Exploiting Temporal Dependency for Opportunistic Forwarding in Urban Vehicular Network [MANET-2] Presented by Cui Kai 2011/5/25 Hongzi Zhu, Sherman Shen,

Slides:



Advertisements
Similar presentations
Mobility Entropy and Message Routing in Community-Structured Delay Tolerant Networks Hideya Ochiai Hiroshi Esaki The University of Tokyo / NICT Asia Future.
Advertisements

Supporting Cooperative Caching in Disruption Tolerant Networks
ROUTING IN INTERMITTENTLY CONNECTED MOBILE AD HOC NETWORKS AND DELAY TOLERANT NETWORKS: OVERVIEW AND CHALLENGES ZHENSHENG ZHANG.
Queuing Network Models for Delay Analysis of Multihop Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute.
CSLI 5350G - Pervasive and Mobile Computing Week 6 - Paper Presentation “Exploiting Beacons for Scalable Broadcast Data Dissemination in VANETs” Name:
Delay bounded Routing in Vehicular Ad-hoc Networks Antonios Skordylis Niki Trigoni MobiHoc 2008 Slides by Alex Papadimitriou.
CSLI 5350G - Pervasive and Mobile Computing Week 3 - Paper Presentation “RPB-MD: Providing robust message dissemination for vehicular ad hoc networks”
Delay and Throughput in Random Access Wireless Mesh Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department Rensselaer Polytechnic Institute (RPI)
Worm Origin Identification Using Random Moonwalks Yinglian Xie, V. Sekar, D. A. Maltz, M. K. Reiter, Hui Zhang 2005 IEEE Symposium on Security and Privacy.
Generated Waypoint Efficiency: The efficiency considered here is defined as follows: As can be seen from the graph, for the obstruction radius values (200,
An Optimal Probabilistic Forwarding Protocol in Delay Tolerant Networks Chan-Myung Kim
Forwarding Redundancy in Opportunistic Mobile Networks: Investigation and Elimination Wei Gao 1, Qinghua Li 2 and Guohong Cao 3 1 The University of Tennessee,
A Mobile Infrastructure Based VANET Routing Protocol in the Urban Environment School of Electronics Engineering and Computer Science, PKU, Beijing, China.
TSF: Trajectory-based Statistical Forwarding for Infrastructure-to-Vehicle Data Delivery in Vehicular Networks Jaehoon Jeong, Shuo Guo, Yu Gu, Tian He,
Are You Moved by Your Social Network Application? Gregory Peaker.
By Libo Song and David F. Kotz Computer Science,Dartmouth College.
Context Compression: using Principal Component Analysis for Efficient Wireless Communications Christos Anagnostopoulos & Stathes Hadjiefthymiades Pervasive.
Simulation.
Probability Grid: A Location Estimation Scheme for Wireless Sensor Networks Presented by cychen Date : 3/7 In Secon (Sensor and Ad Hoc Communications and.
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
Wei Gao Joint work with Qinghua Li, Bo Zhao and Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University Multicasting.
Performance Evaluation of Vehicular DTN Routing under Realistic Mobility Models Pei’en LUO.
Distributed Quality-of-Service Routing of Best Constrained Shortest Paths. Abdelhamid MELLOUK, Said HOCEINI, Farid BAGUENINE, Mustapha CHEURFA Computers.
Fundamental Lower Bound for Node Buffer Size in Intermittently Connected Wireless Networks Yuanzhong Xu, Xinbing Wang Shanghai Jiao Tong University, China.
Hongyu Gong, Lutian Zhao, Kainan Wang, Weijie Wu, Xinbing Wang
Gathering Data in Wireless Sensor Networks Madhu K. Jayaprakash.
Stochastic sleep scheduling (SSS) for large scale wireless sensor networks Yaxiong Zhao Jie Wu Computer and Information Sciences Temple University.
Wei Gao1 and Qinghua Li2 1The University of Tennessee, Knoxville
1 Meeyoung Cha and DK Lee Advisor - Sue Moon (Korea Advanced Institute of Science and Technology) IEEE INFOCOM 2005 Student Workshop Split-n-Save : Path.
A Study of Live Video Streaming over Highway Vehicular Ad hoc Networks Meenakshi Mittal ©2010 International Journal of Computer Applications ( )Volume.
Improving Capacity and Flexibility of Wireless Mesh Networks by Interface Switching Yunxia Feng, Minglu Li and Min-You Wu Presented by: Yunxia Feng Dept.
Prediction Assisted Single-copy Routing in Underwater Delay Tolerant Networks Zheng Guo, Bing Wang and Jun-Hong Cui Computer Science & Engineering Department,
