1 / 84

Trace-driven Context-aware Mobile Networks Towards Mobile Social Networks

Dive into the future of mobile networks with context-aware protocols for optimal performance. Learn about user behavior patterns and mobility modeling. Utilize trace-driven analysis to enhance network design.

cmyer
Download Presentation

Trace-driven Context-aware Mobile Networks Towards Mobile Social Networks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Trace-driven Context-aware Mobile NetworksTowards Mobile Social Networks Ahmed Helmy Computer and Information Science and Engineering (CISE) Dept Mobile Networking Lab (NOMADS group) University of Florida helmy@ufl.edu http://nile.cise.ufl.edu/MobiLib

  2. Methodology & Tools Architecture & Protocol Design Test Synthesis (STRESS) Network Simulator (NS-2) Protocol Independent Multicast (PIM) Robust Geographic Wireless Services (Geo-Routing,Geocast, Rendezvous) Protocol Block Analysis (BRICS) Query Resolution in Wireless Networks (ACQUIRE & Contacts) Gradient Routing (RUGGED) Multicast-based Mobility (M&M) Mobility Modeling (IMPORTANT, TVC) Worms, Traceback in Mobile Networks Mobility-Assisted Protocols (MAID) Behavioral Analysis in Wireless Networks (IMPACT & MobiLib) Socially-Aware Networks Birds-Eye View: Mobile & Networking Lab

  3. Introduction & Problem Scope • Future network devices are mobile & ‘personal’ • Very tight coupling between devices & humans • Network performance significantly affected by (and affects) users behavior: • Movement, grouping, on-line activity, trust, cooperation… • How do users behave in mobile societies? • What kinds of protocols/networks survive & perform well in highly mobile societies?

  4. Paradigm Shift in Protocol Design Used to: • May end up with suboptimal performance or failures due to lack of context in the design Propose to:

  5. Problem Statement • How to gain insight into deployment context? • How to utilize insight to design future services? Approach • Extensive trace-based analysis to identify dominant trends & characteristics • Analyze user behavioral patterns • Individual user behavior and mobility • Collective user behavior: grouping, encounters • Integrate findings in modeling and protocol design • I. User mobility modeling – II. Behavioral grouping • III. Information dissemination in mobile societies, profile-cast

  6. Analyze Represent Trace Characterize (Cluster) The TRACE framework MobiLib Employ (Modeling & Protocol Design)

  7. Trace Vision:Community-wide Wireless/Mobility Library • Library of • Measurements from Universities, vehicular networks • Realistic models of behavior (mobility, traffic, friendship, encounters) • Benchmarks for simulation and evaluation • Tools for trace data mining • Use insights to design future context-aware protocols? • http://nile.cise.ufl.edu/MobiLib

  8. Trace Libraries of Wireless Traces • Multi-campus (community-wide) traces: • MobiLib (USC (04-06), now @ UFL) • nile.cise.ufl.edu/MobiLib • 15+ Traces from: USC, Dartmouth, MIT, UCSD, UCSB, UNC, UMass, GATech, Cambridge, UFL, … • Tools for mobility modeling (IMPORTANT, TVC), data mining • CRAWDAD (Dartmouth) • Types of traces: • University Campus (mainly WLANs) • Conference AP and encounter traces • Municipal (off-campus) wireless • Bus & vehicular wireless networks • Others … (on going)

  9. Trace Wireless Networks and Mobility Measurements • In our case studies we use WLAN traces • From University campuses & corporate networks (4 universities, 1 corporate network) • The largest data sets about wireless network users available to date (# users / lengths) • No bias: not “special-purpose”, data from all users in the network • We also analyze • Vehicular movement trace (Cab-spotting) • Human encounter trace (at Infocom Conf)

  10. Case study I – Individual mobility

  11. Case Study I: Goal • To understand the mobility/usage pattern of individual wireless network users • To observe how environments/user type/trace-collection techniques impact the observations • To propose a realistic mobility model based on empirical observations • That is mathematically tractable • That is capable of characterizing multiple classes of mobility scenarios

