SlideShare uma empresa Scribd logo
1 de 33
BITS Pilani
Hyderabad Campus
A Survey of Social Based
Routing in Delay Tolerant
Networks: Positive and
Negative Social Effects
Abhishek Thakur
CSIS,
BITS-Pilani, Hyderabad Campus
10/12/2013 Slide 2 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus
For links that are intermittent or poor in quality, end-to-end
connectivity and routing may not be guaranteed especially in
Extreme Scenario.
Limits of MANets and Connected
Networks
Prob success (iid fail prob pf) over k links:
For E2E delivery must have all links up
But, expected # of failed links is
k
fsfs pkppp )1()(;1
fkp
10/12/2013 Slide 3 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus
Probability of Delivery
10/12/2013 Slide 4 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus
Optimizations on classic ad-hoc and delay-tolerant networking
algorithms and began to examine factors such as
security, reliability, verifiability
– Node mobility would be exploited to help deliver message (mobility-assisted or store-carry-
and-forward)
Delay-Tolerant Networking Architecture
– http://tools.ietf.org/html/rfc4838
Bundle Protocol Specification
– http://tools.ietf.org/html/rfc5050
Why? What?
10/12/2013 Slide 5 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus
Deep Space Communications
– Beyond near-earth
– Landers, Orbiters, Deep Space Probes
Sensor Networks
– Terrestrial: Ocean or Land Based
– Extra-terrestrial objects (on planets, etc)
High-Stress Physical Environments
– Battlefield, Civil Emergency, Submarines
This and next few slides – ref Kevin Fall - 2008
What is Extreme?
10/12/2013 Slide 6 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus
• Large Delays
• Intermittent and Scheduled Links
• Bandwidth Asymmetry
• Limited Power
• Limited Emission Requirements (LPI/LPD)
• Heterogeneous Network Architectures
• Link Security Needs
• Very Large Scale (e.g. sensor nets)
Communications Challenges
10/12/2013 Slide 7 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus
Unusual Devices
10/12/2013 Slide 8 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus
Extreme systems
• Do not (won’t) run IP
– High overhead, for global routing
– Intra-Oceans: investigate routing
– Space: very limited routing [e.g. rover
to lander]
– Sensors: novel or simple routing, low
power
• Domain-specific features:
– Naming, delivery abstraction, QoS
But we don’t want to scrap
existing (Internet) software
and experience
Heterogeneous Architectures
The NASA Deep Space
Network (DSN)
– 3 70m-antenna array [USA, Spain,
Australia]
Underwater Acoustic Modems
– Bottom-to-top comm under 20kbps to
6Km
Low-Power CMOS Radios
– Conventional and (hopefully) UWB
SINGCARS and EPLRS
Military Radios
10/12/2013 Slide 9 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus
Goals of the DTN architecture:
– Interoperability across network architectures
– Reliability robust to link and node failure
Components:
– Reliable Message Overlay with Routing
– Interoperability Gateways
– Flexible Naming Scheme
– Per-hop Authentication with CoS
Delay-Tolerant Network
Architecture
10/12/2013 Slide 10 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus
End-to-End Message Service: “Bundles”
– “postal-like” delivery over regional transports
– Optional class of service/notification
Key Idea: Custody Transfer
– Custodian owns reliable-delivery guarantee
– Bundles transferred between custodians toward
destination
– Sender may free resources upon successful custody
transfer
Reliable Message Overlay
10/12/2013 Slide 11 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus
“Classic” Concepts (Internet):
– Routing: selecting best next hop for every possible
destination
– Forwarding: sending packet to best next hop
• Typically, “on demand” [statistical multiplexing]
• Forwarders know a-priori next hop for every destination
DTN Concepts:
– Routing: selecting best DTN next hop for destination
– Forwarding: sending a bundle p2p when possible
– Custody Transfer: reliable intra-DTN delivery (with storage)
Routing, Forwarding and
Custody Transfer
10/12/2013 Slide 12 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus
Bundle Routing Example
A
B
B
Intermittent Links
DS
B
B
B
End-to-end Acknowledgement
(Sent using bundles, path omitted for clarity)
Contact Schedule
Aircraft
HUMMV
Schedule
Aircraft
HUMMV
10/12/2013 Slide 13 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus
Is it possible that data can be delivered?
