User-Centric Data Dissemination in Disruption Tolerant Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering Pennsylvania State University.

Slides:



Advertisements
Similar presentations
Robin Kravets Tarek Abdelzaher Department of Computer Science University of Illinois The Phoenix Project.
Advertisements

Supporting Cooperative Caching in Disruption Tolerant Networks
ROUTING IN INTERMITTENTLY CONNECTED MOBILE AD HOC NETWORKS AND DELAY TOLERANT NETWORKS: OVERVIEW AND CHALLENGES ZHENSHENG ZHANG.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Highly-Resilient, Energy-Efficient Multipath Routing in Wireless Sensor Networks Computer Science Department, UCLA International Computer Science Institute,
Modeling and Analysis of Random Walk Search Algorithms in P2P Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE, Rensselaer Polytechnic Institute.
Forwarding Redundancy in Opportunistic Mobile Networks: Investigation and Elimination Wei Gao 1, Qinghua Li 2 and Guohong Cao 3 1 The University of Tennessee,
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
By Libo Song and David F. Kotz Computer Science,Dartmouth College.
Location Resident Services Emmanouil Koukoumidis Princeton University Group Talk on 04/15/09 1.
Subscription Subsumption Evaluation for Content-Based Publish/Subscribe Systems Hojjat Jafarpour, Bijit Hore, Sharad Mehrotra, and Nalini Venkatasubramanian.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
Peer-to-Peer Based Multimedia Distribution Service Zhe Xiang, Qian Zhang, Wenwu Zhu, Zhensheng Zhang IEEE Transactions on Multimedia, Vol. 6, No. 2, April.
Detecting Network Intrusions via Sampling : A Game Theoretic Approach Presented By: Matt Vidal Murali Kodialam T.V. Lakshman July 22, 2003 Bell Labs, Lucent.
ICNP'061 Benefit-based Data Caching in Ad Hoc Networks Bin Tang, Himanshu Gupta and Samir Das Computer Science Department Stony Brook University.
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 1 Wenjun Gu, Xiaole Bai, Sriram Chellappan and Dong Xuan Presented by Wenjun.
ICNP'061 Benefit-based Data Caching in Ad Hoc Networks Bin Tang, Himanshu Gupta and Samir Das Department of Computer Science Stony Brook University.
Distributed Priority Scheduling and Medium Access in Ad Hoc Networks Distributed Priority Scheduling and Medium Access in Ad Hoc Networks Vikram Kanodia.
Performance Evaluation of Peer-to-Peer Video Streaming Systems Wilson, W.F. Poon The Chinese University of Hong Kong.
Extending Network Lifetime for Precision-Constrained Data Aggregation in Wireless Sensor Networks Xueyan Tang School of Computer Engineering Nanyang Technological.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
Sociological Influences on Mobile Wireless Networks Chunming Qiao, Ph.D., Professor University at Buffalo (SUNY) Director, Laboratory for Advanced Network.
Wei Gao Joint work with Qinghua Li, Bo Zhao and Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University Multicasting.
© University of Alabama1 Chapter 1: Identifying the Intertwined Links between Mobility and Routing in Opportunistic Networks Xiaoyan Hong Bo Gu University.
© Y. Zhu and Y. University of North Carolina at Charlotte, USA 1 Chapter 1: Social-based Routing Protocols in Opportunistic Networks Ying Zhu and.
09/07/2004Peer-to-Peer Systems in Mobile Ad-hoc Networks 1 Lookup Service for Peer-to-Peer Systems in Mobile Ad-hoc Networks M. Tech Project Presentation.
Sensor Positioning in Wireless Ad-hoc Sensor Networks Using Multidimensional Scaling Xiang Ji and Hongyuan Zha Dept. of Computer Science and Engineering,
UNIVERSITY of NOTRE DAME COLLEGE of ENGINEERING Preserving Location Privacy on the Release of Large-scale Mobility Data Xueheng Hu, Aaron D. Striegel Department.
Network Aware Resource Allocation in Distributed Clouds.
Wei Gao1 and Qinghua Li2 1The University of Tennessee, Knoxville
Your Friends Have More Friends Than You Do: Identifying Influential Mobile Users Through Random Walks Bo Han, Aravind Srinivasan University of Maryland.
Adaptive CSMA under the SINR Model: Fast convergence using the Bethe Approximation Krishna Jagannathan IIT Madras (Joint work with) Peruru Subrahmanya.
UbiStore: Ubiquitous and Opportunistic Backup Architecture. Feiselia Tan, Sebastien Ardon, Max Ott Presented by: Zainab Aljazzaf.
