19 research outputs found

    ๋ชจ๋ฐ”์ผ ์†Œ์…œ๋„คํŠธ์›Œํฌ์—์„œ ์‚ฌ์šฉ์ž๊ฐ„ ๊ธฐํšŒ์ ์ธ ๊ณต์œ ๊ธฐ๋ฐ˜ํŠธ๋ž˜ํ”ฝ ์˜คํ”„๋กœ๋”ฉ

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ (๋ฐ•์‚ฌ)-- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› : ์ „๊ธฐยท์ปดํ“จํ„ฐ๊ณตํ•™๋ถ€, 2013. 8. ์ตœ์–‘ํฌ.์ตœ๊ทผ ๋ชจ๋ฐ”์ผ ํŠธ๋ž˜ํ”ฝ์˜ ๋น ๋ฅธ ์ฆ๊ฐ€๋Š” ์ด๋™ํ†ต์‹  ์‚ฌ์—…์ž์—๊ฒŒ ์‹ฌ๊ฐํ•œ ๋ฌธ์ œ๊ฐ€ ๋˜๊ณ  ์žˆ๋‹ค. ์ด๋Ÿฌํ•œ ๋ฌธ์ œ๋ฅผ ํ•ด๊ฒฐํ•˜๊ธฐ ์œ„ํ•ด ๋‹จ๊ฑฐ๋ฆฌ ํ†ต์‹  ๊ธฐ์ˆ  ๋ฐ ๋ชจ๋ฐ”์ผ ์†Œ์…œ ๋„คํŠธ์›Œํฌ ๋“ฑ์„ ์ด์šฉํ•˜์—ฌ ์‚ฌ์šฉ์ž๊ฐ„ ์ง์ ‘ ๋ฐ์ดํ„ฐ๋ฅผ ์ฃผ๊ณ  ๋ฐ›๋Š” ์˜คํ”„๋กœ๋”ฉ ๊ธฐ๋ฒ•์„ ์‚ฌ์šฉํ•˜๋Š” ๊ฒƒ์— ๋Œ€ํ•œ ์—ฐ๊ตฌ๊ฐ€ ์ด๋ฃจ์–ด์ง€๊ณ  ์žˆ๋‹ค. ๋ณธ ๋…ผ๋ฌธ์—์„œ๋Š” ์‚ฌ์šฉ์ž๊ฐ„ ์ง์ ‘ ํ†ต์‹ ์„ ํ†ตํ•œ ํšจ์œจ์ ์ธ ์ฝ˜ํ…์ธ  ๊ณต์œ  ๋ฐ ์˜คํ”„๋กœ๋”ฉ ๊ธฐ๋ฒ•์„ ์ œ์•ˆํ•˜๊ณ ์ž ํ•œ๋‹ค. ์ฒซ๋ฒˆ์งธ ์—ฐ๊ตฌ๋กœ, ๋ชจ๋ฐ”์ผ ์†Œ์…œ ๋„คํŠธ์›Œํฌ์—์„œ ์‚ฌ์šฉ์ž๊ฐ„ ์ง์ ‘ ์ „์†ก๊ธฐํšŒ๋ฅผ ํ™œ์šฉํ•ด ๋ฐ์ดํ„ฐ๋ฅผ ๊ณต์œ ํ•˜๋Š” ๋ชจ๋ฐ”์ผ ํŠธ๋ž˜ํ”ฝ ์˜คํ”„๋กœ๋”ฉ์˜ ํ•ต์‹ฌ ๊ธฐ์ˆ ์ธ TOSS๋ฅผ ์ œ์•ˆ ํ•˜์˜€๋‹ค. TOSS์—์„œ๋Š” ์…€๋ฃฐ๋Ÿฌ ๋„คํŠธ์›Œํฌ์—์„œ ๊ธ‰์†ํžˆ ์ฆ๊ฐ€ํ•˜๊ณ  ์žˆ๋Š” ํŠธ๋ž˜ํ”ฝ์œผ๋กœ ์ธํ•œ ๋„คํŠธ์›Œํฌ ๊ณผ๋ถ€ํ•˜๋ฅผ ๊ฒฝ๊ฐ์‹œํ‚ค๊ธฐ ์œ„ํ•ด ์˜จ๋ผ์ธ ์†Œ์…œ ๋„คํŠธ์›Œํฌ์—์„œ ์‚ฌ์šฉ์ž์˜ ์—ฐ๊ฒฐ์„ฑ ๋ฐ ์˜คํ”„๋ผ์ธ ๋„คํŠธ์›Œํฌ์—์„œ ์‚ฌ์šฉ์ž์˜ ์ด๋™์„ฑ์„ ๊ณ ๋ คํ•˜์—ฌ ์ฝ˜ํ…์ธ ๋ฅผ ์ „๋‹ฌํ•  ์‚ฌ์šฉ์ž๋ฅผ ๊ฒฐ์ •ํ•˜๊ณ  ๋ธ”๋ฃจํˆฌ์Šค๋‚˜ ์™€์ดํŒŒ์ด ๋‹ค์ด๋ ‰ํŠธ ๋“ฑ์˜ ๊ธฐ์ˆ ์„ ์ด์šฉํ•ด ์ฝ˜ํ…์ธ ๋ฅผ ์ง์ ‘ ์ „๋‹ฌ ํ•˜์˜€๋‹ค. ๋˜ํ•œ ์†Œ์…œ๋„คํŠธ์›Œํฌ ์„œ๋น„์Šค ์‚ฌ์šฉ์ž์˜ ์„œ๋กœ ๋‹ค๋ฅธ ์ฝ˜ํ…์ธ  ์ ‘๊ทผ ํŒจํ„ด, ์ฆ‰ ๊ฐ ์‚ฌ์šฉ์ž๊ฐ€ ์ฝ˜ํ…์ธ  ์ƒ์„ฑ์œผ๋กœ๋ถ€ํ„ฐ ์˜คํ”„๋กœ๋”ฉ์„ ์œ„ํ•ด ์ฝ˜ํ…์ธ ์— ์ ‘๊ทผํ•˜๊ธฐ๊นŒ์ง€์˜ ์‹œ๊ฐ„์„ ๊ณ ๋ ค ํ•˜์˜€๋‹ค. ๋ณธ ์—ฐ๊ตฌ์—์„œ๋Š” ์ด๋Ÿฌํ•œ ์š”๊ฑด์„ ๊ณ ๋ คํ•˜์—ฌ ํŠธ๋ž˜ํ”ฝ ์˜คํ”„๋กœ๋”ฉ๊ณผ ์ฝ˜ํ…์ธ  ํ™•์‚ฐ์„ ๋ชจ๋ธ๋งํ•˜๊ณ  ๋ถ„์„ ํ•˜์˜€๋‹ค. ๋ชจ๋ฐ”์ผ ์†Œ์…œ ๋„คํŠธ์›Œํฌ์˜ ๋ฐ์ดํƒ€ ์…‹์„ ๊ธฐ๋ฐ˜์œผ๋กœ ๋ถ„์„ ๊ฒฐ๊ณผ์—์„œ TOSS๋Š” ๋ชจ๋“  ์‚ฌ์šฉ์ž์˜ ๋”œ๋ ˆ์ด ์š”๊ตฌ์กฐ๊ฑด์„ ๋งŒ์กฑ์‹œํ‚ค๋ฉด์„œ ์ตœ๋Œ€ 86.5์˜ ์…€๋ฃฐ๋Ÿฌ ํŠธ๋ž˜ํ”ฝ์„ ๊ฒฝ๊ฐ์‹œํ‚ค๋Š” ๊ฒƒ์„ ๋ณด์˜€๋‹ค. ๋‘๋ฒˆ์งธ์˜ ์—ฐ๊ตฌ์—์„œ๋Š” ๋ชจ๋ฐ”์ผ ๋„คํŠธ์›Œํฌ์—์„œ ๋ฉ€ํ‹ฐ์…€์„ ๊ณ ๋ คํ•˜์—ฌ ์ฝ˜ํ…์ธ ๋ฅผ ๋ฐฐํฌํ•˜๋Š” ํ”„๋ ˆ์ž„์›Œํฌ์— ๋Œ€ํ•œ ์—ฐ๊ตฌ๋ฅผ ์ง„ํ–‰ ํ•˜์˜€๋‹ค. ํ•ด๋‹น ํ”„๋ ˆ์ž„์›Œํฌ์—์„œ ์ฝ˜ํ…์ธ ๋Š” ์…€๋ฃฐ๋Ÿฌ ๋งํฌ์™€ ๋ชจ๋ฐ”์ผ ์‚ฌ์šฉ์ž๊ฐ„ ๋กœ์ปฌ ๋งํฌ๋ฅผ ํ†ตํ•ด ํ‘ธ์‹œ-๊ณต์œ  ๊ธฐ๋ฐ˜์˜ ํ†ต์‹ ์œผ๋กœ ์ „๋‹ฌ ๋˜์˜€๋‹ค. ์ด๋Ÿฌํ•œ ๊ธฐ๋ฒ•์„ ๋ฐ”ํƒ•์œผ๋กœ multi-compartment ๋ชจ๋ธ์„ ์ด์šฉํ•˜์—ฌ ์…€ ๊ฐ„ ํ•ธ๋“œ์˜ค๋ฒ„ ๋ฐ ์ฝ˜ํ…์ธ  ์ „๋‹ฌ์„ ๋ชจ๋ธ๋ง ๋ฐ ๋ถ„์„ํ•˜๊ณ , ์ฝ˜ํ…์ธ  ์ „๋‹ฌ ๋”œ๋ ˆ์ด์™€ ์—๋„ˆ์ง€ ์†Œ๋ชจ ์‚ฌ์ด์˜ trade-off๋ฅผ ์ˆ˜ํ•™์ ์ธ ์ตœ์ ํ™” ๊ธฐ๋ฒ•์„ ์‚ฌ์šฉํ•˜์—ฌ ํ•ด๊ฒฐ ํ•˜์˜€๋‹ค. ๋ณธ ๋…ผ๋ฌธ์—์„œ๋Š” ์ด์™€ ๊ฐ™์ด ๊ธฐ์กด์˜ ์ธก์ • ์—ฐ๊ตฌ์— ๊ธฐ๋ฐ˜ํ•œ trace-driven ๋ถ„์„, ๋ชจ๋ธ๋ง ๋ฐ ์‹œ์Šคํ…œ ์ตœ์ ํ™”์— ๋Œ€ํ•œ ์—ฐ๊ตฌ๋ฅผ ํ†ตํ•ด ๋ชจ๋ฐ”์ผ ์†Œ์…œ ๋„คํŠธ์›Œํฌ์—์„œ ์‚ฌ์šฉ์ž๊ฐ„ ์ง์ ‘ ์ „์†ก์„ ํ†ตํ•œ ์˜คํ”„๋กœ๋”ฉ ๊ธฐ๋ฒ•์ด ๊ณ ํšจ์œจ์ ์ž„์„ ๋ณด์˜€๋‹ค. ๋˜ํ•œ ๋ณธ ๋…ผ๋ฌธ์€ ์ œ์•ˆ๋œ ๊ธฐ๋ฒ•์˜ ์ƒ์šฉํ™” ์ „๋ง ๋ฐ ์ด๋ฅผ ์œ„ํ•œ ์ด์Šˆ๋“ค์— ๋Œ€ํ•œ ๋…ผ์˜๋„ ํฌํ•จ ํ•˜์˜€๋‹ค.The fast increasing traffic demand becomes a serious concern of mobile network operators. To solve this traffic explosion problem, there have been efforts to offload the traffic from cellular links to local short-range communications among mobile users that are moving around and forming mobile social networks. In my thesis, I mainly focus on the