21 research outputs found

    Tactful Networking: Humans in the Communication Loop

    Get PDF
    International audienceThis survey discusses the human-perspective into networking through the Tactful Networking paradigm, whose goal is to add perceptive senses to the network by assigning it with human-like capabilities of observation, interpretation, and reaction to daily-life features and associated entities. To achieve this, knowledge extracted from inherent human behavior in terms of routines, personality, interactions, and others is leveraged, empowering the learning and prediction of user needs to improve QoE and system performance while respecting privacy and fostering new applications and services. Tactful Networking groups solutions from literature and innovative interdisciplinary human aspects studied in other areas. The paradigm is motivated by mobile devices' pervasiveness and increasing presence as a sensor in our daily social activities. With the human element in the foreground, it is essential: (i) to center big data analytics around individuals; (ii) to create suitable incentive mechanisms for user participation; (iii) to design and evaluate both humanaware and system-aware networking solutions; and (iv) to apply prior and innovative techniques to deal with human-behavior sensing and learning. This survey reviews the human aspect in networking solutions through over a decade, followed by discussing the tactful networking impact through literature in behavior analysis and representative examples. This paper also discusses a framework comprising data management, analytics, and privacy for enhancing human raw-data to assist Tactful Networking solutions. Finally, challenges and opportunities for future research are presented

    Scaling Up Delay Tolerant Networking

    Get PDF
    Delay Tolerant Networks (DTN) introduce a networking paradigm based on store, carry and forward. This makes DTN ideal for situations where nodes experience intermittent connectivity due to movement, less than ideal infrastructure, sparse networks or other challenging environmental conditions. Standardization efforts focused around the Bundle Protoocol (BP) (RFC 5050) aim to provide a generic set of protocols and technologies to build DTNs. However, there are several challenges when trying to apply the BP to the Internet as a whole that are tackled in this thesis: There is no DTN routing mechanism that can work in Internet-scale networks. Similarly, available discovery mechanisms for opportunistic contacts do not scale to the Internet. This work presents a solution offering pull-based name resolution that is able to represent the flat unstructured BP namespace in a distributed data structure and leaves routing through the Internet to the underlying IP layer. A second challenge is the large amount of data stored by DTN nodes in large-scale applications. Reconciling two large sets of data during an opportunistic contact without any previous state in a space efficient manner is a non-trivial problem. This thesis will present a very robust solution that is almost as efficient as Bloom filters while being able to avoid false positives that would prevent full reconciliation of the sets. Lastly, when designing networks that are based on agents willing to carry information, incentives are an important factor. This thesis proposes a financially sustainable system to incentive users to participate in a DTN with their private smartphones. A user study is conducted to get a lead on the main motivational factors that let people participate in a DTN. The study gives some insight under what conditions relying on continuous motivation and cooperation from private users is a reasonable assumption when designing a DTN.Delay Tolerant Networks (DTN) sind ein Konzept für Netzwerke, das auf der Idee beruht, Datenpakete bei Bedarf längere Zeit zu speichern und vor der Weiterleitung an einen anderen Knoten physikalisch zu transportieren. Diese Vorgehensweise erlaubt den Einsatz von DTN in Netzen, die häufige Unterbrechungen aufweisen. Mit dem Bundle Protocol (BP) (RFC 5050) wird ein Satz von Standardprotokollen für DTNs entwickelt. Wenn man das BP im Internet einsetzen möchte ergeben sich einige Herausforderungen: Es existiert kein DTN Routingverfahren, das skalierbar genug ist um im Internet eingesetzt zu werden. Das Gleiche trifft auf verfügbare Discovery Mechanismen für opportunistische Netze zu. In dieser Arbeit wird ein verteilter, reaktiver Mechanismus zur Namensauflösung im DTN vorgestellt, der den flachen, unstrukturierten Namensraum des BP abbilden kann und es ermöglicht das Routing komplett der IP Schicht zu überlassen. Eine weitere Herausforderung ist die große Menge an Nachrichten, die Knoten puffern müssen. Die effiziente Synchronisierung von zwei Datensets während eines opportunistischen Kontaktes, ohne Zustandsinformationen, ist ein komplexes Problem. Diese Arbeit schlägt einen robusten Algorithmus vor, der die Effizienz eines Bloom Filters hat, dabei jedoch die False Positives vermeidet, die normalerweise eine komplette Synchronisation verhindern würden. Ein DTN basiert darauf, dass Teilnehmer Daten puffern und transportieren. Wenn diese Teilnehmer z.B. private User mit Smarpthones sind, ist es essentiell diese Benutzer zu einer dauerhaften Teilnahme am Netzwerk zu motivieren. In dieser Arbeit wird ein finanziell tragfähiges System entwickelt, welches Benutzer für eine Teilnahme am DTN belohnt. Eine Benutzerstudie wurde durchgeführt, um herauszufinden, welche Faktoren Benutzer motivieren und unter welchen Umständen davon auszugehen ist, dass Benutzer wenn man das BP im Internet einsetzen möchte dauerhaft in einem DTN kooperieren und Resourcen zur Verfügung stellen