– path between a source and a destination maybe
always won’t exist
Solution
– Traditional protocols: Internet (RIP, OSPF); Ad hoc
(DSR, AODV) would fail
– Formerly, mobility viewed as evil; Now, it’s perfect
– Node mobility would be exploited to help deliver message
(mobility-assisted or store-carry-and-forward)
Mobility-assisted routing
10/12/2013 Slide 14 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus
Two categories
– auxiliary nodes assisted (ANA) routing
• a set of special auxiliary nodes needed to assist data delivery
• VANETs etc.
• Throw-boxes / Ferry / Courier nodes / Autonomous Agents …
– independent mobile nodes (IMN) routing
• there is no additional participants in the deployment area
• message delivery achieved by node’s inherent movement
• Proactive & reactive
• Flooding vs. Heuristics based
Overview of Routing schemes
10/12/2013 Slide 15 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus
Pure Flooding
Probabilistic Flooding
Utility Based Flooding – goes into Heuristics
Multiple copies get created; Delivery reports used to clean them up
Epidemic: Flooding-based
10/12/2013 Slide 16 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus
tX(Y): time since X last saw Y
Indirect location information
 diffused with node mobility
smaller timer closer distance
 For most mobility models
Utility-based Routing
A
D
B
tB(D) = 100
t(D) = 0
t(D) = 26
t(D) = 68
tA(D) = 138
t(D) = 218
Last encounter timers
D D
Utility UX(Y) = f(tX(Y))
Policy: forward to B if
UB(D) > UA(D) + Uth
(A. Lindgren et al. ‘03)
10/12/2013 Slide 17 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus
Other knowledge-based routing
– MaxProp: A variation of Dijkstra’s algorithm
• Link weight: an estimate of delivery likelihood between two nodes
– MobySpace: each node maintains a high-dimension Euclidean
space
• Euclidean space: to describe mobility pattern of each node
• Encounter occurred: handover message only if the encountered node
has more similar mobility pattern with the destination.
10/12/2013 Slide 18 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus
Performance metric
– Message delivery ratio
• The fraction of generated messages that are correctly delivered to
the final destination within a given time period
– Transmission delay
• The time from a message is generated through it is received by
destination
– Number of transmissions (copies)
• The number of message exchange occurred between two nodes
Routing objective
10/12/2013 Slide 19 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus
The performance of 2-hop scheme is close enough to multi-hop
scheme (Burns et al, ’05)
Spray and wait scheme
– 2-hop relay scheme
• “Spray” a number of copies to the network, then “wait” until one of relay
nodes meets the desination
– Limited number of copies to L
• Multi-path diversity to reduce delay
• Achieves O(1) per node capacity
2-hop relay (multiple copies)
10/12/2013 Slide 20 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus
source starts with L copies
whenever a node with L > 1 copies finds a new node, it hands over half of the copies (L/2)
that it carries; Until L = 1
Binary Tree-based Spraying
Src
C
B
Dst
D
E
F
D
D
D
DL = 4
L = 2
L = 2
L = 1
L = 1
L = 1
L = 1
10/12/2013 Slide 21 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus
Routing issue in DTN is challenge, attracting more attention
Category of routing scheme
Have good scalability of DTN by exploring node mobility
Future direction: develop more realistic networks; from military to public
application
– Vehicle-based networks
– Pocket-switched networks
– Social networks
– Wildlife tracking networks
Summary
ANA scheme IMN scheme
Knowledge-basedFlooding-based
Routing schemes
10/12/2013 Slide 22 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus
• DTN Intro
• Node Mobility vs. User’s Social Relations and Behavior
• Positive Social Characteristics
• Negative Social Characteristics
Brief Information From Paper
10/12/2013 Slide 23 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus
Community Detection
• Modularity, Network of Communities
Information Propagation
• Spread factor, Spreading Time
• Connection Density, Influencing Factor, Critical Nodes
Recommendation System(s)
• Online shopping / reviews, Twitter / RSS ranking etc.
Security and Privacy
• Anti-Spam, limitations of blacklists, multiparty Authorization.
• Privacy / Anonymity and re-identification algo for anonymized social
network