1 Heterogeneity in Multi-Hop Wireless Networks Nitin H. Vaidya University of Illinois at Urbana-Champaign © 2003 Vaidya.
Wireless Sensor Networks COE 499 Energy Aware Routing
Prediction Assisted Single-copy Routing in Underwater Delay Tolerant Networks Zheng Guo, Bing Wang and Jun-Hong Cui Computer Science & Engineering Department,
Socially-aware pub-sub system for human networks Yaxiong Zhao Jie Wu Department of Computer and Information Sciences Temple University Philadelphia
Searching for Extremes Among Distributed Data Sources with Optimal Probing Zhenyu (Victor) Liu Computer Science Department, UCLA.
CCAN: Cache-based CAN Using the Small World Model Shanghai Jiaotong University Internet Computing R&D Center.
Lab for Advanced Network Design, Evaluation and Research Mobility Profile based Routing Within Intermittently Connected Mobile Ad hoc Networks (ICMAN)
Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks.
Energy Efficient Phone-to-Phone Communication Based on WiFi Hotspots in PSN En Wang 1,2, Yongjian Yang 1, and Jie Wu 2 1 Dept. of Computer Science and.
Distributed Maintenance of Cache Freshness in Opportunistic Mobile Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering Pennsylvania.
On Exploiting Transient Contact Patterns for Data Forwarding in Delay Tolerant Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering.
How Small Labels create Big Improvements April Chan-Myung Kim
Routing In Socially Selfish Delay Tolerant Networks Chan-Myung Kim
Content Sharing over Smartphone-Based Delay- Tolerant Networks.
Scaling Laws for Cognitive Radio Network with Heterogeneous Mobile Secondary Users Yingzhe Li, Xinbing Wang, Xiaohua Tian Department of Electronic Engineering.
Selfishness, Altruism and Message Spreading in Mobile Social Networks September 2012 In-Seok Kang
PRoPHET+: An Adaptive PRoPHET- Based Routing Protocol for Opportunistic Network Ting-Kai Huang, Chia-Keng Lee and Ling-Jyh Chen.
Content Dissemination in Mobile Social Networks Cheng-Fu Chou.
A Sociability-Based Routing Scheme for Delay-Tolerant Networks May Chan-Myung Kim
A Passive Approach to Sensor Network Localization Rahul Biswas and Sebastian Thrun International Conference on Intelligent Robots and Systems 2004 Presented.
1 Service Charge and Energy- Aware Vertical Handoff in Integrated IEEE e/ Networks Youngkyu Choi and Sunghyun Choi School of Electrical Engineering.
MobiQuitous 2007 Towards Scalable and Robust Service Discovery in Ubiquitous Computing Environments via Multi-hop Clustering Wei Gao.
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
1 Utilizing Shared Vehicle Trajectories for Data Forwarding in Vehicular Networks IEEE INFOCOM MINI-CONFERENCE Fulong Xu, Shuo Gu, Jaehoon Jeong, Yu Gu,
Efficient Computing k-Coverage Paths in Multihop Wireless Sensor Networks XuFei Mao, ShaoJie Tang, and Xiang-Yang Li Dept. of Computer Science, Illinois.
1 An Efficient, Low-Cost Inconsistency Detection Framework for Data and Service Sharing in an Internet-Scale System Yijun Lu †, Hong Jiang †, and Dan Feng.
SocialVoD: a Social Feature-based P2P System Wei Chang, and Jie Wu Presenter: En Wang Temple University, PA, USA IEEE ICPP, September, Beijing, China1.
Ching-Ju Lin Institute of Networking and Multimedia NTU
Joint Replication-Migration-based Routing in Delay Tolerant Networks Yunsheng Wang and Jie Wu Temple University Zhen Jiang Feng Li West Chester Unveristy.
On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay-Tolerant Networks 1 Wei Gao Guohong Cao Tom La Porta Jiawei Han Presented.
Multicasting in delay tolerant networks a social network perspective networks October2012 In-Seok Kang
Mobility Increases the Connectivity of K-hop Clustered Wireless Networks Qingsi Wang, Xinbing Wang and Xiaojun Lin.
Courtesy Piggybacking: Supporting Differentiated Services in Multihop Mobile Ad Hoc Networks Wei LiuXiang Chen Yuguang Fang WING Dept. of ECE University.
Nov. 29, 2006GLOBECOM /17 A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks Stephen S. Yau, Wei Gao, and Dazhi.
2010 IEEE Global Telecommunications Conference, GLOBECOM 2010 Zheng Guo; Bing Wang; Jun-Hong Cui Prediction Assisted Single-copy Routing in Underwater.
Center for Networked Computing. Motivation Model and problem formulation Theoretical analysis The idea of the proposed algorithm Performance evaluations.
En Wang 1,2 , Yongjian Yang 1 , and Jie Wu 2
Presentation transcript:

User-Centric Data Dissemination in Disruption Tolerant Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering Pennsylvania State University

Outline Introduction Models Data Dissemination Approach Theoretical Analysis Performance Evaluation Summary & Future Work

Transmitting Data in DTNs Laptops, PDAs, Smartphones… Intermittent and opportunistic network connectivity Carry-and-Forward Mobile nodes physically carry data as relays Major problem: appropriate metrics for relay selection

Our Focus Data dissemination in DTNs Applications: event notification, content publishing User-centric data dissemination Focus on satisfying user interests Data is disseminated only to the interesters, i.e., the nodes being interested in the data Existing network-centric schemes All the nodes in the network are data recipients Some nodes may not be interested in the data

The Big Picture Uncontrollable dissemination A node itself determines whether to be interested in the data Interesters act as relays Controllable dissemination Relays are intentionally selected among non-interester nodes according to their capabilities of forwarding data to interesters

Problem Formulation n data items generated at source nodes S 1,S 2,…,S n with time constraints T 1,T 2, …,T n Maximize the cumulative dissemination cost- effectiveness : the number of relays selected for data d i at time t : the estimation at time t on the number of interesters that will receive data d i by time T i Local estimation at individual relays

Challenges Uncertainty of data recipients Interesters are unknown a priori and it is hard to estimate at individual relays Relay selection is more challenging

Major Contributions Centrality-based approach to relay selection which considers social contact pattern and user interests simultaneously Theoretical insight on the dissemination cost- effectiveness Tradeoff between dissemination cost-effectiveness and overhead maintaining network information

Outline Introduction Models Data Dissemination Approach Theoretical Analysis Performance Evaluation Summary & Future Work

Network Model Node contacts are described by the network contact graph G(V,E) Contact process between nodes is described by \ Pairwise inter-contact time is assumed to be exponentially distributed

User Interest & Data Model Probabilistic modeling Keyword-based model on user interest and data Fixed keyword space with size M

User Interest & Data Model Interest profile of user i probability vector p ij : i’s probability to be interested in the j-th keyword Data item n keywords and weights indicating the importance of k i in describing data Vector where User interest probability: Node i’s interest probability is estimated by other nodes

Outline Introduction Models Data Dissemination Approach Theoretical Analysis Performance Evaluation Summary & Future Work

Centrality-based Approach Relays should have good capability to forward data to interesters timely Act as “communication hubs” Key problem: centrality metric of relay

