Routing In Socially Selfish Delay Tolerant Networks 2012. 9 Chan-Myung Kim

Slides:



Advertisements
Similar presentations
Supporting Cooperative Caching in Disruption Tolerant Networks
Advertisements

ROUTING IN INTERMITTENTLY CONNECTED MOBILE AD HOC NETWORKS AND DELAY TOLERANT NETWORKS: OVERVIEW AND CHALLENGES ZHENSHENG ZHANG.
Mobility Increase the Capacity of Ad-hoc Wireless Network Matthias Gossglauser / David Tse Infocom 2001.
Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
VSMC MIMO: A Spectral Efficient Scheme for Cooperative Relay in Cognitive Radio Networks 1.
CSLI 5350G - Pervasive and Mobile Computing Week 3 - Paper Presentation “RPB-MD: Providing robust message dissemination for vehicular ad hoc networks”
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
A Probabilistic Misbehavior Detection Scheme towards Efficient Trust Establishment in Delay-tolerant Networks Haojin Zhu, Suguo Du, Zhaoyu Gao, Mianxiong.
An Optimal Probabilistic Forwarding Protocol in Delay Tolerant Networks Chan-Myung Kim
SLAW: A Mobility Model for Human Walks Lee et al..
Gossip Scheduling for Periodic Streams in Ad-hoc WSNs Ercan Ucan, Nathanael Thompson, Indranil Gupta Department of Computer Science University of Illinois.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Forwarding Redundancy in Opportunistic Mobile Networks: Investigation and Elimination Wei Gao 1, Qinghua Li 2 and Guohong Cao 3 1 The University of Tennessee,
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
Small-world Overlay P2P Network
By Libo Song and David F. Kotz Computer Science,Dartmouth College.
1 Data Persistence in Large-scale Sensor Networks with Decentralized Fountain Codes Yunfeng Lin, Ben Liang, Baochun Li INFOCOM 2007.
Network Coding for Large Scale Content Distribution Christos Gkantsidis Georgia Institute of Technology Pablo Rodriguez Microsoft Research IEEE INFOCOM.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
Detecting Network Intrusions via Sampling : A Game Theoretic Approach Presented By: Matt Vidal Murali Kodialam T.V. Lakshman July 22, 2003 Bell Labs, Lucent.
On the Construction of Energy- Efficient Broadcast Tree with Hitch-hiking in Wireless Networks Source: 2004 International Performance Computing and Communications.
1 Efficient Retrieval of User Contents in MANETs Marco Fiore, Claudio Casetti, Carla-Fabiana Chiasserini Dipartimento di Elettronica, Politecnico di Torino,
1 A Delay-Aware Reliable Event Reporting Framework for Wireless Sensor-Actuator Networks Presented by Edith Ngai Supervised by Prof. Michael R. Lyu Term.
Wei Gao Joint work with Qinghua Li, Bo Zhao and Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University Multicasting.
Mobile-to-Mobile Video Recommendation Seshadri Padmanabha Venkatagiri, Mun Choon Chan, Wei Tsang Ooi School of Computing, National University of Singapore.
Performance Evaluation of Vehicular DTN Routing under Realistic Mobility Models Pei’en LUO.
Distributed Quality-of-Service Routing of Best Constrained Shortest Paths. Abdelhamid MELLOUK, Said HOCEINI, Farid BAGUENINE, Mustapha CHEURFA Computers.
Network Aware Resource Allocation in Distributed Clouds.
Wei Gao1 and Qinghua Li2 1The University of Tennessee, Knoxville
Deadline-sensitive Opportunistic Utility-based Routing in Cyclic Mobile Social Networks Mingjun Xiao a, Jie Wu b, He Huang c, Liusheng Huang a, and Wei.
Topology aggregation and Multi-constraint QoS routing Presented by Almas Ansari.
CONGESTION CONTROL and RESOURCE ALLOCATION. Definition Resource Allocation : Process by which network elements try to meet the competing demands that.
Higashino Lab. Maximizing User Gain in Multi-flow Multicast Streaming on Overlay Networks Y.Nakamura, H.Yamaguchi and T.Higashino Graduate School of Information.
Wireless Sensor Networks COE 499 Energy Aware Routing
Tonghong Li, Yuanzhen Li, and Jianxin Liao Department of Computer Science Technical University of Madrid, Spain Beijing University of Posts & Telecommunications.