Social Network Analysis
10/12/2013 Slide 24 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus
Custody Transfers tied to contact graphs and duration of contact
Communality, Centrality and Similarity of nodes
Time slot based graph vs. Each edge records number, time and
period of encounters
Contact graphs for DTN nodes and Social graphs for owners
are loosely identical.
Question: How do the encounter tables get shared on large
DTNs? Possibly scope to research further.
Social property if DTN : Graphs
10/12/2013 Slide 25 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus
Since DTN nodes are carried by people, they will tend to mimic
communities. {impact of device sharing}
Sociological Centrality metrics will imply that such nodes are
strong relay nodes
• Degree, Betweenness & Closeness to Destination
Similarity to Destination User location, Destination User
Interests etc. implies that such relay nodes are likely to get
near the destination. {challenge other than location how to
capture and model similarity – data generated, apps used
etc.}
Social property if DTN :
Community, Centrality, Similarity
10/12/2013 Slide 26 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus
Similarity can infer Friendship: Long lasting regular contacts
coupled with common interests in real world.
Rational Selfish behavior of social nodes implies that they want
to send/receive DTN data not act as relay’s for other’s data
… Friendship and Selfishness
10/12/2013 Slide 27 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus
Label Routing Hui & CrowCroft – Pocket Switched nodes –
IEEE PerCom 2007
• Community included as part of label
• Nodes also share their affiliations and Groups i.e. Social
communities
SimBet Routing Daly and Haar (ACM Symposium … 2007)
• Explores bridge nodes using betweenness, centrality and
similarity.
• Using Betweenness and Similarity to destination, the Utility
of node as next hop can be evaluated
• Scales by estimating centrality using only locally visible
information – but can have –ve effects
Approaches used for Benefiting
from Social Characteristics
10/12/2013 Slide 28 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus
Bubble Rap Forwarding Hui & other (MobiHoc 2008)
• Community and centrality
• Fast transfer towards destination community – bubble up
towards global centrality and bubble within community
• Changeless to in Hierarchical communities or for
communities on periphery (non-central)
Social Multicasting Gao & others (MobiHoc 2009)
• Centrality metric and community metric for relay
• Single data or multi-data multicast
• For Single data, assumed uniform destination distribution
• For Muti-data – use gateway nodes for multiple communities
Approaches used for Benefiting
from Social Characteristics…
10/12/2013 Slide 29 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus
Homophily Based data diffusion Zang & others (MobiHoc
2009)
• Prioritizes data propagation order (contact duration / storage
space limited)
• Homophily => shared interest {challenge to identify / model this}
• Share most similar data items between friends and most
different Data Items between strangers
Social Multicasting Bulut & others (GLOBECOM 2010)
• Social Pressure Metric [weighted by frequent long lasting regular contacts]
• Data sharing / storage complexity is high
User Centric Disseminataion Gao & Cao (INFOCOMM 2011)
Approaches used for Benefiting
from Social Characteristics…
10/12/2013 Slide 30 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus
Questions ?
Thanks
10/12/2013 Slide 31 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus
Backup
10/12/2013 Slide 32 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus
http://www.dtnrg.org
http://irtf.org/dtnrg
http://www.nasa.gov/mission_pages/station/research/experimen
ts/DTN.html
– Disruption Tolerant Networking
Slide references
– http://bwrc.eecs.berkeley.edu/php/pubs/pubs.php/762/Delay%20Tolerant%20Architectur
e%20v1%20Kevin%20Fall.ppt
– http://www.networks.howard.edu/hguo/docs/prest05.ppt
– http://netlab.cs.ucla.edu/wiki/files/relaycast_icnp08_final.ppt
Additional References
10/12/2013 Slide 33 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus
• Bundle, Payload, Fragment
• Bundle node
• Bundle protocol agent
• Convergence layer adapters
• Application agent
• Bundle endpoint
• Forwarding, Registration, Delivery
• Deliverability/Abandonment
• Deletion, Discard
• Transmission
• Custody
Terminology

