chalermek Intanagonwiwat (USC/ISI) Ramesh Govindan (USC/ISI) Deborah Estrin (USC/ISI and UCLA) DARPA Sponsored SCADDS project Directed Diffusion
EXTRACT: MINING SOCIAL FEATURES FROM WLAN TRACES: A GENDER-BASED CASE STUDY By Udayan Kumar Ahmed Helmy University of Florida Presented by Ahmed Alghamdi.
UNIVERSITY of NOTRE DAME COLLEGE of ENGINEERING Preserving Location Privacy on the Release of Large-scale Mobility Data Xueheng Hu, Aaron D. Striegel Department.
Gender based analysis Udayan Kumar Computer and Information Science and Engineering (CISE) Department, University Of Florida, Gainesville, FL.
MobiQuitous 2004Kimaya Sanzgiri Leveraging Mobility to Improve Quality of Service in Mobile Networks Kimaya Sanzgiri and Elizabeth Belding-Royer Department.
1 Contact Prediction, Routing and Fast Information Spreading in Social Networks Kazem Jahanbakhsh Computer Science Department University of Victoria August.
Paradigm Shift in Protocol Design –May end up with suboptimal performance or failures due to lack of context in the design Design general purpose protocols.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Extract: Mining Social Features from WLAN Traces A Gender-Based Case Study Udayan Kumar and Ahmed Helmy Computer and Information Sciences and Engineering,
Ahmed Helmy, USC1 State Analysis and Aggregation for Multicast-based Micro Mobility Ahmed Helmy Electrical Engineering Department University of Southern.
Find regular encounter pattern from mobile users. Regular encounter indicates an encounter trend that is repetitive and consistent. Using this metric can.
Prediction Assisted Single-copy Routing in Underwater Delay Tolerant Networks Zheng Guo, Bing Wang and Jun-Hong Cui Computer Science & Engineering Department,
Presented by Venkat Rajiv Vasireddi Pradeep Ramamoorthy.
PERVASIVE COMPUTING MIDDLEWARE BY SCHIELE, HANDTE, AND BECKER A Presentation by Nancy Shah.
On Exploiting Transient Contact Patterns for Data Forwarding in Delay Tolerant Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering.
How Small Labels create Big Improvements April Chan-Myung Kim
Routing In Socially Selfish Delay Tolerant Networks Chan-Myung Kim
CSCI 465 D ata Communications and Networks Lecture 15 Martin van Bommel CSCI 465 Data Communications & Networks 1.
Selfishness, Altruism and Message Spreading in Mobile Social Networks September 2012 In-Seok Kang
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Energy-Efficient Signal Processing and Communication Algorithms for Scalable Distributed Fusion.
Communication Paradigm for Sensor Networks Sensor Networks Sensor Networks Directed Diffusion Directed Diffusion SPIN SPIN Ishan Banerjee
PRoPHET+: An Adaptive PRoPHET- Based Routing Protocol for Opportunistic Network Ting-Kai Huang, Chia-Keng Lee and Ling-Jyh Chen.
Peer Centrality in Socially-Informed P2P Topologies Nicolas Kourtellis, Adriana Iamnitchi Department of Computer Science & Engineering University of South.
User-Centric Data Dissemination in Disruption Tolerant Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering Pennsylvania State University.
A Passive Approach to Sensor Network Localization Rahul Biswas and Sebastian Thrun International Conference on Intelligent Robots and Systems 2004 Presented.
1 Utilizing Shared Vehicle Trajectories for Data Forwarding in Vehicular Networks IEEE INFOCOM MINI-CONFERENCE Fulong Xu, Shuo Gu, Jaehoon Jeong, Yu Gu,
On Selfish Routing In Internet-like Environments Lili Qiu (Microsoft Research) Yang Richard Yang (Yale University) Yin Zhang (AT&T Labs – Research) Scott.
Network Community Behavior to Infer Human Activities.
Social-Aware Stateless Forwarding in Pocket Switched Networks Soo-Jin SHIN
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
© 2008 Frans Ekman Mobility Models for Mobile Ad Hoc Network Simulations Frans Ekman Supervisor: Jörg Ott Instructor: Jouni Karvo.
Mobility Models for Wireless Ad Hoc Network Research EECS 600 Advanced Network Research, Spring 2005 Instructor: Shudong Jin March 28, 2005.
On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay-Tolerant Networks 1 Wei Gao Guohong Cao Tom La Porta Jiawei Han Presented.
1 Friends and Neighbors on the Web Presentation for Web Information Retrieval Bruno Lepri.
© SITILabs, University Lusófona, Portugal1 Chapter 2: Social-aware Opportunistic Routing: the New Trend 1 Waldir Moreira, 1 Paulo Mendes 1 SITILabs, University.
Data Stashing: Energy-Efficient Information Delivery to Mobile Sinks through Trajectory Prediction (IPSN 2010) HyungJune Lee, Martin Wicke, Branislav Kusy,
Structure-Free Data Aggregation in Sensor Networks.
1 Internet Traffic Measurement and Modeling Carey Williamson Department of Computer Science University of Calgary.
Weighted Waypoint Mobility Model and Its Impact on Ad Hoc Networks Electrical Engineering Department UNIVERSITY OF SOUTHERN CALIFORNIA USC Kashyap Merchant,
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
Delay-Tolerant Networks (DTNs)
Ahmed Helmy Computer and Information Science and Engineering (CISE)
Presentation transcript:

Paradigm Shift in Protocol Design –May end up with suboptimal performance or failures due to lack of context in the design Design general purpose protocols Evaluate using models (random mobility, traffic, …) Modify to improve performance and failures for specific context Analyze, model deployment context Design ‘application class’-specific parameterized protocols Utilize insights from context analysis to fine-tune protocol parameters Used to: Propose to:

Problem Statement How to gain insight into deployment context? How to utilize insight to design future services? Approach Extensive trace-based analysis to identify dominant trends & characteristics Analyze user behavioral patterns –Individual user behavior and mobility –Collective user behavior: grouping, encounters Integrate findings in modeling and protocol design –I. User mobility modeling – II. Behavioral grouping –III. Information dissemination in mobile societies, profile-cast

The TRACE framework Trace Analyze Employ (Modeling & Protocol Design) Characterize (Cluster) Represent MobiLib

Vision: Community-wide Wireless/Mobility Library Library of –Measurements from Universities, vehicular networks –Realistic models of behavior (mobility, traffic, friendship, encounters) –Benchmarks for simulation and evaluation –Tools for trace data mining Use insights to design future context-aware protocols? Trace

Libraries of Wireless Traces Multi-campus (community-wide) traces: –MobiLib (USC (04-06), UFL) nile.cise.ufl.edu/MobiLib 15+ Traces from: USC, Dartmouth, MIT, UCSD, UCSB, UNC, UMass, GATech, Cambridge, UFL, … Tools for mobility modeling (IMPORTANT, TVC), data mining –CRAWDAD (Dartmouth) Types of traces: –University Campus (mainly WLANs) –Conference AP and encounter traces –Municipal (off-campus) wireless –Bus & vehicular wireless networks –Others … (on going) Trace

Wireless Networks and Mobility Measurements In our case studies we use WLAN traces –From University campuses & corporate networks (4 universities, 1 corporate network) –The largest data sets about wireless network users available to date (# users / lengths) –No bias: not “special-purpose”, data from all users in the network We also analyze –Vehicular movement trace (Cab-spotting) –Human encounter trace (at Infocom Conf) Trace

Case study I – Individual mobility

Case Study I: Goal To understand the mobility/usage pattern of individual wireless network users To observe how environments/user type/trace- collection techniques impact the observations To propose a realistic mobility model based on empirical observations –That is mathematically tractable –That is capable of characterizing multiple classes of mobility scenarios

IMPACT: Investigation of Mobile-user Patterns Across University Campuses using WLAN Trace Analysis* * W. Hsu, A. Helmy, “IMPACT: Investigation of Mobile-user Patterns Across University Campuses using WLAN Trace Analysis”, two papers at IEEE Wireless Networks Measurements (WiNMee), April major campuses – 30 day traces studied from 2+ years of traces - Total users > 12,000 users - Total Access Points > 1,300 Trace source Trace duration User type EnvironmentCollection method Analyzed part MIT7/20/02 – 8/17/02 Generic3 corporate buildings PollingWhole trace Dartmouth4/01/01 – 6/30/04 Generic w/ subgroup University campus Event-basedJuly ’03 April ’04 UCSD9/22/02 – 12/8/02 PDA onlyUniversity campus Polling09/22/02- 10/21/02 USC4/20/05 – 3/31/06 GenericUniversity campus Event-based (Bldg) 04/20/05- 05/19/05 Understand changes of user association behavior w.r.t. –Time - Environment - Device type - Trace collection method

Metrics for Individual Mobility Analysis What kind of spatial preference do users exhibit? –The percentile of time spent at the most frequently visited locations What kind of temporal repetition do users exhibit? –The probability of re-appearance How often are the nodes present? –Percentage of “online” time Represent