user-to-user opportunistic sharing and try to elaborate its effectiveness and efficiency for to offload mobile traffic. In the first work, I propose the Traffic Offloading assisted by Social network services via opportunistic Sharing in mobile social networks, TOSS. In TOSS, initially a subset of mobile users are selected as initial seeds depending on their content spreading impact in online social network services (SNSs) and their mobility patterns in offline mobile social networks (MSNs). Then users share the content via opportunistic local connectivity (e.g., Bluetooth, Wi-Fi Direct) with each other. Due to the distinct access patterns of individual SNS users, TOSS further exploits the user-dependent access delay between the content generation time and each user's access time for the purpose of traffic offloading. I model and analyze process of the traffic offloading and content spreading by taking into account various options in linking SNS and MSN data sets. The trace-driven evaluation shows that TOSS can reduce up to 86.5% of the cellular traffic while satisfying the access delay requirements of all users. In the second work, I focus on the analytical research on Push-Share framework for content disseminating in mobile networks. One content is firstly pushed the to a subset of subscribers via cellular links, and mobile users spread the content via opportunistic local connectivity. I theoretically model and analyze how the content can be disseminated, where handovers are modeled based on the multi-compartment model. I also formulate the mathematical optimization framework, by which the trade-off between the dissemination delay and the energy cost is explored. Based on the measurement study, trace-driven analysis, theoretical modeling and system optimization in above papers, the traffic offloading by user-to-user opportunistic sharing in mobile social networks is proved to be effective and efficient. Additionally, further discussions on the practical deployment, future vision, and open issues are discussed as well.Abstract i I. Introduction 1 II. RelatedWork 7 2.1 Opportunistic Sharing in DTNs/MSNs 7 2.2 Mobile Traffic Offloading 9 2.3 Information/Content Spreading in SNSs 10 III. TOSS 13 3.1 Framework Details 13 3.1.1 Preliminaries 13 3.1.2 Spreading Impact in the Online SNS 16 3.1.3 Access Delays of Users in the SNS 18 3.1.4 Mobility Impact in the Offline MSN 21 3.2 System Optimization 25 3.3 Trace-Driven Measurement 26 3.3.1 Measurement of the Online SNS 26 3.3.2 Measurement of Offline MSNs, ฮปi j and IM 33 3.3.3 Content Obtaining Delays 36 3.3.4 How C Impacts the Obtaining Delay 38 3.4 Performance Evaluation 39 3.4.1 How C Impacts the Total Access Utility 39 3.4.2 Satisfying 100%, 90%, and 80% of Users 44 3.4.3 On-Demand Delivery 47 3.5 Conclusion 48 IV. Push-Share 50 4.1 Framework Details 50 4.2 System Model 53 4.3 Content Dissemination in Single Cell 56 4.3.1 Content Dissemination by Sharing Only 57 4.3.2 Content Dissemination with Initial Push and Final Push 59 4.3.3 Content Dissemination Energy Cost 62 4.4 Content Dissemination in Multiple Cells 63 4.4.1 Non-steady-state Modeling of MSs in Multiple Cells 66 4.4.2 