Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

Exploiting social paradigms as routing strategies in Delay Tolerant Networks: an introduction

Claudio Fiandrino
claudio.andrino@gmail.com

August 27, 2012

Abstract The article illustrates several approaches developed in literature that exploit social paradigms to improve the routing in Delay Tolerant Networks (DTNs). Moreover, it gives an overview on the mobility models adopted, focusing the attention to those ones useful in opportunistic networks.

Contents
1 Motivations 2 The strategies developed 2.1 Introduction . . . . . . . . 2.2 The analysis . . . . . . . . 2.2.1 Mobility models . 2.2.2 Routing strategies Bibliography 1 2 2 2 2 3 5

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

Motivations

The application of social paradigms to DTNs it is a very well known concept in literature and researchers largely explored this eld by developing a lot of different algorithms and strategies. The basic idea behind all, is to exploit social relations to identify human mobility patterns; as result, socially-aware algorithms achieve better performances than non-socially-aware algorithms since to spread the information by means of social paradigms allow to be fast (thus latency is reduced) and

to increase the delivery ratio with a lower cost (in terms of the number of message replicas). The detection of human mobility pattern is a fundamental part since it has been noticed that people tend to meet frequently when they have interest in common in physical places as streets, squares, conferences, etc . . . In [29] authors proved this concept by highlighting the relations between the social graph and the contact graph.

2
2.1

The strategies developed


Introduction

A survey on the various social approaches already used in literature is given in [12]: in this section, a better picture of the state of the art is provided by enhancing [12].

2.2
2.2.1

The analysis
Mobility models

Some experiments to study human relations and to build social traces were done with the help of volunteers at conferences [20] or in a campus [38]. More deeply, [38] proves that the user mobility form a network. However, this studies consider just a small number of individuals. Other studies as [33, 22, 14] rely on traces already available in the Internet that contains the contact history of taxicabs while [37] takes into account the mobility patterns of 22 341 students to efciently design aggregation algorithms. Furthermore, the Haggle Project [40] creates a DTN by connecting human mobile devices. In [36] authors propose a community model able to characterize the reallife mobility features. Based on this concept, [28] shows that the separation of people into two groups, friends and strangers, allows to improve the routing performances. Moreover, they try to address security issues and they show that people encounters have daily and weekly cycles. An improvement of this work has been shown in [42]; individuals, here, are divided into four groups: familiar, familiar stranger, friends and strangers. Similarly to [37], [9] analysed the human mobility: their contribute is the proof that the distribution of contact and inter-contact times follow a powerlaw distribution with heavy-tail. On this bases, [31] developed communitybased mobility models (CMM), showing that they present contact times and inter-contact times heavy-tailed. Another mobility model is presented in [13] and this model tries to mimic the behaviour of the average person. Founded on social networks theory, authors in [32] provide an interesting mobility model: individual are grouped together based on their social-relationship

and groups are mapped on a topographical space. They also forecast that social-relationship may change over time. How mobility models affect routing performances has been studied in [2]; the analysis is based on groups and the conclusion is that social-aware routing schemes reduces congestion and provide acceptable QoS with lower overhead. Some other studies rely on simplistic random mobility models (Random Walk, Random Way Point) and they try to address problems like: single-copy based routing algorithms [25, 21, 8, 35]; multi-copy based routing algorithms [34, 5]; erasure coding based routing algorithms (they allow the use of a large number of relays while maintaining a constant overhead) [41, 6]. However, [9] proved that these mobility models are not suitable for DTNs since they do not have heavy-tailed distributed contact times and intercontact times. A work that exploits the history of the social relations among users is [3]. The developed algorithm, HiBOp, automatically learns which are the most efcient connectivity opportunities that are based on users movement patterns. 2.2.2 Routing strategies