Authors: Ioannis Komnios Sotirios Diamantopoulos Vassilis Tsaoussidis ComNet Group.
1 Delay Tolerant Network Routing Sathya Narayanan, Ph.D. Computer Science and Information Technology Program California State University, Monterey Bay.
Distributed Maintenance of Cache Freshness in Opportunistic Mobile Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering Pennsylvania.
On Exploiting Transient Contact Patterns for Data Forwarding in Delay Tolerant Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering.
How Small Labels create Big Improvements April Chan-Myung Kim
Routing In Socially Selfish Delay Tolerant Networks Chan-Myung Kim
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
A study of Intelligent Adaptive beaconing approaches on VANET Proposal Presentation Chayanin Thaina Advisor : Dr.Kultida Rojviboonchai.
Group 3 Sandeep Chinni Arif Khan Venkat Rajiv. Delay Tolerant Networks Path from source to destination is not present at any single point in time. Combining.
Scaling Laws for Cognitive Radio Network with Heterogeneous Mobile Secondary Users Yingzhe Li, Xinbing Wang, Xiaohua Tian Department of Electronic Engineering.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Connectivity-Aware Routing (CAR) in Vehicular Ad Hoc Networks Valery Naumov & Thomas R. Gross ETH Zurich, Switzerland IEEE INFOCOM 2007.
PRoPHET+: An Adaptive PRoPHET- Based Routing Protocol for Opportunistic Network Ting-Kai Huang, Chia-Keng Lee and Ling-Jyh Chen.
User-Centric Data Dissemination in Disruption Tolerant Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering Pennsylvania State University.
Random Sampling Approximations of E(X), p.m.f, and p.d.f.
A Sociability-Based Routing Scheme for Delay-Tolerant Networks May Chan-Myung Kim
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
1 On the Levy-walk Nature of Human Mobility Injong Rhee, Minsu Shin and Seongik Hong NC State University Kyunghan Lee and Song Chong KAIST.
An Energy Efficient MAC Protocol for Wireless LANs, E.-S. Jung and N.H. Vaidya, INFOCOM 2002, June 2002 吳豐州.
UCLA ENGINEERING Computer Science RobustGeo: a Disruption-Tolerant Geo-routing Protocol Ruolin Fan, Yu-Ting Yu *, Mario Gerla UCLA, Los Angeles, CA, USA.
Social-Aware Stateless Forwarding in Pocket Switched Networks Soo-Jin SHIN
© 2008 Frans Ekman Mobility Models for Mobile Ad Hoc Network Simulations Frans Ekman Supervisor: Jörg Ott Instructor: Jouni Karvo.
Joint Replication-Migration-based Routing in Delay Tolerant Networks Yunsheng Wang and Jie Wu Temple University Zhen Jiang Feng Li West Chester Unveristy.
On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay-Tolerant Networks 1 Wei Gao Guohong Cao Tom La Porta Jiawei Han Presented.
Multicasting in delay tolerant networks a social network perspective networks October2012 In-Seok Kang
Video Streaming Transmission Over Multi-channel Multi-path Wireless Mesh Networks Speaker : 吳靖緯 MA0G WiCOM '08. 4th International.
© SITILabs, University Lusófona, Portugal1 Chapter 2: Social-aware Opportunistic Routing: the New Trend 1 Waldir Moreira, 1 Paulo Mendes 1 SITILabs, University.
Routing in Delay Tolerant Network Qing Ye EDIFY Group of Lehigh University.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks Zhao, J.; Cao, G. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 鄭宇辰
2010 IEEE Global Telecommunications Conference, GLOBECOM 2010 Zheng Guo; Bing Wang; Jun-Hong Cui Prediction Assisted Single-copy Routing in Underwater.
Center for Networked Computing. Motivation Model and problem formulation Theoretical analysis The idea of the proposed algorithm Performance evaluations.
12.Nov.2007 Capacity of Ad Hoc Wireless Networks Jinyang Li Charles Blake Douglas S. J. De Coutu Hu Imm Lee Robert Morris Paper presentation by Tonio Gsell.
HoWL: An Efficient Route Discovery Scheme Using Routing History in Mobile Ad Hoc Networks Faculty of Environmental Information Mika Minematsu
Delay-Tolerant Networks (DTNs)
Recognizing Exponential Inter-Contact Time in VANETs
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Presentation transcript:

Exploiting Temporal Dependency for Opportunistic Forwarding in Urban Vehicular Network [MANET-2] Presented by Cui Kai 2011/5/25 Hongzi Zhu, Sherman Shen, Sagar Naik, Shan Chang and Minglu Li

Reasons to propose this algorithm Empirical vehicular data analysis Analyzing ICT temporal patterns Opportunistic forwarding algorithm Performance evaluation Conclusion Outline

Introduction Goal to provide safety and comfort applications to drivers and passengers Through vehicles equipped with wireless communication devices and roadside infrastructure Main challenge Data transfer

Data Transfer Usually in a strore-carry-forward fashion Key factor vehicular mobility characteristics (e.g. how often such contact opportunities take place and on how long they last) ICT (Inter-Contact Time) The delay between two consecutive contacts of the two vehicles

Related Researches Some works Ideally assume that the future node movement is known in advance In reality the information of future movement is unavailable However, when node mobility is not completely random, it is possible to make forwarding decision based on mobility history Requiring no connection history Random walk----moderate network traffic BUT large end-to-end delay Epidemic routing----minimum end-to-end delay BUT unacceptable network overhead

Related Researches Mainly focus on the distribution of ICTs it is not clear how to design a practical algorithm utilizing the characteristics of ICTs Drawbacks of The Recent Kindred Research

Related Researches In this paper Data-driven approach in designing and evaluating our opportunistic forwarding algorithm Extensive GPS trace data collected from more than ten thousand public vehicles (taxies and buses) in Shanghai and Shenzhen Analyze more than 45 million pairwise contacts resolved from the trace to characterize the contact interaction among vehicles What is found ?

Reasons to propose this algorithm Empirical vehicular data analysis Analyzing ICT temporal patterns Opportunistic forwarding algorithm Performance evaluation Conclusion Outline

Data Analysis three sets of GPS traces of more than 10 thousands of public vehicles in Shanghai and Shenzhen Including Shanghai Bus, Shanghai Taxi and Shenzhen Taxi Periodically send report back to a datacenter at a granularity of around one minute Data Source

Statistics of Inter-Contact Time 1. Extraction of Inter-Contact Time from Trace Data Using a sliding time window of 1 minute and a communication range of 100 meters, and assume that two vehicles would have a connection opportunity (called a contact) if their locations reported within a given time window are within the communication range. 2.Inter-Contact Time Distribution Characteristics plot the tail distribution (CCDF) of ICTs over time as figure. Conclusion This implies vehicles frequently meet each other in urban settings.

Statistics of Inter-Contact Time Examine the probability density function (PDF) of inter-contact time Conclusion This indicates that if a vehicle meets another vehicle at certain time the probability that the two vehicles meet again at the same time in the following days is very high.

Reasons to propose this algorithm Empirical vehicular data analysis Analyzing ICT temporal patterns Opportunistic forwarding algorithm Performance evaluation Conclusion Outline

Analyzing ICT temporal patterns 1.How historical inter-contact time information is related to the current inter-contact time 2.how inter-contact time patterns evolve over time and how much historical information we need to track to capture the inter-contact time patterns over time Characterizing temporal correlations of successive ICTs Evaluation of the ICT patterns

Characterizing temporal correlations of successive ICTs Examine the correlation between inter-contact times by 1.the marginal entropy of inter-contact times between each pair of vehicles 2.the conditional entropy of the inter-contact times between a pair of vehicles given their previous M inter-contact times in all of the three data sets Though an inter-contact time can be infinitely long in time, as it can be seen from the right figure that most inter-contact times are less than a relatively short period of time 90 %

Therefore, an inter-contact time can be specialized into a discrete finite value space as, Characterizing temporal correlations of successive ICTs

Conclusion that the uncertainty about the inter-contact time decreases when knowing the previous inter-contact times between the same pair of taxies.

Characterizing temporal correlations of successive ICTs The other two data sets Interestingly, taxies in Shenzhen also have much smaller conditional entropy than taxies in Shanghai. This suggests that taxies in Shanghai operate more randomly with less interference of drivers than taxies in Shenzhen. SZ taxi SH taxi

Evaluation of the ICT patterns Use Redundancy to quantify the correlation Divide time into time slot of 4 hours Figure.7 show the two weeks’ results This should reflect the different shift rules of taxies in SZ and SH

Evaluation of the ICT patterns Aggregated history information It is clear that the redundancy increases until n(day) reaches to about three weeks. This implies that information older than three weeks does not help in capturing ICT temporal patterns.

Reasons to propose this algorithm Empirical vehicular data analysis Analyzing ICT temporal patterns Opportunistic forwarding algorithm Performance evaluation Conclusion Outline

Opportunistic forwarding algorithm The analysis above shows we can predict when the next connection opportunity between a pair of vehicles will probably occur based on their recent inter-contact times. 1.First capture the inter-contact time temporal patterns between each pair of vehicles using higher order Markov chain models. 2.Then, we describe our opportunistic forwarding strategy and discuss the algorithm parameter configuration in terms of system performance and memory cost.