Individual users access only a very small portion of APs in the network. On average a user spends more than 95% of time at its top 5 most visited APs. Long-term mobility is highly skewed in terms of time associated with each AP. Users exhibit “on”/”off” behavior that needs to be modeled. Observations: Visited Access Points (APs) Prob.(coverage > x) Fraction of online time associated with the AP CCDF of coverage of users [percentage of visited APs] Average fraction of time a MN associates with APs

Clear repetitive patterns of association in wireless network users. Typically, user association patterns show the strongest repetitive pattern at time gap of one day/one week. Repetitive Behavior

Mobility Characteristics from WLANs Simple existing models are very different from the characteristics in WLAN Characterize Prob.(online time fraction > x) On/off activity pattern Skewed location preference Periodic re-appearance

Mobility Models Mobility models are of crucial importance for the evaluation of wireless mobile networks [IMP03] Requirements for mobility models –Realism (detailed behavior from traces) –Parameterized, tunable behavior –Mathematical tractability Related work on mobility modeling –Random models (Random walk/waypoint): inadequate for human mobility –Improved synthetic models (pathway model, RPGM, WWP, FWY, MH) – more realistic, difficult to analyze –Trace-based model (T/T++): trace-specific, not general

Skewed location visiting preference –Create “communities” to be the preferred area of movement –Each node can have its own community Node moves with two different epoch types – Local or roaming –Each epoch is a random-direction, straight-line movement –Local epochs in the community –Roaming epochs around the whole simulation area 25% 75% Employ Time-variant Community (TVC) Model (W. Hsu, Thyro, K. Psounis, A. Helmy, “Modeling Time-variant User Mobility in Wireless Mobile Networks”, IEEE INFOCOM, 2007, Trans. on Networking 2009)

Tiered Time-variant Community (TVC) Model Periodical re-appearance –Create structure in time – Periods –Node moves with different parameters in periods to capture time-dependent mobility –Repetitive structure Finer granularity in space & time –Multi-tier communities –Multiple time periods Employ

Using the TVC Model – Reproducing Mobility Characteristics (STEP1) Identify the popular locations; assign communities (STEP2) Assign parameters to the communities according to stats (STEP3) Add user on-off patterns (e.g., in WLAN, users are usually off when moving)

Using the TVC Model – Reproducing Mobility Characteristics WLAN trace (example: MIT trace) Skewed location visiting preferencePeriodic re-appearance * Model-simplified: single community per node. Model-complex: multiple communities ** Similar matches achieved for USC and Dartmouth traces

Using the TVC Model – Reproducing Mobility Characteristics Vehicular trace (Cab-spotting)

Using the TVC Model – Reproducing Mobility Characteristics Human encounter trace at a conference Inter-meeting timeEncounter duration time A encounters B Encounter duration Inter-meeting time

Case study II – Groups in WLAN

Case Study II: Goal Identify similar users (in terms of long run mobility preferences) from the diverse WLAN user population –Understand the constituents of the population –Identify potential groups for group-aware service In this case study we classify users based on their mobility trends (or location-visiting preferences) –We consider semester-long USC trace (spring 2006, 94days) and quarter-long Dartmouth trace (spring 2004, 61 days)

Representation of User Association Patterns We choose to represent summary of user association in each day by a single vector –a = {a j : fraction of online time user i spends at AP j on day d} Summarize the long-run mobility in an “association matrix” Represent -Office, 10AM -12PM -Library, 3PM – 4PM -Class, 6PM – 8PM Association vector: (library, office, class) =(0.2, 0.4, 0.4)

Eigen-behavior Eigen-behaviors: The vectors that describe the maximum remaining power in the association matrix (obtained through Singular Value Decompostion) with quantifiable importance Eigen-behavior Distance calculates similarity of users by weighted inner products of eigen-behaviors. – Assoc. patterns can be re-constructed with low rank & error Benefits: Reduced computation and noise

Similarity-based User Classification With the distance between users U and V defined as 1-Sim(U,V), we use hierarchical clustering to find similar user groups. USC Dartmouth * AMVD = Average Minimum Vector Distance

Validation of User Groups Significance of the groups – users in the same group are indeed much more similar to each other than randomly formed groups (0.93 v.s for USC, 0.91 v.s for Dartmouth) Uniqueness of the groups – the most important group eigen-behavior is important for its own group but not other groups Significance score of top eigen-behavior for USCDartmouth Its own group Other groups