Mais conteúdo relacionado

Mais procurados

3 S W 2009 I E E E Abstracts Java, N C C T Chennai
3    S W   2009  I E E E  Abstracts    Java,  N C C T  Chennai3    S W   2009  I E E E  Abstracts    Java,  N C C T  Chennai
3 S W 2009 I E E E Abstracts Java, N C C T Chennai
ncct
 
Getting Started with DDS in C++, Java and Scala
Getting Started with DDS in C++, Java and ScalaGetting Started with DDS in C++, Java and Scala
Getting Started with DDS in C++, Java and Scala
Angelo Corsaro
 
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKSDATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
Editor IJMTER
 

Mais procurados (12)

Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...
 
A New Approach to Volunteer Cloud Computing
A New Approach to Volunteer Cloud ComputingA New Approach to Volunteer Cloud Computing
A New Approach to Volunteer Cloud Computing
 
Parallel and Distributed System IEEE 2015 Projects
Parallel and Distributed System IEEE 2015 ProjectsParallel and Distributed System IEEE 2015 Projects
Parallel and Distributed System IEEE 2015 Projects
 
Parallel and Distributed System IEEE 2015 Projects
Parallel and Distributed System IEEE 2015 ProjectsParallel and Distributed System IEEE 2015 Projects
Parallel and Distributed System IEEE 2015 Projects
 
L347176
L347176L347176
L347176
 
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRESHYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
 
3 S W 2009 I E E E Abstracts Java, N C C T Chennai
3    S W   2009  I E E E  Abstracts    Java,  N C C T  Chennai3    S W   2009  I E E E  Abstracts    Java,  N C C T  Chennai
3 S W 2009 I E E E Abstracts Java, N C C T Chennai
 
Getting Started with DDS in C++, Java and Scala
Getting Started with DDS in C++, Java and ScalaGetting Started with DDS in C++, Java and Scala
Getting Started with DDS in C++, Java and Scala
 
Ontology-Based Routing for Large-Scale Unstructured P2P Publish/Subscribe System
Ontology-Based Routing for Large-Scale Unstructured P2P Publish/Subscribe SystemOntology-Based Routing for Large-Scale Unstructured P2P Publish/Subscribe System
Ontology-Based Routing for Large-Scale Unstructured P2P Publish/Subscribe System
 
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKSDATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
AN ADAPTIVE DIFFSERV APPROACH TO SUPPORT QOS IN NETWORK MOBILITY NEMO ENVIRON...
AN ADAPTIVE DIFFSERV APPROACH TO SUPPORT QOS IN NETWORK MOBILITY NEMO ENVIRON...AN ADAPTIVE DIFFSERV APPROACH TO SUPPORT QOS IN NETWORK MOBILITY NEMO ENVIRON...
AN ADAPTIVE DIFFSERV APPROACH TO SUPPORT QOS IN NETWORK MOBILITY NEMO ENVIRON...
 

Semelhante a Abhishek presentation october 2013

PacketCloud: an Open Platform for Elastic In-network Services.
PacketCloud: an Open Platform for Elastic In-network Services. PacketCloud: an Open Platform for Elastic In-network Services.
PacketCloud: an Open Platform for Elastic In-network Services.
yeung2000
 
Iccsit2010 paper2
Iccsit2010 paper2Iccsit2010 paper2
Iccsit2010 paper2
hanums1
 
Week 1-Foundations of Computer Networks.pptx
Week 1-Foundations of Computer Networks.pptxWeek 1-Foundations of Computer Networks.pptx
Week 1-Foundations of Computer Networks.pptx
BabarZafar5
 

Semelhante a Abhishek presentation october 2013 (20)

Research portfolio
Research portfolio Research portfolio
Research portfolio
 
IEEE HPSR 2017 Keynote: Softwarized Dataplanes and the P^3 trade-offs: Progra...
IEEE HPSR 2017 Keynote: Softwarized Dataplanes and the P^3 trade-offs: Progra...IEEE HPSR 2017 Keynote: Softwarized Dataplanes and the P^3 trade-offs: Progra...
IEEE HPSR 2017 Keynote: Softwarized Dataplanes and the P^3 trade-offs: Progra...
 