Markov Chain Model of K-th Order In a finite-state Markov process, the current state of the process depends only on a certain number of previous values of the process. We use a k-th order Markov chain to represent the temporal dependency of ICT between a pair of vehicles Once the Markov Chain Model is involved, the maximum estimators of the state transition probabilities of the k-th Markov chain are

Opportunistic Forwarding Strategy 1.In order to acquire the knowledge of inter-contact patterns, a vehicle first collects recent inter-contact times between itself and all other vehicles. 2.Meantime, it establishes a k-th order Markov chain for each interested vehicle in the network by determining the state transition probabilities. 3.As a new inter-contact time comes, the vehicle also updates the corresponding Markov chain. 4.It then uses the established Markov chain model as guidance to conduct future message forwarding. e.g. When a vehicle v1 encounters vehicle v2, v1 will act as the next relay for this message if one of the two following cases happens: a.v1 is the destination of the message b.v1 is a better candidate for relaying this message if the estimated delay of the next contact between v1 and v[des.] is shorter than that between v2 and v[des.] After transmitting this message to v1, v2 simply removes this message from its buffer

Algorithm Parameter Configuration There are FOUR key parameters that are essential to the performance Maximum inter-contact time The counting measure The order of Markov chain model The length for learning stage There is a tradeoff between memory cost and system performance. Given, a small counting measure will increase the number of states in the Markov chain models, preserving more detailed information at a price of larger memory consumption While increasing the length of learning stage will definitely help improving the accuracy of estimation for next connection On the other hand, if equals, there is only two states in the Markov chain.

Algorithm Parameter Configuration Figure shows an example of the average number of state transition probabilities per pair of vehicles in Shanghai taxi data set It can be seen that the number of state transition probabilities reaches the maximum when takes the minimum value, and k=6

Reasons to propose this algorithm Empirical vehicular data analysis Analyzing ICT temporal patterns Opportunistic forwarding algorithm Performance evaluation Conclusion Outline

Methodology Compare our algorithm with following alternative schemes: Epidemic -Vehicles exchange every packet whenever they have a contact -Requires large buffer size -Generates a tremendously large volume of network traffic (bad for wireless) Minimum Expected Delay (MED) -Utilizes the expected delay metric to guide data forwarding -Used to estimate the expected delay based on real contact records Maximum Delivery Probability (MDP) -Utilize the delivery probability metric to guide data forwarding -Delivery probability reflects the contact frequency

Methodology We consider THREE important metrics to evaluate the performance of our algorithm and the above schemes: Delivery ratio End-to end delay Network traffic per packet In the following simulations, we randomly choose 500 vehicles from the three data sets. And at the beginning of each experiment, we inject 100 packets. And for each packet the source and destination are randomly chosen. P.S. Here we make an assumption that contacts are always successful

Effect of Algorithm Parameters The maximum inter-contact time is set to be the period of time of 6 days. Counting measure varies from 4 hours to 6 days Markov chain k varies from 1 to 20 For each value of and k, run the ex. 50 times Minimum delay-- =4h, k=6

Effect of Algorithm Parameters Fig. 11 shows the delivery ratio as a function of and k : The results of the other two data sets are similar: best system performance come from the smallest with k=5 for SH bus and k=6 for SZ taxi

Effect of Learning Stage In this simulation scenario, we examine how much history information is essential for setting up our models. Set a small and the corresponding optional k, and gradually increase the time for learning The MED and the MDP schemes achieve the minimum end-to-end delay of hours and hours, respectively, using one day for learning. The epidemic scheme has the minimum end-to-end delay of 8.6 hours.

Effect of Learning Stage plot the delivery ratio as a function of learning time in Fig. 13 (omit the epidemic scheme) The Markov scheme can reach to a 96% delivery ratio when the length of learning stage is larger than three weeks. The Markov scheme can delivery about 84% more packets, compared with the best performance of the MDP and the MED schemes

Effect of Learning Stage Fig. 14 shows the average network traffic per packet generated in the network. It takes three more hops on average to deliver a packet using the Markov scheme than using the MED and the MDP schemes to achieve best performance. The Epidemic scheme has a cost of 1.87*10^5

Effect of Multiple Paths Consider TWO multiple path forwarding strategies: Better candidate Ever-best candidate It can be seen that the proposed scheme can achieve appealing delivery performance (22.87-hour end-to-end delay and 96% delivery ratio) even with one-path forwarding.

Reasons to propose this algorithm Empirical vehicular data analysis Analyzing ICT temporal patterns Opportunistic forwarding algorithm Performance evaluation Conclusion Outline

Summary & Future Work we have demonstrated that urban vehicles show strong temporal dependency in terms of how they meet each other. The studied data sets are very representative with respect to mobility characteristics in urban settings. we have developed an appealing opportunistic forwarding algorithm using higher order Markov chains our scheme can achieve comparable delivery performance as the epidemic scheme with a conservative network cost. What’s DONE What’s TO BE done More investigation on the end-to-end delay with limited wireless bandwidth Validate our algorithm by field tests and collect more types of vehicles

Thanks