Profile-cast: Behavior-Aware Mobile Networking - PowerPoint PPT Presentation

1 / 1
About This Presentation
Title:

Profile-cast: Behavior-Aware Mobile Networking

Description:

UNIVERSITY OF FLORIDA UF Profile-cast: Behavior-Aware Mobile Networking Wei-jen Hsu1, Debojyoti Dutta2, Ahmed Helmy1 1Dept. of Computer and Information Science and ... – PowerPoint PPT presentation

Number of Views:30
Avg rating:3.0/5.0
Slides: 2
Provided by: Divis1
Category:

less

Transcript and Presenter's Notes

Title: Profile-cast: Behavior-Aware Mobile Networking


1
Profile-cast Behavior-Aware Mobile Networking
Computer and Information Science and Engineering
Department UNIVERSITY OF FLORIDA
UF
Wei-jen Hsu1, Debojyoti Dutta2, Ahmed
Helmy1 1Dept. of Computer and Information Science
and Engineering, U. of Florida, 2Cisco Systems,
Inc. wjhsu_at_ufl.edu, dedutta_at_cisco.com,
helmy_at_ufl.edu
http//nile.cise.ufl.edu/MobiLib
2. Target Application Profile-cast
1. Introduction (Routing in Delay Tolerant
Networks)
  • We focus on message delivery to a group of hosts
    with similar characteristics (profile-cast)
  • (v.s. multi-cast) Group membership is implicit
  • Each node characterized by its unique property in
    the profile space
  • Similar nodes are close to each other,dissimilar
    nodes are far apart
  • We use mobility profile as an example
  • Targeted announcement, lost-and-found
  • (v.s. geo-cast) Definition of user group based
    on long-run mobility characteristics
  • Delay tolerant networks (DTNs) are mobile network
    with sparse, intermittent network connectivity.
  • Messages are stored in non-volatile memory of
    nodes and moved across the network with nodal
    mobility.
  • Encounter events provide the communication
    opportunities among nodes
  • Message-forwarding decisions
  • De-centralized, based on locally available
    information
  • Impact performance (success rate, overhead,
    delay)

Contribution Show-casing the potential of
improving DTN routing protocols when user
behavioral patterns are considered.
3. Similarity-based Forwarding Protocol
4. Evaluation
  • Based on USC WLAN trace for realistic user
    mobility (2006 spring, 94 days, 5000 users)
  • We use hierarchical clustering to identify 200
    distinct groups based on mobility profile2,
    focus on groups with 5 or more members and
    randomly pick 20 of the members in these groups
    as message senders.
  • We compare the similarity-based protocol against
  • Routing with centralized knowledge of user
    grouping (The ideal case - nodes know which group
    they are in through an oracle)
  • Epidemic routing
  • Random transmission
  • We compare protocol performances based on Success
    rate, Overhead, and Delay.

Profiling User Mobility
  • Mobility of a node is represented by an
    association matrix.
  • Singular value decomposition provides a summary
    of the matrix (Eigen-behavior vectors)

Each row represents an association vector for a
time slot
An entry represents the percentage of online
time during time slot i at location j
1. Each node keeps its summarized mobility
profile as it moves to various locations.2.
When nodes meet, they exchange the summarized
mobility profile to determine their similarity.
Determining User Similarity
  • Similarity of user mobility are evaluated by
    weightedinner products of eigen-behaviors
  • Message forwarded if Sim(U,V) is larger than a
    threshold
  • Behavior-aware protocol design shows performance
    improvement over behavior-oblivious protocols
  • Compare with epidemic
  • 45 of overhead with 92 of success rate
    (similarity 0.5)
  • 3 of overhead with 61 of success rate
    (similarity 0.7)
  • Compare with random trans.
  • Better success rate under similar overhead
    (similarity 0.6 v.s. RTx TTL9)
  • Flexible overhead-performance tradeoff

5. Simulation Results
No usergrouping info
Complete user grouping info
Inferred user grouping info
Similarity-basedprotocol
Centralized protocol- Highly efficient - But not
practical
  • Epidemic andRandom Tx.
  • Simple
  • Not optimized

6. Future Work
  • Extend the mobility profile to include the
    encounter pattern
  • Profile-cast with other attributes (e.g.
    interests of users)
  • Experiments with other realistic data sets and
    test bed implementation

This work is supported by NSF CAREER Award
0134650 and partially completed when the authors
were with U. of Southern California.
1 Full version of technical report available at
http//arxiv.org/abs/cs/06060022 W. Hsu, D.
Dutta, and A. Helmy, Extended Abstract Mining
Behavioral Groups in Large Wireless LANs, in
Proceedings of MOBICOM 2007.
1 Full version of technical report available at
http//arxiv.org/abs/cs/0606002 2 A. Vahdat and
D. Becker, Epidemic Routing for Partially
Connected Ad Hoc Networks, Technical Report
CS-200006, Duke University, April 2000. 3 T.
Spyropoulos, K. Psounis, and C. S. Raghavendra,
Spray and wait Efficient routing in
intermittently connected mobile networks, In
Proceedings of ACM SIGCOMM workshop on Delay
Tolerant Networking (WDTN), Aug. 2005. 4 S.
Jain, K. Fall, and R. Patra, Routing in a delay
tolerant network, In Proceedings of ACM SIGCOMM,
Aug. 2004. 5 J. Leguay, T. Friedman, and V.
Conan, Evaluating Mobility Pattern Space Routing
for DTNs, in Proceedings of IEEE INFOCOM, April,
2006. 6 W. Hsu and A. Helmy, MobiLib USC WLAN
trace data set. Download from http//nile.cise.ufl
.edu/MobiLib/USC_trace
Write a Comment
User Comments (0)
About PowerShow.com