Prediction Assisted Single-copy Routing in Underwater Delay Tolerant Networks Zheng Guo, Bing Wang and Jun-Hong Cui Computer Science & Engineering Department,
Algorithms for Allocating Wavelength Converters in All-Optical Networks Authors: Goaxi Xiao and Yiu-Wing Leung Presented by: Douglas L. Potts CEG 790 Summer.
Lab for Advanced Network Design, Evaluation and Research Mobility Profile based Routing Within Intermittently Connected Mobile Ad hoc Networks (ICMAN)
1 Delay Tolerant Network Routing Sathya Narayanan, Ph.D. Computer Science and Information Technology Program California State University, Monterey Bay.
On the Cost/Delay Tradeoff of Wireless Delay Tolerant Geographic Routing Argyrios Tasiopoulos MSc, student, AUEB Master Thesis presentation.
User Cooperation via Rateless Coding Mahyar Shirvanimoghaddam, Yonghui Li, and Branka Vucetic The University of Sydney, Australia IEEE GLOBECOM 2012 &
On Exploiting Transient Contact Patterns for Data Forwarding in Delay Tolerant Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering.
How Small Labels create Big Improvements April Chan-Myung Kim
Group 3 Sandeep Chinni Arif Khan Venkat Rajiv. Delay Tolerant Networks Path from source to destination is not present at any single point in time. Combining.
Selfishness, Altruism and Message Spreading in Mobile Social Networks September 2012 In-Seok Kang
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Presentation of Wireless sensor network A New Energy Aware Routing Protocol for Wireless Multimedia Sensor Networks Supporting QoS 王 文 毅
PRoPHET+: An Adaptive PRoPHET- Based Routing Protocol for Opportunistic Network Ting-Kai Huang, Chia-Keng Lee and Ling-Jyh Chen.
Graph-based Text Classification: Learn from Your Neighbors Ralitsa Angelova , Gerhard Weikum : Max Planck Institute for Informatics Stuhlsatzenhausweg.
User-Centric Data Dissemination in Disruption Tolerant Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering Pennsylvania State University.
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
A Sociability-Based Routing Scheme for Delay-Tolerant Networks May Chan-Myung Kim
Interconnect simulation. Different levels for Evaluating an architecture Numerical models – Mathematic formulations to obtain performance characteristics.
1 Utilizing Shared Vehicle Trajectories for Data Forwarding in Vehicular Networks IEEE INFOCOM MINI-CONFERENCE Fulong Xu, Shuo Gu, Jaehoon Jeong, Yu Gu,
Rate-Based Channel Assignment Algorithm for Multi-Channel Multi- Rate Wireless Mesh Networks Sok-Hyong Kim and Young-Joo Suh Department of Computer Science.
Social-Aware Stateless Forwarding in Pocket Switched Networks Soo-Jin SHIN
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
An Adaptive Routing Protocol with Congestion Avoidance for Opportunistic Networks 王冉茵.
1 An Arc-Path Model for OSPF Weight Setting Problem Dr.Jeffery Kennington Anusha Madhavan.
On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay-Tolerant Networks 1 Wei Gao Guohong Cao Tom La Porta Jiawei Han Presented.
Multicasting in delay tolerant networks a social network perspective networks October2012 In-Seok Kang
© SITILabs, University Lusófona, Portugal1 Chapter 2: Social-aware Opportunistic Routing: the New Trend 1 Waldir Moreira, 1 Paulo Mendes 1 SITILabs, University.
Dynamic Control of Coding for Progressive Packet Arrivals in DTNs.
Chance Constrained Robust Energy Efficiency in Cognitive Radio Networks with Channel Uncertainty Yongjun Xu and Xiaohui Zhao College of Communication Engineering,
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks Zhao, J.; Cao, G. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 鄭宇辰
PROVEST: Provenance-based Trust Model for Delay Tolerant Networks
Introduction to Wireless Sensor Networks
1 Exploiting Friendship Relations for Efficient Routing in Mobile Social Networks Eyuphan Bulut, Student Member, IEEE, and Boleslaw K Szymanski, Fellow,
Kevin Lee & Adam Piechowicz 10/10/2009
Presentation transcript:

Routing In Socially Selfish Delay Tolerant Networks Chan-Myung Kim

Abstract  In the real world, most people are selfish. To capture user selfishness in a more realistic manner, we have two observations from the social perspective. –First, a selfish user is usually willing to help others with whom he has social ties. –Second, for those with social ties, a selfish user may give different preferences.  We propose a Social Selfishness Aware Routing (SSAR) algorithm to allow user selfishness and provide better routing performance.  To select a forwarding node, SSAR considers both users’ willingness to forward and their contact opportunity.  Simulations show that SSAR allows users to maintain selfishness and achieves better routing performance.

Contribution  We introduce social selfishness into DTN routing.  We present a routing algorithm SSAR for DTNs, which follows the philosophy of design for user.  We incorporate user willingness into relay selection. Combined with contact opportunity, it results in a better metric to evaluate a node’s forwarding capability.  We formulate the forwarding process as an MKPAR and provide a heuristic based solution.

Philosophy: Design for User  We allow users to behave as what their social selfishness requires, but try to improve the routing performance under the social selfish behavior.  Our underlying philosophy is that social selfishness is a kind of user demand that should be satisfied.  It should be treated as a design metric to measure the user satisfaction, similar to other traditional performance metrics such as data delivery ratio and delay.

Models and Assumptions

Models and Assumptions  Network Model –We assume each node has unlimited buffer for its own packets, but limited buffer for others. –As for data traffic, we only consider unicast, and assume each packet has a certain lifetime (i.e., TTL).  Trust Model –We assume the source of a packet is anonymous to intermediate nodes. –Then intermediate nodes provide data forwarding service only based on the previous hop information.  Adversary Model –Malicious attacks (e.g., DoS, wormhole, blackhole) and free-riding behaviors are not our focus.

The Architecture  Pocket priority manager –It calculates a priority for each buffered packet based on the willingness between nodes that the packet has traversed.  Buffer manager –It manages buffers based on packet priority: (i) packets with priority 0 will not be buffered; (ii) when buffer overflows, packets of low priority are dropped first.

The Architecture  Delivery probability estimator –It estimates a node’s “delivery probability” of a packet, which is used to quantify the node’s forwarding capability for that packet.  Forwarding set manager –Forwarding set manager decides which packets to transmit by solving an MKPAR formulation. It considers the buffer constraint and transmits the packets that are most effective for social selfishness and routing performance.

The Protocol  1) After neighbor discovery, node N and M deliver packets destined to each other in the decreasing order of priority. During packet delivery, they also exchange information related to their willingness to forward.  2)If N’s willingness for M is positive, M sends N a summary list of for its buffered packets.  3)From the priority information, N calculates the new priority value for each packet. Based on the new priority and other information in the summary list, N calculates its delivery probability and available buffer size for each packet in the list, and returns them to M.  4) M determines a candidate set of packets for which N has higher delivery probabilities.  5) Considering the available buffer size information, M further decides which candidates to transmit by solving the MKPAR formulation. Packets will be deleted after being forwarded, so there is only one copy for each packet.

Detailed Design  Packet Priority  where pi is the packet’s priority in its ith hop and ω is the ith hop’s willingness to forward the packets from the (i − 1)th hop.  The initial priority p0 is set by the source.