Centrality Metric Data-dependent metric considering social contact patterns and node interests simultaneously Centrality of node i for data d k at time : set of nodes whose information is maintained by i The information includes contact pattern and interest profile Interest probability of node j in data d k Probability that node i can forward d k to node j within time T k -t

Centrality Metric Different scopes for maintaining network information : the r-hop neighborhood of node i on the network contact graph Tradeoff between dissemination cost-effectiveness and maintenance overhead Non-interester Interesters

Centrality Metric When r =1, When r >1: opportunistic path between node i and j Path weight: the probability that data can be transmitted from i to j within time T k -t

Relay Selection At time t, a node i is only selected as relay by another relay j for data d k if j estimates that selecting i as relay increases the cost- effectiveness of disseminating d k Local estimation update: Local estimations of relay j

Data Item Selection A relay i may not have enough buffer to carry all the data items d 1,d 2,…,d m simultaneously Data items are selected to maximize the cumulative dissemination cost-effectiveness Popular data is prioritized Size of data d k Buffer size of node iWhether d k is carried by i Contribution of d k to the cumulative cost-effectiveness

Outline Introduction Models Data Dissemination Approach Theoretical Analysis Performance Evaluation Summary & Future Work

Lower Bound of Cost-effectiveness Dissemination cost-effectiveness of a specific data item with time constraint T : set of interesters having received the data at time t 0 : set of selected relays at time t 0 For, the probability for the dissemination cost-effectiveness to increase Minimum user interest probability Network constants

Lower Bound of Cost-effectiveness Implications Dissemination cost-effectiveness increases with t 0 Dissemination cost-effectiveness is proportional to the relays’ contact capability and data popularity Dissemination cost-effectiveness increases exponentially with time t

Tradeoff between Cost-Effectiveness and Overhead Maintaining Network Information When network information is maintained globally, relay selection is always optimal r=R, where R is the diameter of network contact graph Any selected relay increases the dissemination cost- effectiveness

Tradeoff between Cost-Effectiveness and Overhead Maintaining Network Information When r<R, optimal probability of relay selection and maintenance cost increase at similar rates For relay s, and, if Node j is not good enough to be a relay either Cost of maintaining r-hop network information is Full flexibility to adjust r according to application requirements

Outline Introduction Models Data Dissemination Approach Theoretical Analysis Performance Evaluation Summary & Future Work

Trace-based Evaluations Realistic DTN traces Record contacts among Bluetooth-equipped devices

Performance Comparison MIT Reality trace Better dissemination cost-effectiveness Similar number of interesters with Flooding

Different Distributions of User Interest Infocom06 trace Better performance when user interest concentrate on popular data

Different Ranges for Maintaining Network Information Too large r does not help much 64% 7%

Summary User-centric data dissemination in DTNs Satisfying user interests and disseminate data only to the interesters Centrality-based approach Probabilistically consider social contact pattern and user interest simultaneously Analytical results on the cost-effectiveness bounds and tradeoff Future work Further investigate the roles and impacts of user interests to data dissemination in DTNs

Thank you! The paper and slides are also available at:

Opportunistic Path Each hop corresponds to stochastic contact process with pairwise contact rates X k : inter-contact time between nodes N k and N k+1 Exponentially distributed Y: the time needed to transmit data from A to B along the path follows hypoexponential distribution

Schemes for Comparison Random flooding Each non-interester has a fixed probability to be relay ContentPlace Based on k-clique distributed community detection Most Frequently Visited (MFV) policy to determine data utility SocialCast Based on “homophily” social phenomenon Kalman filter for node co-location prediction

Simulation Setup Keyword space with M=20 The k-th keyword also has the k-th popularity User interest Various distributions of user interest among keywords Zipf, exponential and uniform Data 5 data items to be disseminated Each data item is described by 5 keywords with indexes [k, k+4] k indicates data popularity

Simulation Setup

Global Optimality Difficult with local knowledge Node centrality valuesRelay selection process Local view 1.67→1.675 Global view 2.12→2.05 B is unaware of C and D