Using ICN to simplify data delivery, mobility management and secure transmission
Using ICN to simplify data delivery, mobility management and secure transmissionUsing ICN to simplify data delivery, mobility management and secure transmission
Using ICN to simplify data delivery, mobility management and secure transmission
 
The Role of Machine Learning in Fluid Network Control and Data Planes.pdf
The Role of Machine Learning in Fluid Network Control and Data Planes.pdfThe Role of Machine Learning in Fluid Network Control and Data Planes.pdf
The Role of Machine Learning in Fluid Network Control and Data Planes.pdf
 
Network cost services
Network cost servicesNetwork cost services
Network cost services
 
Lambda Data Grid: An Agile Optical Platform for Grid Computing and Data-inten...
Lambda Data Grid: An Agile Optical Platform for Grid Computing and Data-inten...Lambda Data Grid: An Agile Optical Platform for Grid Computing and Data-inten...
Lambda Data Grid: An Agile Optical Platform for Grid Computing and Data-inten...
 
PacketCloud: an Open Platform for Elastic In-network Services.
PacketCloud: an Open Platform for Elastic In-network Services. PacketCloud: an Open Platform for Elastic In-network Services.
PacketCloud: an Open Platform for Elastic In-network Services.
 
Catch Me If You Can - Cloud Foundry Summit Europe 2016
Catch Me If You Can - Cloud Foundry Summit Europe 2016Catch Me If You Can - Cloud Foundry Summit Europe 2016
Catch Me If You Can - Cloud Foundry Summit Europe 2016
 
Fault tolerance in Information Centric Networks
Fault tolerance in Information Centric NetworksFault tolerance in Information Centric Networks
Fault tolerance in Information Centric Networks
 
Ns2422412247
Ns2422412247Ns2422412247
Ns2422412247
 
Iccsit2010 paper2
Iccsit2010 paper2Iccsit2010 paper2
Iccsit2010 paper2
 
Week 1-Foundations of Computer Networks.pptx
Week 1-Foundations of Computer Networks.pptxWeek 1-Foundations of Computer Networks.pptx
Week 1-Foundations of Computer Networks.pptx
 
Peer-to-peer Systems.ppt
Peer-to-peer Systems.pptPeer-to-peer Systems.ppt
Peer-to-peer Systems.ppt
 
Metacomputer Architecture of the Global LambdaGrid
Metacomputer Architecture of the Global LambdaGridMetacomputer Architecture of the Global LambdaGrid
Metacomputer Architecture of the Global LambdaGrid
 
Building a Regional 100G Collaboration Infrastructure
Building a Regional 100G Collaboration InfrastructureBuilding a Regional 100G Collaboration Infrastructure
Building a Regional 100G Collaboration Infrastructure
 
IoT Lab @COPELABS
IoT Lab @COPELABSIoT Lab @COPELABS
IoT Lab @COPELABS
 
Always Offline: Delay-Tolerant Networking for the Internet of Things
Always Offline: Delay-Tolerant Networking for the Internet of ThingsAlways Offline: Delay-Tolerant Networking for the Internet of Things
Always Offline: Delay-Tolerant Networking for the Internet of Things
 
Netsoft19 Keynote: Fluid Network Planes
Netsoft19 Keynote: Fluid Network PlanesNetsoft19 Keynote: Fluid Network Planes
Netsoft19 Keynote: Fluid Network Planes
 
Part 1: Efficient Multimedia Delivery in Content-Centric Mobile Networks
Part 1: Efficient Multimedia Delivery in Content-Centric Mobile NetworksPart 1: Efficient Multimedia Delivery in Content-Centric Mobile Networks
Part 1: Efficient Multimedia Delivery in Content-Centric Mobile Networks
 
Networking lec1 4
Networking lec1 4Networking lec1 4
Networking lec1 4
 

Mais de Pratik Narang (7)

Hades_poster_Comad
Hades_poster_ComadHades_poster_Comad
Hades_poster_Comad
 
Hades
HadesHades
Hades
 
Machine-learning Approaches for P2P Botnet Detection using Signal-processing...
Machine-learning Approaches for P2P Botnet Detection using Signal-processing...Machine-learning Approaches for P2P Botnet Detection using Signal-processing...
Machine-learning Approaches for P2P Botnet Detection using Signal-processing...
 