    Energy-efficient Transitional Near-* Computing

    Get PDF
    Studies have shown that communication networks, devices accessing the Internet, and data centers account for 4.6% of the worldwide electricity consumption. Although data centers, core network equipment, and mobile devices are getting more energy-efficient, the amount of data that is being processed, transferred, and stored is vastly increasing. Recent computer paradigms, such as fog and edge computing, try to improve this situation by processing data near the user, the network, the devices, and the data itself. In this thesis, these trends are summarized under the new term near-* or near-everything computing. Furthermore, a novel paradigm designed to increase the energy efficiency of near-* computing is proposed: transitional computing. It transfers multi-mechanism transitions, a recently developed paradigm for a highly adaptable future Internet, from the field of communication systems to computing systems. Moreover, three types of novel transitions are introduced to achieve gains in energy efficiency in near-* environments, spanning from private Infrastructure-as-a-Service (IaaS) clouds, Software-defined Wireless Networks (SDWNs) at the edge of the network, Disruption-Tolerant Information-Centric Networks (DTN-ICNs) involving mobile devices, sensors, edge devices as well as programmable components on a mobile System-on-a-Chip (SoC). Finally, the novel idea of transitional near-* computing for emergency response applications is presented to assist rescuers and affected persons during an emergency event or a disaster, although connections to cloud services and social networks might be disturbed by network outages, and network bandwidth and battery power of mobile devices might be limited

    Micro-scale monitoring in an urban area using vehicular sensor network

    No full text
    One of the emerging problems facing populated urban areas represents high level of the air pollution. Current monitoring approaches assume processing of pollution data in a centralised manner, however due to external factors (e.g. current atmospheric conditions) the air pollution level can have fast fluctuations inside a street which might lead to disparity of the pollution levels in neighbouring streets. This thesis proposes a decentralised monitoring framework that enables harvesting of the pollution data, its processing, and dissemination of early warnings to the Static Monitoring Units (SMU) when the onsets of hazardous air pollution concentration are detected at the street (micro-scale) level. The proposed air pollution monitoring framework relies on a Vehicular Sensor Network infrastructure where vehicles have limited on-board resources, such as processing, battery power and storage. Three aspects of the micro-scale air pollution monitoring have been investigated. The Decentralised data Dissemination and Harvesting (DDH) is a single-hop dissemination mechanism which enables the nodes to decide whether they should harvest the data based on their current position and movement direction. This mechanism identifies the streets that nodes need to monitor by comparing the amount of stored pollution data with the one harvested from other nodes in the network. The Decentralised Data Fusion (DDF) algorithm is developed to fuse the delayed pollution data that arrives from other nodes in the network. The algorithm uses the Delayed State Information Filter to refine sensor measurements and applies an interpolation technique to interpolate the missing data in the time gaps which occur as a consequence of receiving delayed data. The proposed algorithm augments the pollution data history at the slight cost of data accuracy. The Decentralised Dissemination of Warnings (DDW) is a beaconless, multihop dissemination mechanism designed to relay early warnings to the SMUs. Mobile nodes calculate the time interval (waiting time) that they need to wait before they rebroadcast the warning message. The waiting time is calculated by taking into account the distance between sending and receiving nodes, and nodes’ distances to the SMUs. The DDW mechanism ensures that high number of non-duplicated warnings is received at the collection points (SMUs). The proposed framework enables efficient utilisation of node’s on-board resources in terms of transmitting and processing activity, and data storage. It reduces the number of mobile nodes required for monitoring purposes without losing the volume of the relevant collected pollution data. Using uncontrolled mobile nodes and their mobility, the framework enables reporting the hazardous pollution levels in near real-time.Open Acces