Now algorithms that try to detect which are the best individuals to forward the information to will be analysed. PRoPHET [24] makes routing decision based on the delivery probability, a paradigm in which last encountered are more relevant as individuals to forward the information to. Due to this reason, it is possible to claim that PRoPHET uses an indirect social metric because, usually, social-connected individuals meet themselves more frequently. SimBet [11] introduces two new paradigms: similarity and betweenness. The former measures how two nodes are socially closed each other by comparing their mutual contacts while the latter estimates the centrality of a node, that is how much it is important in the network. Bubble rap [19] uses as paradigms community and centrality: they measure the relevance of an individual locally and in a global fashion respectively. The routing strategy forecast that messages are forwarded to individuals with high global popularity until it is reached the destination community; once there, messages are forwarded to the individual with highest local popularity because it has more change to get in contact with the recipient. PeopleRank [30] takes inspiration from the famous PageRank to detect the best individual to which data is forwarded. In [17] authors proved that the performances of SimBet and Bubble rap heavily depends on the way in which the contact aggregation (mapping) has 3

been done. The same author in [18] propose a new mapping algorithm to cope previous issues that builds better contact-graphs based on concepts of spectral graph theory and unsupervised learning. SimBet, Bubble rap and PeopleRank look at the single individual; a different approach has been taken from authors of [7]: they consider the average inter-meeting times between groups of nodes. Other community-based approaches are DelQue [15] and [23] in which authors present a distributed algorithm, LocalCom, that utilizes local information to detect communities. Moreover, they developed two schemes able to facilitate the forwarding by control the redundancy of gateway that connect communities. SimBet, Bubble rap and LocalCom are unicast algorithms. A multicast one has been proposed by [16]. Another algorithm is SMART [39]: it bases its own forwarding strategy on the so called travel companions, individuals that more frequently meet the destination. In the rst phase, a xed number of copies of the message are injected in the network destined to a travel companion and in the second phase, the travel companion forwards the message to the destination (if met) or to a xed number of other travel companions. In [4] authors introduce a different routing algorithm. They dened a new social metric that does not rely on the encounter frequency, total or average contact period, but it takes into account contemporaneously the following features: frequency, longevity and regularity. Friendship, therefore, is ensured when two individuals get in contact with frequently, for a long period each time and regularly. Notice that frequency and regularity here are different: two individuals that get in contact with regularly during months, but unfrequently (once a month for example) should still be considered friends (in a weaker fashion). The three properties form the so called Social Pressure Metric (SPM): it measure how much an individual is motivated to share contents with others. In [10] is proposed SocialCast, an interest-based routing algorithm. The basic paradigm is publish/subscribing: the publisher simply inject the message into the network and it will be delivered just to nodes that previously declared to be interested in (subscription phase). The algorithm relies on the fact that socially-related people tend to be co-located regularly and this allows to make reasonable predictions to select good carries. This approach allows to infer a one-to-many communication paradigm without extracting community ties among the individuals. SocialCast allows, with a small number of replicas in the system, to achieve a very high delivery ratio by keeping the same network trafc of a non-predictive algorithm. Still related to the publish/subscribing paradigm are Still related to the publish/subscribing paradigm are [43], [44] and [26]. Another work of this kind and that exploits social relationship to transmit messages is [1] with the ContentPlace framework. When a node gets in 4

contact with another one, it advertises the data object it is interested in and exchanges summaries of the data object it holds. Since each object has an utility value, individuals can decide where to place their object (the publisher can decide the direction and the propagation range) such that their availability for the whole network is maximize. The above strategies are stateful strategie, that is the improvement of performances comes at the cost of knowing information like past encounters or portion of the social network graph. In [27] authors provide an approach in which they model individuals interests in m-dimensional interest space and they create individuals interest proles, that are m-dimensional vectors corresponding to a point in the interest space. The forwarding is based on the similarity of the individuals interest proles.