User Groups in WLAN - Observations Identified hundreds of distinct groups of similar users Skewed group size distribution – the largest 10 groups account for more than 30% of population on campus. Power-law distributed group sizes. Most groups can be described by a list of locations with a clear ordering of importance We also observe groups visiting multiple locations with similar importance – taking the most important location for each user is not sufficient

Case study III – Encounter Patterns

Case Study III: Goal Understand inter-node encounter patterns from a global perspective –How do we represent encounter patterns? –How do the encounter patterns influence network connectivity and communication protocols? Encounter definition: –In WLAN: When two mobile nodes access the same AP at the same time they have an ‘encounter’ –In DTN: When two mobile nodes move within communication range they have an ‘encounter’

Prob. (unique encounter fraction > x) Prob. (total encounter events > x) CCDF of unique encounter countCCDF of total encounter count In all the traces, the MNs encounter a small fraction of the user population. A user encounters 1.8%-6% on average of the user population (except UCSD) The number of total encounters for the users follows a BiPareto distribution. Observations: Encounters

Encounter-Relationship (ER) graph Draw a link to connect a pair of nodes if they ever encounter with each other … Analyze the graph properties? Group of good friends… Cliques with random links to join them Represent

Av. Path Length Clustering Coefficient (CC) Small Worlds of Encounters Normalized CC and PL The encounter graph is a Small World graph (high CC, low PL) Even for short time period (1 day) its metrics (CC, PL) almost saturate Encounter graph: nodes as vertices and edges link all vertices that encounter Small World Random graph Regular graph

Background: Delay Tolerant Networks (DTN) DTNs are mobile networks with sparse, intermittent nodal connectivity Encounter events provide the communication opportunities among nodes Messages are stored and moved across the network with nodal mobility A B C

Information Diffusion in DTNs via Encounters Epidemic routing (spatio-temporal broadcast) achieves almost complete delivery Unreachable ratio (Fig: USC) Robust to selfish nodes (up to ~40%) Trace duration = 15 days Robust to the removal of short encounters

Top-ranked friends form cliques and low-ranked friends are key to provide random links (short cuts) to reduce the degree of separation in encounter graph. Encounter-graphs using Friends Distribution for friendship index FI is exponential for all the traces Friendship between MNs is highly asymmetric Among all node pairs: 0.01, and 0.4

Profile-cast W. Hsu, D. Dutta, A. Helmy, ACM Mobicom 2007 Sending messages to others with similar behavior, without knowing their identity –Announcements to users with specific behavior V –Interest-based ads, similarity resource discovery Assuming DTN-like environment A B E C Is B similar to V? Is E similar to V? D ? Is C/D similar to V?

Profile-cast Use Cases Mobility-based profile-cast –Targeting group of users who move in a particular pattern (lost-and-found, context-aware messages, moviegoers) –Approach: use “similarity metric” between users Mobility-independent profile-cast –Targeting people with a certain characteristics independent of mobility (classic music lovers) –Approach: use “Small World” encounter patterns

Mobility-based Profile-cast Mobility space S D D Scoped message spread in the mobility space S D N N N N Forward??

–Singular value decomposition provides a summary of the matrix (A few eigen-behavior vectors are sufficient, e.g. for 99% of users at most 7 vectors describe 90% of power in the association matrix) Profile-cast Operation Profiling user mobility –The mobility of a node is represented by an association matrix S N N N N 1. profiling Each row represents an association vector for a time slot An entry represents the percentage of online time during time slot i at location j Sum. vectors

Profile-cast Operation 2. Forwarding decision S N N N N 1. profiling Determining user similarity –S sends Eigen behaviors for the virtual profile to N –N evaluated the similarity by weighted inner products of Eigen-behaviors –Message forwarded if Sim(U,V) is high (the goal is to deliver messages to nodes with similar profile) –Privacy conserving: N and S do not send information about their own behavior

Profile-cast Evaluation Epidemic: Near perfect delivery ratio, low delay, high overhead Centralized: Near perfect delivery ratio, low overhead, a bit extra delay Decentral: provides tradeoff between delivery & overhead Random: poor delivery ratio * Results presented as the ratio to epidemic routing Epidemic Decentral Random - Decentralized I-cast achieves: > 50% reduction in overhead of Epidemic >30% increase in delivery of Random

Evaluation - Result Success Rate Delay Overhead more overhead 92% 45% Centralized: Excellent success rate with only 3% overhead. Similarity-based: (1) 61% success rate at low overhead, 92% success rate at 45% overhead (2) A flexible success rate – overhead tradeoff RTx with infinite TTL: Much more overhead undersimilar success rate Short RTx with many copies: Good success rate/overhead, but delay is still long

S Mobility Profile-cast (intra-group) Goal S Flooding S Flood-sim S Single long random walk S Multiple short random walks

Mobility Profile-cast (inter-group) S T.P. S GoalFlooding S T.P. Gradient-ascend S T.P. Single long random walk S T.P. Multiple short random walks S T.P. Flooding_sim

Performance Comparison Gradient ascend helps to overcome the difficult case – when the source is far from T.P. Few long RW is better when S is far from T.P. but many short RW is better when S is close to T.P.