Steady-State Modeling of MSs in Multiple Cells 66 4.4.3 How Handovers Affect the Content Dissemination 67 4.5 Optimization Framework 69 4.5.1 Minimum Dissemination Completion Delay 69 4.5.2 Minimum Dissemination Completion Cost 70 4.5.3 Conjunctive Minimization of Delay and Cost 71 4.6 Evaluation Results 73 4.6.1 Content Dissemination within One Single Cell 74 4.6.2 Content Dissemination within Multiple Cells 77 4.6.3 Optimization Framework 80 4.7 Conclusion 82 V. Summary and Future Work 84 5.1 A Comparison with Traffic Offloading based on Wi-Fi APs 85 5.2 Practical Deployment and Application 86 5.3 Future Work and Vision 88 Bibliography 90Docto

    Joint ERCIM eMobility and MobiSense Workshop

    Get PDF

    Modeling and Measuring Performance of Data Dissemination in Opportunistic Networks

    Get PDF
    In this thesis we focus on understanding, measuring and describing the performance of Opportunistic Networks (ONs) and their applications. An โ€œopportunistic networkโ€ is a term introduced to describe a sparse, wireless, ad hoc network with highly mobile nodes. The opportunistic networking paradigm deviates from the traditional end-to-end connectivity concept: Forwarding is based on intermittent connectivity between mobile nodes (typically, users with wireless devices); complete routes between sources and destinations rarely exist. Due to this unique property of spontaneous link establishment, the challenges that exist in ONs are specific. The unstructured nature of these networks makes it difficult to give any performance guarantees on data dissemination. For this reason, in Part I of this thesis we explore the dynamics that affect the performance of opportunistic networks. We choose a number of meaningful scenarios where our models and algorithms can be validated using large and credible data sets. We show that a drift and jump model that takes a spatial approach succeeds in capturing the impact of infrastructure and mobile-to-mobile exchanges on an opportunistic content update system. We describe the effects of these dynamics by using the age distribution of a dynamic piece of data (i.e., information updates) as the performance measure. The model also succeeds in capturing a strong bias in user mobility and reveals the existence of regions, whose statistics play a critical role in the performance perceived in the network. We exploit these findings to design an application for greedy infrastructure placement, which relies on the model approximation for a large number of nodes. Another great challenge of opportunistic networking lies in the fact that the bandwidth available on wireless links, coupled with ad hoc networking, failed to rival the capacity of backbones and to establish opportunistic networks as an alternative to infrastructure-based networks. For this reason, we never study ONs in an isolated context. Instead, we consider the applications that leverage interconnection between opportunistic networks and legacy networks and we study the benefits this synergy brings to both. Following this approach, we use a large operator-provided data set to show that opportunistic networks (based on Wi-Fi) are capable