PeerShark - Detecting Peer-to-Peer Botnets by Tracking Conversations
PeerShark - Detecting Peer-to-Peer Botnets by Tracking ConversationsPeerShark - Detecting Peer-to-Peer Botnets by Tracking Conversations
PeerShark - Detecting Peer-to-Peer Botnets by Tracking Conversations
 
Gokul seminar
Gokul seminarGokul seminar
Gokul seminar
 
Hota iitd
Hota iitdHota iitd
Hota iitd
 
Feature selection for detection of peer to-peer botnet traffic
Feature selection for detection of peer to-peer botnet trafficFeature selection for detection of peer to-peer botnet traffic
Feature selection for detection of peer to-peer botnet traffic
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Último (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Abhishek presentation october 2013

  • 1. BITS Pilani Hyderabad Campus A Survey of Social Based Routing in Delay Tolerant Networks: Positive and Negative Social Effects Abhishek Thakur CSIS, BITS-Pilani, Hyderabad Campus
  • 2. 10/12/2013 Slide 2 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus For links that are intermittent or poor in quality, end-to-end connectivity and routing may not be guaranteed especially in Extreme Scenario. Limits of MANets and Connected Networks Prob success (iid fail prob pf) over k links: For E2E delivery must have all links up But, expected # of failed links is k fsfs pkppp )1()(;1 fkp
  • 3. 10/12/2013 Slide 3 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus Probability of Delivery
  • 4. 10/12/2013 Slide 4 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus Optimizations on classic ad-hoc and delay-tolerant networking algorithms and began to examine factors such as security, reliability, verifiability – Node mobility would be exploited to help deliver message (mobility-assisted or store-carry- and-forward) Delay-Tolerant Networking Architecture – http://tools.ietf.org/html/rfc4838 Bundle Protocol Specification – http://tools.ietf.org/html/rfc5050 Why? What?
  • 5. 10/12/2013 Slide 5 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus Deep Space Communications – Beyond near-earth – Landers, Orbiters, Deep Space Probes Sensor Networks – Terrestrial: Ocean or Land Based – Extra-terrestrial objects (on planets, etc) High-Stress Physical Environments – Battlefield, Civil Emergency, Submarines This and next few slides – ref Kevin Fall - 2008 What is Extreme?
  • 6. 10/12/2013 Slide 6 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus • Large Delays • Intermittent and Scheduled Links • Bandwidth Asymmetry • Limited Power • Limited Emission Requirements (LPI/LPD) • Heterogeneous Network Architectures • Link Security Needs • Very Large Scale (e.g. sensor nets) Communications Challenges
  • 7. 10/12/2013 Slide 7 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus Unusual Devices
  • 8. 10/12/2013 Slide 8 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus Extreme systems • Do not (won’t) run IP – High overhead, for global routing – Intra-Oceans: investigate routing – Space: very limited routing [e.g. rover to lander] – Sensors: novel or simple routing, low power • Domain-specific features: – Naming, delivery abstraction, QoS But we don’t want to scrap existing (Internet) software and experience Heterogeneous Architectures The NASA Deep Space Network (DSN) – 3 70m-antenna array [USA, Spain, Australia] Underwater Acoustic Modems – Bottom-to-top comm under 20kbps to 6Km Low-Power CMOS Radios – Conventional and (hopefully) UWB SINGCARS and EPLRS Military Radios
  • 9. 10/12/2013 Slide 9 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus Goals of the DTN architecture: – Interoperability across network architectures – Reliability robust to link and node failure Components: – Reliable Message Overlay with Routing – Interoperability Gateways – Flexible Naming Scheme – Per-hop Authentication with CoS Delay-Tolerant Network Architecture
  • 10. 10/12/2013 Slide 10 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus End-to-End Message Service: “Bundles” – “postal-like” delivery over regional transports – Optional class of service/notification Key Idea: Custody Transfer – Custodian owns reliable-delivery guarantee – Bundles transferred between custodians toward destination – Sender may free resources upon successful custody transfer Reliable Message Overlay
  • 11. 10/12/2013 Slide 11 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus “Classic” Concepts (Internet): – Routing: selecting best next hop for every possible destination – Forwarding: sending packet to best next hop • Typically, “on demand” [statistical multiplexing] • Forwarders know a-priori next hop for every destination DTN Concepts: – Routing: selecting best DTN next hop for destination – Forwarding: sending a bundle p2p when possible – Custody Transfer: reliable intra-DTN delivery (with storage) Routing, Forwarding and Custody Transfer