  12. IMPACT: Investigation of Mobile-user Patterns Across University Campuses using WLAN Trace Analysis* - 4 major campuses – 30 day traces studied from 2+ years of traces - Total users > 12,000 users - Total Access Points > 1,300 • Understand changes of user association behavior w.r.t. • Time - Environment - Device type - Trace collection method * W. Hsu, A. Helmy, “IMPACT: Investigation of Mobile-user Patterns Across University Campuses using WLAN Trace Analysis”, two papers at IEEE Wireless Networks Measurements (WiNMee), April 2006

  13. Represent Metrics for Individual Mobility Analysis • What kind of spatial preference do users exhibit? • The percentile of time spent at the most frequently visited locations • What kind of temporal repetition do users exhibit? • The probability of re-appearance • How often are the nodes present? • Percentage of “online” time

  14. Observations: Visited Access Points (APs) Fraction of online time associated with the AP Prob.(coverage > x) CCDF of coverage of users [percentage of visited APs] Average fraction of time a MN associates with APs • Individual users access only a very small portion of APs in the network. • On average a user spends more than 95% of time at its top 5 most visited APs. • Long-term mobility is highly skewed in terms of time associated with each AP. • Users exhibit “on”/”off” behavior that needs to be modeled.

  15. Repetitive Behavior • Clear repetitive patterns of association in wireless network users. • Typically, user association patterns show the strongest repetitive pattern at time gap of one day/one week.

  16. Skewed location preference Characterize On/off activity pattern Periodic re-appearance Prob.(online time fraction > x) Mobility Characteristics from WLANs • Simple existing modelsare very differentfrom the characteristicsin WLAN

  17. Mobility Models • Mobility models are of crucial importance for the evaluation of wireless mobile networks [IMP03] • Requirements for mobility models • Realism (detailed behavior from traces) • Parameterized, tunable behavior • Mathematical tractability • Related work on mobility modeling • Random models (Random walk/waypoint): inadequate for human mobility • Improved synthetic models (pathway model, RPGM, WWP, FWY, MH) – more realistic, difficult to analyze • Trace-based model (T/T++): trace-specific, not general

  18. 75% 25% Employ Time-variant Community (TVC) Model(W. Hsu, Thyro, K. Psounis, A. Helmy, “Modeling Time-variant User Mobility in Wireless Mobile Networks”, IEEE INFOCOM, 2007, Trans. on Networking) • Skewed location visiting preference • Create “communities” to be the preferred area of movement • Each node can have its own community • Node moves with two different epoch types – Local or roaming • Each epoch is a random-direction,straight-line movement • Local epochs in the community • Roaming epochs around the whole simulation area

  19. Employ Tiered Time-variant Community (TVC) Model • Periodical re-appearance • Create structure in time – Periods • Node moves with different parameters in periods to capture time-dependent mobility • Repetitive structure • Finer granularity in space & time • Multi-tier communities • Multiple time periods

  20. Using the TVC Model – Reproducing Mobility Characteristics • (STEP1) Identify the popular locations; assign communities • (STEP2) Assignparameters to the communities according to stats • (STEP3) Add user on-off patterns (e.g., in WLAN, users are usually off when moving)

  21. Using the TVC Model – Reproducing Mobility Characteristics • WLAN trace (example: MIT trace) Skewed location visiting preference Periodic re-appearance * Model-simplified: single community per node. Model-complex: multiple communities ** Similar matches achieved for USC and Dartmouth traces

  22. Using the TVC Model – Reproducing Mobility Characteristics • Vehicular trace (Cab-spotting)

  23. Using the TVC Model – Reproducing Mobility Characteristics • Human encounter trace at a conference Inter-meeting time A encounters B Encounter duration time Encounter duration Inter-meeting time