of offloading a significant amount of traffic from 3G networks. At the same time, the offloading algorithms we propose reduce the amount of energy consumed by mobiles, while requiring Wi-Fi coverage that is several times smaller than in the case of real-time offloading. Again we confirm and reuse the fact that user mobility is biased towards certain regions of the network. In Part II of this thesis, we treat another issue that is essential for the acceptance and evolution of opportunistic networks and their applications. Namely, we address the absence of experimental results that would support the findings of simulation based studies. Although the techniques such as contact-based simulations should intuitively be able to capture the performance of opportunistic applications, this intuition has little evidence in practice. For this reason, we design and deploy an experiment with real users who use an opportunistic Twitter application, in a way that allows them to maintain communication with legacy networks (i.e., cellular networks, the Internet). The experiment gives us a unique insight into certain performance aspects that are typically hidden or misinterpreted when the usual evaluation techniques (such as simulation) are used. We show that, due to the commonly ignored factors (such as the limited transmission bandwidth), contact-based simulations significantly overestimate delivery ratio and obtain delays that are several times lower than those experimentally acquired. In addition to this, our results unanimously show that the common practice of assuming infinite cache sizes in simulation studies, leads to a misinterpretation of the effects of a backbone on an opportunistic network. Such simulations typically overestimate the performance of the opportunistic component, while underestimating the utility of the backbone. Given the discovered deficiencies of the contact-based simulations, we consider an alternative statistical treatment of contact traces that uses the weighted contact graph. We show that this approach offers a better interpretation of the impact of a backbone on an opportunistic network and results in a closer match when it comes to modeling certain aspects of performance (namely, delivery ratio). Finally, the security requirements for the opportunistic applications that involve an interconnection with legacy networks are also highly specific. They cannot be fully addressed by the solutions proposed in the context of autonomous opportunistic (or ad hoc) networks, nor by the security frameworks used for securing the applications with continuous connectivity. Thus, in Part III of this thesis, we put together a security framework that fits the networks and applications that we target (i.e., the opportunistic networks and applications with occasional Internet connectivity). We then focus on the impact of security print on network performance and design a scheme for the protection of optimal relaying capacity in an opportunistic multihop network. We fine-tune the parameters of our scheme by using a game-theoretic approach and we demonstrate the substantial performance gains provided by the scheme