    Privacy-preserving controls for sharing mHealth data

    Get PDF
    Mobile devices allow people to collect and share health and health-related information with recipients such as health providers, family and friends, employers and insurance companies, to obtain health, emotional or financial benefits. People may consider certain health information sensitive and prefer to disclose only what is necessary. In this dissertation, we present our findings about factors that affect people’s sharing behavior, describe scenarios in which people may wish to collect and share their personal health-related information with others, but may be hesitant to disclose the information if necessary controls are not available to protect their privacy, and propose frameworks to provide the desired privacy controls. We introduce the concept of close encounters that allow users to share data with other people who may have been in spatio-temporal proximity. We developed two smartphone-based systems that leverage stationary sensors and beacons to determine whether users are in spatio-temporal proximity. The first system, ENACT, allows patients diagnosed with a contagious airborne disease to alert others retrospectively about their possible exposure to airborne virus. The second system, SPICE, allows users to collect sensor information, retrospectively, from others with whom they shared a close encounter. We present design and implementation of the two systems, analyse their security and privacy guarantees, and evaluate the systems on various performance metrics. Finally, we evaluate how Bluetooth beacons and Wi-Fi access points can be used in support of these systems for close encounters, and present our experiences and findings from a deployment study on Dartmouth campus

    Unterbrechungstolerante Fahrzeugkommunikation im öffentlichen Personennahverkehr

    Get PDF
    Communication systems play an important role in the efficient operation of public transport networks. Recently, traditional voice-centric real-time communication is complemented and often replaced by data-centric asynchronous machine-to-machine communication. Disruption tolerant networking in combination with license-exempt high bandwidth technologies have the potential to reduce infrastructure investments and operating costs for such applications, because a continuous end-to-end connectivity is no longer required. In this thesis the feasibility of such a system is investigated and confirmed. First, realistic use-cases are introduced and the requirements to the communication system are analyzed. Then the channel characteristics of several WLAN-based technologies are experimentally evaluated in real public transport scenarios. Since the results are promising, the next step is gaining a deeper understanding of the special mobility properties in public transport networks. Therefore, we analyze existing traces as well as our own newly acquired trace. Our trace features additional operator meta-data that is not available for existing traces, and we report on unexpected properties that have not been quantified before. Then the trace is combined with the experimentally obtained channel parameters in order to analyze the characteristics of inter-vehicle contacts. We present the statistical distribution of situation-specific contact events and the impact of radio range on contact capacity. Then results of all steps above are used to propose a routing scheme that is optimized for public transport networks. In the final simulation-based evaluation we show that this router outperforms previously proposed algorithms.Kommunikationssysteme leisten einen wichtigen Beitrag zum effizienten Betrieb des öffentlichen Personennahverkehrs. Seit einigen Jahren wird dabei der Sprechfunk zunehmend durch asynchronen M2M-Datenfunk ergänzt und in vielen Anwendungsgebieten sogar vollständig ersetzt. Die Kombination aus unterbrechungstoleranten Netzwerken und lizenzfreien Drahtlostechnologien birgt ein erhebliches Potential zur Reduzierung von Infrastrukturinvestitionen und Betriebskosten, da für diese Anwendungen eine dauerhafte Ende-zu-Ende Verbindung nicht mehr erforderlich ist. In dieser Arbeit wird die Machbarkeit eines solchen Systems untersucht und belegt. Zunächst werden dazu Anwendungsfälle vorgestellt und deren Anforderungen an das Kommunikationssystem analysiert. Dann werden die Kanalcharakteristika mehrerer WLAN-Technologien im realen ÖPNV-Umfeld experimentell ermittelt und bewertet. Auf Grundlage der erfolgversprechenden Ergebnisse werden im nächsten Schritt die besonderen Mobilitätseigenschaften von ÖPNV-Netzen untersucht. Zu diesen Zweck analysieren wir existierende und eigene, neu aufgezeichnete Bewegungsdaten von ÖPNV-Fahrzeugen. Unsere Daten enthalten dabei zusätzliche Metadaten der Verkehrsbetriebe, die zuvor nicht verfügbar waren, so dass wir unerwartete Effekte beschreiben und erstmals quantifizieren können. Anschließend werden die Bewegungsdaten mit den zuvor experimentell erfassten Kanaleigenschaften kombiniert, um so die Kommunikationskontakte zwischen den Fahrzeugen genauer zu betrachten. Wir stellen die statistische Verteilung der situationsabhängigen Kontaktereignisse vor, sowie den Einfluss der Funkreichweite auf die Kontaktkapazität. Dann werden die Ergebnisse aller vorhergehenden Schritte verwendet, um ein neues, optimiertes Routingverfahren für ÖPNV-Netze vorzuschlagen. In der simulationsbasierten Evaluation belegen wir, dass dieser Router die Leistung bisher bekannter Verfahren übertrifft