  24. Case study II – Groups in WLAN

  25. Case Study II: Goal • Identify similar users (in terms of long run mobility preferences) from the diverse WLAN user population • Understand the constituents of the population • Identify potential groups for group-aware service • In this case study we classify users based on their mobility trends (or location-visiting preferences) • We consider semester-long USC trace (spring 2006, 94days) and quarter-long Dartmouth trace (spring 2004, 61 days)

  26. Association vector: (library, office, class) =(0.2, 0.4, 0.4) Represent Representation of User Association Patterns • We choose to represent summary of user association in each day by a single vector • a = {aj : fraction of online time user i spends at APj on day d} • Summarize the long-run mobility in an “association matrix” • Office, 10AM -12PM • Library, 3PM – 4PM-Class, 6PM – 8PM

  27. Eigen-behavior • Eigen-behaviors: The vectors that describe the maximum remaining power in the association matrix (obtained through Singular Value Decompostion)with quantifiable importance • Eigen-behavior Distance calculates similarity of users by weighted inner products of eigen-behaviors. • Assoc. patterns can be re-constructed with low rank & error • Benefits: Reduced computation and noise

  28. Similarity-based User Classification • With the distance between users U and V defined as 1-Sim(U,V), we use hierarchical clustering to find similar user groups. USC Dartmouth *AMVD = Average Minimum Vector Distance

  29. Validation of User Groups • Significance of the groups – users in the same group are indeed much more similar to each other than randomly formed groups (0.93 v.s. 0.46 for USC, 0.91 v.s. 0.42 for Dartmouth) • Uniqueness of the groups – the most important group eigen-behavior is important for its own group but not other groups

  30. User Groups in WLAN - Observations • Identified hundreds of distinct groups of similar users • Skewed group size distribution – the largest 10 groups account for more than 30% of population on campus. Power-law distributed group sizes. • Most groups can be described by a list of locations with a clear ordering of importance • We also observe groups visiting multiple locations with similar importance – taking the most important location for each user is not sufficient

  31. Case study III – Encounter Patterns

  32. Case Study III: Goal • Understand inter-node encounter patterns from a global perspective • How do we represent encounter patterns? • How do the encounter patterns influence network connectivity and communication protocols? • Encounter definition: • In WLAN: When two mobile nodes access the same AP at the same timethey have an‘encounter’ • In DTN: When two mobile nodes move within communication range they have an‘encounter’

  33. Observations: Encounters Prob. (unique encounter fraction > x) Prob. (total encounter events > x) CCDF of unique encounter count CCDF of total encounter count • In all the traces, the MNs encounter a small fraction of the user population. • A user encounters 1.8%-6% on averageof the user population (except UCSD) • The number of total encounters for the users follows a BiPareto distribution.

  34. Group of good friends… Cliques with random links to join them Represent Encounter-Relationship (ER) graph • Draw a link to connect a pair of nodes if they ever encounter with each other … Analyze the graph properties?

  35. Small World Small Worlds of Encounters • Encounter graph: nodes as vertices and edges link all vertices that encounter Regular graph Clustering Coefficient (CC) Normalized CC and PL Av. Path Length Random graph • The encounter graph is a Small World graph (high CC, low PL) • Even for short time period (1 day) its metrics (CC, PL) almost saturate

  36. B A C Background: Delay Tolerant Networks (DTN) • DTNs are mobile networks with sparse, intermittent nodal connectivity • Encounter events provide the communication opportunities among nodes • Messages are stored and moved across the network with nodal mobility

  37. Trace duration = 15 days (Fig: USC) Unreachable ratio Information Diffusion in DTNs via Encounters • Epidemic routing (spatio-temporal broadcast) achieves almost complete delivery Robust to the removal of short encounters Robust to selfish nodes (up to ~40%)

  38. Encounter-graphs using Friends • Distribution for friendship index FI is exponential for all the traces • Friendship between MNs is highly asymmetric • Among all node pairs: < 5% with FI > 0.01, and <1% with FI > 0.4 • Top-ranked friends form cliques and low-ranked friends are key to provide random links (short cuts) to reduce the degree of separation in encounter graph.