Detailed Design  Delivery Probability Estimation  1) Overall Delivery Probability  Suppose the next contact between N and D happens at time tc, and N has to drop m due to buffer overflow at time tover.

Detailed Design  Delivery Probability Estimation  2) Expiration Dropping Probability  Let random variable X denote the inter-contact time between N and the destination D. Assume that each inter-contact time is independent, then according to Markov’s Inequality:  where E(X) is the mean of X and ˆt is the most recent contact time between N and D before the estimation time t.

Detailed Design  Delivery Probability Estimation  3) Buffer Overflow Dropping Probability  The most important factor that affects P over is m’s priority value p due to the buffer policy.  Other two minor factors are the current empty buffer size L0 and the residual time t r = t exp − t before expiration.  We turn to data mining techniques and model it as a supervised classification problem.  Whenever N drops or forwards a packet, it generates a record  With data mining terminology, each record is called a sample, p, L 0, and tr are called feature dimensions and β is called class label.  β = 1 if N drops the packet due to buffer overflow and β = 0 if N does not drop it or drops it due to expiration.

Detailed Design  Forwarding Set Optimization  In this subsection, we solve the following problem: suppose a node M contacts N, and M has determined a candidate packet set C for which N has higher delivery probabilities.  We follow two principles.  First, M will not forward a packet to N if N does not have sufficient buffers for that packet.

Detailed Design  Forwarding Set Optimization  Second, M tries to maximize its selfish gain through this contact, which is defined as follows.  The larger p is, the more selfishness is gained. ΔP delivery means how much this forwarding can increase the packet’s probability to be delivered.

Detailed Design  Forwarding Set Optimization  Next we convert it into an MKPAR formulation, where each item can only be assigned to a subset of the knapsacks.

Detailed Design  Forwarding Set Optimization  Next we convert it into an MKPAR formulation, where each item can only be assigned to a subset of the knapsacks.

Performance Evaluations  Experimental Setup  The evaluation is based on the MIT Reality trace on which a recent work has validated the existence of the so-called “small-world” phenomenon.  In this trace, 97 Nokia 6600 smart phones were carried by students and staff at MIT over nine months.  Since the trace does not have the accurate social relationship information among participants, we need to construct a weighted directed social graph upon them. To better study SSAR, we evaluate it on two types of social graphs.

Performance Evaluations  Probabilistically contact dependent social graph  Let f ∗ denote the overall contact frequency of the whole trace, f N denote node N’s overall contact frequency, and f NM denote the contact frequency between N and M.

Performance Evaluations  Random Social Graph  The second type is random social graph that is also constructed in four steps.  The first and third steps are the same, but in the second and fourth steps we assign degrees to random nodes, assign weights to random social ties, and connect social ties to random nodes.  To generate social graphs with different average numbers of social ties per node, we fix the powerlaw coefficient at

Performance Evaluations  Simulation Setup .

Performance Evaluations  Simulation Results .  Selfishness-aware : PROPHET-1  Basic one: PROPHET-2

Performance Evaluations  Simulation Results .

Performance Evaluations  Simulation Results .

Performance Evaluations  Simulation Results .

Performance Evaluations  Simulation Results  To compare SSAR with other algorithms on how much selfishness is allowed, we plot the SS metric in Figure 4.  SSAR allows more selfishness for two reasons. –First, its buffer management policy satisfies social selfishness. –Second, because of the MKPAR formulation, high-priority packets are more likely to be forwarded than low-priority ones, as determined by the selfish gain metric

Conclusion  This paper introduces the social selfishness problem into DTNs and proposes a routing algorithm SSAR following the philosophy of design for user.  SSAR allows user selfishness and improves performance by considering user willingness, resource constraints, and contact opportunity when selecting relays.  Extensive simulations on the MIT Reality trace show that SSAR can maintain social selfishness and achieve a very good routing performance in an efficient way.