20 research outputs found

    Bootstrapping opportunistic networks using social roles

    Get PDF
    Opportunistic routing protocols can enable message delivery in disconnected networks of mobile devices. To conserve energy in mobile environments, such routing protocols must minimise unnecessary message-forwarding. This paper presents an opportunistic routing protocol that leverages social role information. We compute node roles from a social network graph to identify nodes with similar contact relationships, and use these roles to determine routing decisions. By using pre-existing social network information, such as online social network friends, to determine roles, we show that our protocol can bootstrap a new opportunistic network without the delay incurred by encounter-history-based routing protocols such as SimbetTS. Simulations with four real-world datasets show improved performance over SimbetTS, with performance approaching Epidemic routing in some scenarios.Postprin

    Towards Adaptable and Adaptive Policy-Free Middleware

    Get PDF
    We believe that to fully support adaptive distributed applications, middleware must itself be adaptable, adaptive and policy-free. In this paper we present a new language-independent adaptable and adaptive policy framework suitable for integration in a wide variety of middleware systems. This framework facilitates the construction of adaptive distributed applications. The framework addresses adaptability through its ability to represent a wide range of specific middleware policies. Adaptiveness is supported by a rich contextual model, through which an application programmer may control precisely how policies should be selected for any particular interaction with the middleware. A contextual pattern mechanism facilitates the succinct expression of both coarse- and fine-grain policy contexts. Policies may be specified and altered dynamically, and may themselves take account of dynamic conditions. The framework contains no hard-wired policies; instead, all policies can be configured.Comment: Submitted to Dependable and Adaptive Distributed Systems Track, ACM SAC 200

    Opportunistic data collection through delegation

    Get PDF
    We consider a collection system where collectors move around gathering information generated by data producers. In such a system, data may remain uncollected when the number of collectors is insufficient to cover the whole population of producers. Motivated by the observation that node encounters are sufficient to build a connected relationship graph, we propose to take advantage of the inherent interactions among nodes and transform some producers into delegates. With such an approach, collectors only need to meet delegates that, in turn, are responsible for gathering data from a subset of standard producers. We achieve this goal through two contributions. First, we investigate several delegation strategies based on the relative importance of nodes in their social interactions (i.e., the node centrality). Second, by considering a prediction strategy that estimates the likelihood of two nodes meeting each other, we investigate how the delegation strategies perform on predicted traces. We evaluate the delegation strategies both in terms of coverage and size of the delegation existing real mobility data sets. We observe that delegation strategies that rely on localized information perform as well as the ones that consider a complete view of the topology.Nous considĂ©rons un systĂšme de collecte oĂč les collectionneurs se dĂ©placent et collectent les informations gĂ©nĂ©rĂ©es par les producteurs de donnĂ©es. Dans un tel systĂšme, les donnĂ©es peuvent ne pas ĂȘtre collectĂ©es lorsque le nombre de collectionneurs est insuffisant pour couvrir l'ensemble de la population des producteurs. MotivĂ© par le fait que les rencontres de nƓuds sont suffisants pour construire un graphe connectĂ©, nous proposons de profiter des interactions inhĂ©rentes entre les nƓuds et transformer certains producteurs en dĂ©lĂ©guĂ©s. Avec une telle approche, les collectionneurs ont seulement besoin de rencontrer les dĂ©lĂ©guĂ©s que, Ă  leur tour, sont responsables de la collecte de donnĂ©es d'un sous-ensemble des producteurs. Nous atteignons cet objectif grĂące Ă  deux contributions. Tout d'abord, nous Ă©tudions plusieurs stratĂ©gies de dĂ©lĂ©gation basĂ©e sur l'importance relative des nƓuds dans leurs interactions sociales (par exemple, la centralitĂ© du nƓud). DeuxiĂšmement, en considĂ©rant une stratĂ©gie de prĂ©diction qui donne les estimations de la probabilitĂ© d'une rencontre de deux nƓuds, nous Ă©tudions les stratĂ©gies de dĂ©lĂ©gation avec les traces prĂ©dit. Nous Ă©valuons les stratĂ©gies de dĂ©lĂ©gation Ă  la fois en termes de couverture et de la taille du groupe de dĂ©lĂ©gation en utilisant des traces de mobilitĂ© rĂ©elles. Nous n'observons que les stratĂ©gies de dĂ©lĂ©gation qui se basent sur des informations localisĂ©es fournis aussi des bons rĂ©sultats comparĂ©s aux rĂ©sultats considĂ©rant une vue complĂšte de la topologie

    Bootstrapping opportunistic networks using social roles

    Get PDF
    Opportunistic routing protocols can enable message delivery in disconnected networks of mobile devices. To conserve energy in mobile environments, such routing protocols must minimise unnecessary message-forwarding. This paper presents an opportunistic routing protocol that leverages social role information. We compute node roles from a social network graph to identify nodes with similar contact relationships, and use these roles to determine routing decisions. By using pre-existing social network information, such as online social network friends, to determine roles, we show that our protocol can bootstrap a new opportunistic network without the delay incurred by encounter-history-based routing protocols such as SimbetTS. Simulations with four real-world datasets show improved performance over SimbetTS, with performance approaching Epidemic routing in some scenarios.Postprin

    Using self-reported social networks to improve opportunistic networking

    Get PDF
    Opportunistic networks provide an ad hoc communication medium without the need for an infrastructure network, by leveraging human encounters and mobile devices. Routing protocols in opportunistic networks frequently rely upon encounter histories to build up meaningful data to use for informed routing decisions. This thesis shows that it is possible to use pre-existing social-network information to improve existing opportunistic routing protocols, and that these self-reported social networks have a particular benefit when used to bootstrap an opportunistic routing protocol. Frequently, opportunistic routing protocols require users to relay messages on behalf of one another: an act that incurs a cost to the relaying node. Nodes may wish to avoid this forwarding cost by not relaying messages. Opportunistic networks need to incentivise participation and discourage the selfish behaviour. This thesis further presents an incentive mechanism that uses self-reported social networks to construct and maintain reputation and trust relationships between participants, and demonstrates its superior performance over existing incentive mechanisms

    Incentive-aware opportunistic network routing

    No full text
    corecore