    Towards a unified modelling framework for adaptive networks.

    Get PDF
    Philosophiae Doctor - PhDAdaptive networks are complex networks with nontrivial topological features and connection patterns between their elements which are neither purely regular nor purely random. Their applications are in sociology, biology, physics, genetics, epidemiology, chemistry, ecology, materials science, the traditional Internet and the emerging Internet of-Things. For example, their applications in sociology include social networks such as Facebook which have recently raised the interest of the research community. These networks may hide patterns which, when revealed, can be of great interest in many practical applications. While the current adaptive network models remain mostly theoretical and conceptual, however, there is currently no unified modelling framework for implementing the development, comparison, communication and validation of agent-based adaptive network models through using proper empirical data and computation models from different research fields. In this thesis, a unified framework has been developed that combines agent- based adaptive network models and adaptive control structures. In this framework, the control parameters of adaptive network models are included as a part of the state- topology coevolution and are automatically adjusted according to the observations obtained from the system being studied. This allows the automatic generation of enhanced adaptive networks by systematically adjusting both the network topology and the control parameters at the same time to accurately reflect the real-world complex system. We develop three different applications within the general framework for agent- based adaptive network modelling and simulation of real-world complex systems in different research fields. First, a unified framework which combines adaptive net- work models and adaptive control structures is proposed for modelling and simulation of fractured-rock aquifer systems. Moreover, we use this unified modelling framework to develop an automatic modelling tool, Fracture3D, for automatically building enhanced fracture adaptive network models of fractured-rock aquifer systems, in which the fracture statistics and the structural properties can both follow the observed statistics from natural fracture networks. We show that the coupling between the fracture adaptive network models and the adaptive control structures with iterative parameter identification can drive the network topology towards a desired state by dynamically updating the geometrical states of fractures with a proper adaptive control structure. Second, we develop a unified framework which combines adaptive network models and multiple model adaptive control structures for modelling and simulation of social network systems. By using such a unified modelling framework, an automatic modelling tool, SMRI, is developed for automatically building the enhanced social adaptive network models through using mobile-phone-centric multimodal data with suitable computational models of behavioural state update and social interaction update. We show that the coupling between the social adaptive network models and the multiple model adaptive control structures can drive the community structure of a social adaptive network models towards a desired state through using the suitable computational models of behavioural state update and social interaction update predetermined by the multiple model adaptive control structure. Third, we develop a unified framework which combines adaptive network models and support vector machine based adaptive control structures for modelling and simulation of multicast congestion in mobile ad hoc network systems. Moreover, a multicast congestion detection scheme, WMCD, has been developed for the unified modelling framework, in which the incipient congestions of group members can be predicted by using support vector machine-based prediction models and current traffic states. We show that the network’s throughput capacity is efficiently improved through using the unified modelling framework, which dynamically adjusting the group structures according to the updated congestion states of group members generated by the WMCD scheme in order to relieve the high load