References
[1] C. Boldrini, M. Conti, and A. Passarella. ContentPlace: social-aware data dissemination in opportunistic networks. In: Proceedings of the 11th international symposium on Modeling, analysis and simulation of wireless and mobile systems. ACM. 2008, pp. 203210. [2] C. Boldrini, M. Conti, and A. Passarella. Impact of social mobility on routing protocols for opportunistic networks. In: World of Wireless, Mobile and Multimedia Networks, 2007. WoWMoM 2007. IEEE International Symposium on a. IEEE. 2007, pp. 16. [3] C. Boldrini et al. Hibop: a history based routing protocol for opportunistic networks. In: World of Wireless, Mobile and Multimedia Networks, 2007. WoWMoM 2007. IEEE International Symposium on a. IEEE. 2007, pp. 112. [4] E. Bulut and B.K. Szymanski. Friendship based routing in delay tolerant mobile social networks. In: GLOBECOM 2010, 2010 IEEE Global Telecommunications Conference. IEEE. 2010, pp. 15. [5] E. Bulut, Z. Wang, and B.K. Szymanski. Cost-effective multiperiod spraying for routing in delay-tolerant networks. In: IEEE/ACM Transactions on Networking (TON) 18.5 (2010), pp. 15301543. [6] E. Bulut, Z. Wang, and B.K. Szymanski. Cost Efcient Erasure Coding based Routing in Delay Tolerant Networks. In: Communications (ICC), 2010 IEEE International Conference on. IEEE. 2010, pp. 15. [7] E. Bulut, Z. Wang, and B.K. Szymanski. Impact of social networks on delay tolerant routing. In: Global Telecommunications Conference, 2009. GLOBECOM 2009. IEEE. IEEE. 2009, pp. 16.

[8] J. Burgess et al. Maxprop: Routing for vehicle-based disruptiontolerant networks. In: Proc. ieee infocom. Vol. 6. Barcelona, Spain. 2006, pp. 111. [9] A. Chaintreau et al. Impact of human mobility on opportunistic forwarding algorithms. In: Mobile Computing, IEEE Transactions on 6.6 (2007), pp. 606620. [10] P. Costa et al. Socially-aware routing for publish-subscribe in delaytolerant mobile ad hoc networks. In: Selected Areas in Communications, IEEE Journal on 26.5 (2008), pp. 748760. E.M. Daly and M. Haahr. Social network analysis for routing in disconnected delay-tolerant manets. In: Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing. ACM. 2007, pp. 3240. RJ Dsouza and J. Jose. Routing approaches in delay tolerant networks: A survey. In: International Journal of Computer Applications IJCA 1.17 (2010), pp. 915. F. Ekman et al. Working day movement model. In: Proceeding of the 1st ACM SIGMOBILE workshop on Mobility models. ACM. 2008, pp. 3340. F. Fabbri and R. Verdone. A sociability-based routing scheme for delaytolerant networks. In: EURASIP Journal on Wireless Communications and Networking 2011 (2011), p. 1. J. Fan et al. DelQue: A Socially-Aware Delegation Query Scheme in Delay Tolerant Networks. In: Vehicular Technology, IEEE Transactions on 99 (2011), pp. 11. W. Gao et al. Multicasting in delay tolerant networks: a social network perspective. In: Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing. ACM. 2009, pp. 299308. T. Hossmann, F. Legendre, and T. Spyropoulos. From contacts to graphs: Pitfalls in using complex network analysis for dtn routing. In: INFOCOM Workshops 2009, IEEE. IEEE. 2009, pp. 16. T. Hossmann, T. Spyropoulos, and F. Legendre. Know thy neighbor: Towards optimal mapping of contacts to social graphs for dtn routing. In: INFOCOM, 2010 Proceedings IEEE. IEEE. 2010, pp. 19. P. Hui, J. Crowcroft, and E. Yoneki. Bubble rap: social-based forwarding in delay tolerant networks. In: Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing. ACM. 2008, pp. 241250.

[11]

[12]

[13]

[14]

[15]

[16]

[17]

[18]

[19]

[20]