  • 12. 10/12/2013 Slide 12 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus Bundle Routing Example A B B Intermittent Links DS B B B End-to-end Acknowledgement (Sent using bundles, path omitted for clarity) Contact Schedule Aircraft HUMMV Schedule Aircraft HUMMV
  • 13. 10/12/2013 Slide 13 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus Is it possible that data can be delivered? – path between a source and a destination maybe always won’t exist Solution – Traditional protocols: Internet (RIP, OSPF); Ad hoc (DSR, AODV) would fail – Formerly, mobility viewed as evil; Now, it’s perfect – Node mobility would be exploited to help deliver message (mobility-assisted or store-carry-and-forward) Mobility-assisted routing
  • 14. 10/12/2013 Slide 14 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus Two categories – auxiliary nodes assisted (ANA) routing • a set of special auxiliary nodes needed to assist data delivery • VANETs etc. • Throw-boxes / Ferry / Courier nodes / Autonomous Agents … – independent mobile nodes (IMN) routing • there is no additional participants in the deployment area • message delivery achieved by node’s inherent movement • Proactive & reactive • Flooding vs. Heuristics based Overview of Routing schemes
  • 15. 10/12/2013 Slide 15 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus Pure Flooding Probabilistic Flooding Utility Based Flooding – goes into Heuristics Multiple copies get created; Delivery reports used to clean them up Epidemic: Flooding-based
  • 16. 10/12/2013 Slide 16 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus tX(Y): time since X last saw Y Indirect location information  diffused with node mobility smaller timer closer distance  For most mobility models Utility-based Routing A D B tB(D) = 100 t(D) = 0 t(D) = 26 t(D) = 68 tA(D) = 138 t(D) = 218 Last encounter timers D D Utility UX(Y) = f(tX(Y)) Policy: forward to B if UB(D) > UA(D) + Uth (A. Lindgren et al. ‘03)
  • 17. 10/12/2013 Slide 17 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus Other knowledge-based routing – MaxProp: A variation of Dijkstra’s algorithm • Link weight: an estimate of delivery likelihood between two nodes – MobySpace: each node maintains a high-dimension Euclidean space • Euclidean space: to describe mobility pattern of each node • Encounter occurred: handover message only if the encountered node has more similar mobility pattern with the destination.
  • 18. 10/12/2013 Slide 18 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus Performance metric – Message delivery ratio • The fraction of generated messages that are correctly delivered to the final destination within a given time period – Transmission delay • The time from a message is generated through it is received by destination – Number of transmissions (copies) • The number of message exchange occurred between two nodes Routing objective
  • 19. 10/12/2013 Slide 19 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus The performance of 2-hop scheme is close enough to multi-hop scheme (Burns et al, ’05) Spray and wait scheme – 2-hop relay scheme • “Spray” a number of copies to the network, then “wait” until one of relay nodes meets the desination – Limited number of copies to L • Multi-path diversity to reduce delay • Achieves O(1) per node capacity 2-hop relay (multiple copies)
  • 20. 10/12/2013 Slide 20 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus source starts with L copies whenever a node with L > 1 copies finds a new node, it hands over half of the copies (L/2) that it carries; Until L = 1 Binary Tree-based Spraying Src C B Dst D E F D D D DL = 4 L = 2 L = 2 L = 1 L = 1 L = 1 L = 1
  • 21. 10/12/2013 Slide 21 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus Routing issue in DTN is challenge, attracting more attention Category of routing scheme Have good scalability of DTN by exploring node mobility Future direction: develop more realistic networks; from military to public application – Vehicle-based networks – Pocket-switched networks – Social networks – Wildlife tracking networks Summary ANA scheme IMN scheme Knowledge-basedFlooding-based Routing schemes
  • 22. 10/12/2013 Slide 22 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus • DTN Intro • Node Mobility vs. User’s Social Relations and Behavior • Positive Social Characteristics • Negative Social Characteristics Brief Information From Paper