    Area-wide Integrated Pest Management

    Get PDF
    Extensive reliance on insecticides reduces biodiversity, contributes to pollinator decline, destroys habitat and threatens endangered species. This book offers a more effective application of the Integrated Pest Management (IPM) approach, on an area-wide (AW) or population-wide (AW-IPM) basis. It addresses the importance of problem-solving research, planning and baseline data collection, integrating tools for appropriate control strategies, and pilot trials. The 48 chapters authored by 184 experts cover advances in genetics, molecular biology, biological control, resistance management, modelling, automated surveillance and unmanned aerial release systems

    Area-wide Integrated Pest Management

    Get PDF
    Over 98% of sprayed insecticides and 95% of herbicides reach a destination other than their target species, including non-target species, air, water and soil. The extensive reliance on insecticide use reduces biodiversity, contributes to pollinator decline, destroys habitat, and threatens endangered species. This book offers a more effective application of the Integrated Pest Management (IPM) approach, on an area-wide (AW) or population-wide (AW-IPM) basis, which aims at the management of the total population of a pest, involving a coordinated effort over often larger areas. For major livestock pests, vectors of human diseases and pests of high-value crops with low pest tolerance, there are compelling economic reasons for participating in AW-IPM. This new textbook attempts to address various fundamental components of AW-IPM, e.g. the importance of relevant problem-solving research, the need for planning and essential baseline data collection, the significance of integrating adequate tools for appropriate control strategies, and the value of pilot trials, etc. With chapters authored by 184 experts from more than 31 countries, the book includes many technical advances in the areas of genetics, molecular biology, microbiology, resistance management, and social sciences that facilitate the planning and implementing of area-wide strategies. The book is essential reading for the academic and applied research community as well as national and regional government plant and human/animal health authorities with responsibility for protecting plant and human/animal health

    Reading As A Disclosure Of The Thoughts Of The Heart: Proto-Halakhic Reuse And Appropriation Between Torah And The Prophets

    Get PDF
    How should we then live? This has been the guiding question throughout the study. In a world that offers a myriad of answers to this one question, I have sought the answer in the Bible, more specifically in the Hebrew part of the Bible. Instead of asking the straightforward question as to how the Bible can function as norm for contemporary ethics, the following discussion is based on the assumption that an authentic reading and appropriation of the text needs both to understand and to emulate the ways in which the biblical authors read the Bible. While scholars have examined separately biblical law, reuse within the Bible, and the memorization of revered texts in the ANE, I have tried to combine these three areas in an attempt to clarify how biblical authors read normative texts. This study is divided into three parts: in the first part, I argue that Torah is best characterized as normative covenantal instruction, and that Torah and the Latter Prophets (hereafter Prophets) participated in a scribal culture that did not conform to our standards of literary exactness. In the second part, I have selected four cases where we find parallels between Torah and the Prophets: (1) Divorce and Remarriage in Deut 24:1–4 and Jer 3:1–10, (2) Sabbath Instructions in Exod 20:8–11; Deut 5:12–15 and Jer 17:19– 27, (3) Manumission Instructions in Exod 21:2–11; Lev 25:10, 39–46; Deut 15:12–18; and Jer 34:8–22, and (4) Fasting in Lev 16; 23; 25 and Isa 58:1–14. Finally, I discuss Jer 7 and Ezek 18 as these cases display a different type of reuse than the preceding four. I have limited myself to cases where reuse and direction of dependence can be demonstrated with reasonable confidence, in order to give an adequate basis for a discussion of how normative texts were appropriated in each of the specific cases. In the third part, I include a hermeneutical and philosophical reflection on reading as a disclosure of the thoughts of the heart. Repetition with variation is typical in texts that reuse a normative text. Neither conflict nor harmony can adequately explain this phenomena. In the borrowing text, we rather see a close reading that reads its source(s) expansionistically. There is an interpretative response interwoven with the reading along with various trajectories the borrowing author would have viewed as indicated in the very source(s) themselves. We find a challenge both to a literalistic reading that confines meaning to the plain sense of the text on the one hand, and to a more free or creative reading not fully responsible to the text on the other. The cases studied attest to the importance of an immersion into the normative texts in order to clarify how we should live; these cases also demonstrate the need for finding new life through texts and forms of life that creatively reuse the biblical text while all the while staying rooted in the ancient words
    corecore