Performance Comparison Gradient ascend helps to overcome the difficult case – when the source is far from T.P. Few long RW is better when S is close toT.P. but many short RW is better when S is close to T.P. Gradient ascend has some extra delay compared with flooding

Profile-cast Initial Results Adjustable overhead/delivery rate tradeoff –61% delivery rate of flooding with 3% overhead –92% delivery rate with 45% overhead Better than single random walk in terms of delay, delivery rate Multiple short random walks also work well in this case

Mobility Independent Profile-cast SSSSS GoalFloodingSmallWorld-based Single long random walkMultiple short random walks

Future Work Sending to a mobility profile specified by the sender –Gradient ascend followed by similarity comparison (in the mobility space) Mobility independent profile-cast –The encounter pattern provides a network in which most nodes are reachable –We don’t want to flood – How to leverage the Small World encounter pattern to reach the “neighborhood” of most nodes efficiently?

Future Work –One-copy-per-clique in the “mobility space” –We expect this to work because similarity in mobility leads to frequent encounters

Future Directions (Applications) Detect abnormal user behavior & access patterns based on previous profiles Behavior aware push/caching services (targeted ads, events of interest, announcements) Caching based on behavioral prediction Can/should we extend this paradigm to include social aspects (trust, friendship, …)? Privacy issues and mobile k-anonymity

Markov O(2) Predictor Accuracy VoIP User Prediction Accuracy -VoIP users are highly mobile and exhibit dramatic difference in behavior than WLAN users -Prediction accuracy drops from ave ~62% for WLAN users to below 25% for VoIP users On Mobility & Predictability of VoIP & WLAN Users J. Kim, Y. Du, M. Chen, A. Helmy, Crawdad 2007 Work in-progress Motivates -Revisiting mobility modeling -Revisiting mobility prediction

visitors Males Females University Campus Fraternity Sorority traces Gender-based feature analysis in Campus-wide WLANs U. Kumar, N. Yadav, A. Helmy, Mobicom 2007, Crawdad Able to classify users by gender using knowledge of campus map -Users exhibit distinct on-line behavior, preference of device and mobility based on gender -On-going Work -How much more can we know? -What is the “information-privacy trade-off”?

Real world group experiments (structural health monitoring) sensor Instructor WLAN/adhoc sensor-adhoc Multi-party conference Tele-collaboration tools WLAN/adhoc Embedded sensor network The Next Generation (Boundless) Classroom Students -Integration of wired Internet, WLANs, Adhoc Mobile and Sensor Networks -Will this paradigm provide better learning experience for the students? Challenges

Emerging Wireless & Multimedia Technologies Protocols, Applications, Services Human Behavior Mobility, Load Dynamics Future Directions: Technology- Human Interaction The Next Generation Classroom

Human Behavior Mobility, Load Dynamics Protocols, Applications, Services Emerging Wireless & Multimedia Technologies Human Computer Interaction (HCI) & User Interface Educational/ Learning Experience Education Psycology Cognitive Sciences Mobility Models Traffic Models Protocol Design Context-aware Networking Engineering Application Development Service Provisioning Multi-Disciplinary Research Measurements How to Evaluate? How to Capture? How to Design? Social Sciences

sensor Disaster Relief (Self-Configuring) Networks

On-going and Future Directions Utilizing mobility –Controlled mobility scenarios DakNet, Message Ferries, Info Station –Mobility-Assisted protocols Mobility-assisted information diffusion: EASE, FRESH, DTN, $100 laptop –Context-aware Networking Mobility-aware protocols: self-configuring, mobility-adaptive protocols Socially-aware protocols: security, trust, friendship, associations, small worlds –On-going Projects Next Generation (Boundless) Classroom Disaster Relief Self-configuring Survivable Networks

Thank you! Ahmed Helmy URL: MobiLib: nile.cise.ufl.edu/MobiLib