  • 23. 10/12/2013 Slide 23 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus Community Detection • Modularity, Network of Communities Information Propagation • Spread factor, Spreading Time • Connection Density, Influencing Factor, Critical Nodes Recommendation System(s) • Online shopping / reviews, Twitter / RSS ranking etc. Security and Privacy • Anti-Spam, limitations of blacklists, multiparty Authorization. • Privacy / Anonymity and re-identification algo for anonymized social network Social Network Analysis
  • 24. 10/12/2013 Slide 24 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus Custody Transfers tied to contact graphs and duration of contact Communality, Centrality and Similarity of nodes Time slot based graph vs. Each edge records number, time and period of encounters Contact graphs for DTN nodes and Social graphs for owners are loosely identical. Question: How do the encounter tables get shared on large DTNs? Possibly scope to research further. Social property if DTN : Graphs
  • 25. 10/12/2013 Slide 25 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus Since DTN nodes are carried by people, they will tend to mimic communities. {impact of device sharing} Sociological Centrality metrics will imply that such nodes are strong relay nodes • Degree, Betweenness & Closeness to Destination Similarity to Destination User location, Destination User Interests etc. implies that such relay nodes are likely to get near the destination. {challenge other than location how to capture and model similarity – data generated, apps used etc.} Social property if DTN : Community, Centrality, Similarity
  • 26. 10/12/2013 Slide 26 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus Similarity can infer Friendship: Long lasting regular contacts coupled with common interests in real world. Rational Selfish behavior of social nodes implies that they want to send/receive DTN data not act as relay’s for other’s data … Friendship and Selfishness
  • 27. 10/12/2013 Slide 27 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus Label Routing Hui & CrowCroft – Pocket Switched nodes – IEEE PerCom 2007 • Community included as part of label • Nodes also share their affiliations and Groups i.e. Social communities SimBet Routing Daly and Haar (ACM Symposium … 2007) • Explores bridge nodes using betweenness, centrality and similarity. • Using Betweenness and Similarity to destination, the Utility of node as next hop can be evaluated • Scales by estimating centrality using only locally visible information – but can have –ve effects Approaches used for Benefiting from Social Characteristics
  • 28. 10/12/2013 Slide 28 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus Bubble Rap Forwarding Hui & other (MobiHoc 2008) • Community and centrality • Fast transfer towards destination community – bubble up towards global centrality and bubble within community • Changeless to in Hierarchical communities or for communities on periphery (non-central) Social Multicasting Gao & others (MobiHoc 2009) • Centrality metric and community metric for relay • Single data or multi-data multicast • For Single data, assumed uniform destination distribution • For Muti-data – use gateway nodes for multiple communities Approaches used for Benefiting from Social Characteristics…
  • 29. 10/12/2013 Slide 29 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus Homophily Based data diffusion Zang & others (MobiHoc 2009) • Prioritizes data propagation order (contact duration / storage space limited) • Homophily => shared interest {challenge to identify / model this} • Share most similar data items between friends and most different Data Items between strangers Social Multicasting Bulut & others (GLOBECOM 2010) • Social Pressure Metric [weighted by frequent long lasting regular contacts] • Data sharing / storage complexity is high User Centric Disseminataion Gao & Cao (INFOCOMM 2011) Approaches used for Benefiting from Social Characteristics…
  • 30. 10/12/2013 Slide 30 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus Questions ? Thanks
  • 31. 10/12/2013 Slide 31 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus Backup
  • 32. 10/12/2013 Slide 32 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus http://www.dtnrg.org http://irtf.org/dtnrg http://www.nasa.gov/mission_pages/station/research/experimen ts/DTN.html – Disruption Tolerant Networking Slide references – http://bwrc.eecs.berkeley.edu/php/pubs/pubs.php/762/Delay%20Tolerant%20Architectur e%20v1%20Kevin%20Fall.ppt – http://www.networks.howard.edu/hguo/docs/prest05.ppt – http://netlab.cs.ucla.edu/wiki/files/relaycast_icnp08_final.ppt Additional References
  • 33. 10/12/2013 Slide 33 NetClique.in Internal Presentations BITS Pilani, Hyderabad Campus • Bundle, Payload, Fragment • Bundle node • Bundle protocol agent • Convergence layer adapters • Application agent • Bundle endpoint • Forwarding, Registration, Delivery • Deliverability/Abandonment • Deletion, Discard • Transmission • Custody Terminology