    Automated Hierarchical, Forward-Chaining Temporal Planner for Planetary Robots Exploring Unknown Environments

    Get PDF
    The transition of mobile robots from a controlled environment towards the real-world represents a major leap in terms of complexity coming primarily from three different factors: partial observability, nondeterminism and dynamic events. To cope with them, robots must achieve some intelligence behaviours to be cost and operationally effective. Two particularly interesting examples of highly complex robotic scenarios are Mars rover missions and the Darpa Robotic Challenge (DRC). In spite of the important differences they present in terms of constraints and requirements, they both have adopted certain level of autonomy to overcome some specific problems. For instance, Mars rovers have been endowed with multiple systems to enable autonomous payload operations and consequently increase science return. In the case of DRC, most teams have autonomous footstep planning or arm trajectory calculation. Even though some specific problems can be addressed with dedicated tools, the general problem remains unsolved: to deploy on-board a reliable reasoning system able to operate robots without human intervention even in complex environments. This is precisely the goal of an automated mission planner. The scientific community has provided plenty of planners able to provide very fast solutions for classical problems, typically characterized by the lack of time and resources representation. Moreover, there are also a handful of applied planners with higher levels of expressiveness at the price of lowest performance. However, a fast, expressive and robust planner has never been used in complex robotic missions. These three properties represent the main drivers for the outcomes of the thesis. To bridge the gap between classical and applied planning, a novel formalism named Hierarchical TimeLine Networks (HTLN) combining Timeline and HTN planning has been proposed. HTLN has been implemented on a mission planner named QuijoteExpress, the first forward-chaining timeline planner to the best of our knowledge. The main idea is to benefit from the great performance of forward-chaining search to resolve temporal problems on the state-space. In addition, QuijoteExpress includes search enhancements such as parallel planning by division of the problem in sub-problems or advanced heuristics management. Regarding expressiveness, the planner incorporates HTN techniques that allow to define hierarchical models and solutions. Finally, plan robustness in uncertain scenarios has been addressed by means of sufficient plans that allow to leave parts of valid plans undefined. To test the planner, a novel lightweight, timeline and ROS-based executive named SanchoExpress has been designed to translate the plans into actions understandable by the different robot subsystems. The entire approach has been tested in two realistic and complementary domains. A cooperative multirover Mars mission and an urban search and rescue mission. The results were extremely positive and opens new promising ways in the field of automated planning applied to robotics
    corecore