P. Hui et al. Pocket switched networks and human mobility in conference environments. In: Proceedings of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking. ACM. 2005, pp. 244251. S. Jain, K. Fall, and R. Patra. Routing in a delay tolerant network. Vol. 34. 4. ACM, 2004. J.G. Jetcheva et al. CRAWDAD data set rice ad hoc city (v. 2003-09-11). 2003. F. Li and J. Wu. LocalCom: a community-based epidemic forwarding scheme in disruption-tolerant networks. In: Sensor, Mesh and Ad Hoc Communications and Networks, 2009. SECON09. 6th Annual IEEE Communications Society Conference on. IEEE. 2009, pp. 19. A. Lindgren, A. Doria, and O. Scheln. Probabilistic routing in intermittently connected networks. In: ACM SIGMOBILE Mobile Computing and Communications Review 7.3 (2003), pp. 1920. A. Lindgren, A. Doria, and O. Schelen. Probabilistic routing in intermittently connected networks. In: Service Assurance with Partial and Intermittent Resources (2004), pp. 239254. N. Liu et al. A community-based event delivery protocol in publish/subscribe systems for delay tolerant sensor networks. In: Sensors 9.10 (2009), pp. 75807594. A. Mei et al. Social-aware stateless forwarding in pocket switched networks. In: INFOCOM, 2011 Proceedings IEEE. IEEE. 2011, pp. 251 255. A.G. Miklas et al. Exploiting social interactions in mobile systems. In: Proceedings of the 9th international conference on Ubiquitous computing. Springer-Verlag. 2007, pp. 409428. A. Mtibaa et al. Are you moved by your social network application? In: Proceedings of the rst workshop on Online social networks. ACM. 2008, pp. 6772. A. Mtibaa et al. Peoplerank: Social opportunistic forwarding. In: INFOCOM, 2010 Proceedings IEEE. IEEE. 2010, pp. 15. M. Musolesi and C. Mascolo. A community based mobility model for ad hoc network research. In: Proceedings of the 2nd international workshop on Multi-hop ad hoc networks: from theory to reality. ACM. 2006, pp. 3138. M. Musolesi and C. Mascolo. Designing mobility models based on social network theory. In: ACM SIGMOBILE Mobile Computing and Communications Review 11.3 (2007), pp. 5970. M. Piorkowski, N. Sarajanovic-Djukic, and M. Grossglauser. CRAWDAD data set ep/mobility (v. 2009-02-24). 2009. 7

[21] [22] [23]

[24]

[25]

[26]

[27]

[28]

[29]

[30] [31]

[32]

[33]

[34]

T. Spyropoulos, K. Psounis, and C.S. Raghavendra. Efcient routing in intermittently connected mobile networks: the multiple-copy case. In: Networking, IEEE/ACM Transactions on 16.1 (2008), pp. 7790. T. Spyropoulos, K. Psounis, and C.S. Raghavendra. Efcient routing in intermittently connected mobile networks: The single-copy case. In: IEEE/ACM Transactions on Networking (TON) 16.1 (2008), pp. 6376. T. Spyropoulos, K. Psounis, and C.S. Raghavendra. Performance analysis of mobility-assisted routing. In: Proceedings of the 7th ACM international symposium on Mobile ad hoc networking and computing. ACM. 2006, pp. 4960. V. Srinivasan, M. Motani, and W.T. Ooi. Analysis and implications of student contact patterns derived from campus schedules. In: Proceedings of the 12th annual international conference on Mobile computing and networking. ACM. 2006, pp. 8697. J. Su et al. User mobility for opportunistic ad-hoc networking. In: Mobile Computing Systems and Applications, 2004. WMCSA 2004. Sixth IEEE Workshop on. IEEE. 2004, pp. 4150. L. Tang et al. Smart: a selective controlled-ooding routing for delay tolerant networks. In: Broadband Communications, Networks and Systems, 2007. BROADNETS 2007. Fourth International Conference on. IEEE. 2007, pp. 356365. The Haggle Project. 2006. URL: http://www.haggleproject.org/. Y. Wang et al. Erasure-coding based routing for opportunistic networks. In: Proceedings of the 2005 ACM SIGCOMM workshop on Delaytolerant networking. ACM. 2005, pp. 229236. E. Yoneki, P. Hui, and J. Crowcroft. Visualizing community detection in opportunistic networks. In: Proceedings of the second ACM workshop on Challenged networks. ACM. 2007, pp. 9396. E. Yoneki et al. A socio-aware overlay for publish/subscribe communication in delay tolerant networks. In: Proceedings of the 10th ACM Symposium on Modeling, analysis, and simulation of wireless and mobile systems. ACM. 2007, pp. 225234. Y. Zhao and J. Wu. Socially-Aware Publish/Subscribe System for Human Networks. In: Wireless Communications and Networking Conference (WCNC), 2010 IEEE. IEEE. 2010, pp. 16.

[35]

[36]

[37]

[38]

[39]

[40] [41]

[42]

[43]

[44]

You might also like