  39. Is B similar to V? Is E similar to V? ? Is C/D similar to V? Profile-castW. Hsu, D. Dutta, A. Helmy, Mobicom 2007 • Sending messages to others with similar behavior, without knowing their identity • Announcements to users with specific behavior V • Interest-based ads, similarity resource discovery • Assuming DTN-like environment C B E D A

  40. Profile-cast Use Cases • Mobility-based profile-cast • Targeting group of users who move in a particular pattern (lost-and-found, context-aware messages, moviegoers) • Approach: use “similarity metric” between users • Mobility-independent profile-cast • Targeting people with a certain characteristics independent of mobility (classic music lovers) • Approach: use “Small World” encounter patterns

  41. Mobility space S N D N N N S D D Forward?? Mobility-based Profile-cast Scoped message spread in the mobility space

  42. 1. profiling S N N N N Each row represents an association vector for a time slot An entry represents the percentage of online time during time slot i at location j Sum. vectors Profile-cast Operation • Profiling user mobility • The mobility of a node is represented by an association matrix • Singular value decomposition provides a summary of the matrix (A few eigen-behavior vectors are sufficient, e.g. for 99% of users at most 7 vectors describe 90% of power in the association matrix)

  43. 1. profiling S N N N N 2. Forwarding decision Profile-cast Operation • Determining user similarity • S sends Eigen behaviors for the virtual profile to N • N evaluated the similarity by weighted inner products of Eigen-behaviors • Message forwarded if Sim(U,V) is high (the goal is to deliver messages to nodes with similar profile) • Privacy conserving: N and S do not send information about their own behavior

  44. * Results presented as the ratio to epidemic routing Profile-cast Evaluation • Epidemic: Near perfect delivery ratio, low delay, high overhead • Centralized: Near perfect delivery ratio, low overhead, a bit extra delay • Decentral: provides tradeoff between delivery & overhead • Random: poor delivery ratio Epidemic Decentral Decentral Decentral Random Random Random Random - Decentralized I-cast achieves: > 50% reduction in overhead of Epidemic >30% increase in delivery of Random

  45. Success Rate Delay Overhead 92% 45% more overhead Evaluation - Result • Centralized: Excellent successrate with only 3% overhead. • Similarity-based: • (1) 61% success rate at low overhead, 92% success rate at 45% overhead • (2) A flexible success rate – overhead tradeoff • RTx with infinite TTL: Much more overhead undersimilar success rate • Short RTx with many copies: Good success rate/overhead, but delay is still long

  46. Profile-cast Initial Results • Adjustable overhead/delivery rate tradeoff • 61% delivery rate of flooding with 3% overhead • 92% delivery rate with 45% overhead • Better than single random walk in terms of delay, delivery rate • Multiple short random walks also work well in this case

  47. Future Work • Sending to a mobility profile specified by the sender • Gradient ascend followed by similarity comparison (in the mobility space) • Mobility independent profile-cast • The encounter pattern provides a network in which most nodes are reachable • We don’t want to flood – How to leverage the Small World encounter pattern to reach the “neighborhood” of most nodes efficiently?

  48. Future Work • One-copy-per-clique in the “mobility space” • We expect this to work because similarity in mobility leads to frequent encounters

  49. Future Directions (Applications) • Detect abnormal user behavior & access patterns based on previous profiles • Behavior aware push/caching services (targeted ads, events of interest, announcements) • Caching based on behavioral prediction • Can/should we extend this paradigm to include social aspects (trust, friendship, …)? • Privacy issues and mobile k-anonymity

  50. On Mobility & Predictability of VoIP & WLAN UsersJ. Kim, Y. Du, M. Chen, A. Helmy, Crawdad 2007Work in-progress Markov O(2) Predictor Accuracy VoIP User Prediction Accuracy • VoIP users are highly mobile and exhibit dramatic difference in behavior than WLAN users • Prediction accuracy drops from ave ~62% for WLAN users to below 25% for VoIP users • Motivates • Revisiting mobility modeling • Revisiting mobility prediction

More Related