User Mobility for Opportunistic Ad Hoc Networking WMCSA 2004 Jing - - PowerPoint PPT Presentation

user mobility for opportunistic ad hoc networking
SMART_READER_LITE
LIVE PREVIEW

User Mobility for Opportunistic Ad Hoc Networking WMCSA 2004 Jing - - PowerPoint PPT Presentation

User Mobility for Opportunistic Ad Hoc Networking WMCSA 2004 Jing Su, Alvin Chin, Anna Popivanova, Ashvin Goel , Eyal de Lara Department of Computer Science Department of Electrical and Computer Engineering University of Toronto


slide-1
SLIDE 1

User Mobility for Opportunistic Ad Hoc Networking

WMCSA 2004

Jing Su, Alvin Chin, Anna Popivanova, Ashvin Goel†, Eyal de Lara Department of Computer Science

†Department of Electrical and Computer Engineering

University of Toronto http://www.cs.toronto.edu/~jingsu

slide-2
SLIDE 2

WMCSA 2004 -- University of Toronto -- Jing Su 2

Overview

Motivation Experiment Results Conclusions Related Work

slide-3
SLIDE 3

WMCSA 2004 -- University of Toronto -- Jing Su 3

Motivation

Can a network be built on pairwise interaction? Can routing algorithms be improved?

Exploit predictability in user mobility Explore replication and latency trade-off

Evaluate research using real mobility

slide-4
SLIDE 4

WMCSA 2004 -- University of Toronto -- Jing Su 4

Applications

ZebraNET, SWIM Infrastructure-less research or military networks Supplement to infrastructure networks

Improve power or cost Extend coverage and availability

slide-5
SLIDE 5

WMCSA 2004 -- University of Toronto -- Jing Su 5

Methodology

Collect traces of pairwise contact

Give devices to human test subjects Devices search for other test subjects Collect data at end of study

Trace-based simulation to determine network

characteristics

slide-6
SLIDE 6

WMCSA 2004 -- University of Toronto -- Jing Su 6

Requirements

Provide incentive to carry device

Use currently available mobile devices Instrumentation software shouldn't disrupt user

Go for whole work-day on single charge Catch serendipitous contact

even when user is not aware

Chose Palm devices, using Bluetooth

802.11 has 10x power requirement over Bluetooth

slide-7
SLIDE 7

WMCSA 2004 -- University of Toronto -- Jing Su 7

Experimental Setup

20 Mobile Devices

Palm Tungsten T Given to subjects to carry around

3 Stationary Devices

Palm m125 Placed near high-traffic locations Simulate infrastructure

slide-8
SLIDE 8

WMCSA 2004 -- University of Toronto -- Jing Su 8

Search Frequency

“Pings” have to be spaced for power management Want to catch serendipitous contact

Need to search at least once every 10 seconds

10 meters

2 m/s

slide-9
SLIDE 9

WMCSA 2004 -- University of Toronto -- Jing Su 9

Search Frequency

“Pings” have to be spaced for power management Want to catch serendipitous contact

Need to search at least once every 10 seconds

10 meters

2 m/s

slide-10
SLIDE 10

WMCSA 2004 -- University of Toronto -- Jing Su 10

Search Frequency

“Pings” have to be spaced for power management Want to catch serendipitous contact

Need to search at least once every 10 seconds

10 meters

2 m/s

slide-11
SLIDE 11

WMCSA 2004 -- University of Toronto -- Jing Su 11

Search Frequency

“Pings” have to be spaced for power management Want to catch serendipitous contact

Need to search at least once every 10 seconds

10 meters

2 m/s

slide-12
SLIDE 12

WMCSA 2004 -- University of Toronto -- Jing Su 12

Search Frequency

“Pings” have to be spaced for power management Want to catch serendipitous contact

Need to search at least once every 10 seconds

2 m/s

10 meters

slide-13
SLIDE 13

WMCSA 2004 -- University of Toronto -- Jing Su 13

Search Protocol

Synchronized clocks Bluetooth is half duplex Gives 8-10 hours battery life May miss data Our results are conservative

slide-14
SLIDE 14

WMCSA 2004 -- University of Toronto -- Jing Su 14

User Studies

18 Graduate students

2.5 weeks, Autumn 2003 9 in CS, 9 in ECE

20 Undergraduate students

8 weeks, Spring 2004 10 in CS, 10 in ECE

slide-15
SLIDE 15

WMCSA 2004 -- University of Toronto -- Jing Su 15

Results

Reachability End-to-end latency Latency versus replication trade-off User experiences

slide-16
SLIDE 16

WMCSA 2004 -- University of Toronto -- Jing Su 16

Reachability (study #1)

User Study #1 21 nodes total

18 Mobile 3 Stationary

slide-17
SLIDE 17

WMCSA 2004 -- University of Toronto -- Jing Su 17

Reachability (study #2)

User Study #2 23 nodes total

20 Mobile 3 Stationary

slide-18
SLIDE 18

WMCSA 2004 -- University of Toronto -- Jing Su 18

Trace-Based Simulation

Packet creation

When node meets new node

Packet propagation

Epidemic Unlimited bandwidth Unlimited memory

slide-19
SLIDE 19

WMCSA 2004 -- University of Toronto -- Jing Su 19

End-to-End Latency (All Packets)

User Study #1

slide-20
SLIDE 20

WMCSA 2004 -- University of Toronto -- Jing Su 20

A Closer Look

Most nodes communicated infrequently Look at select node pairs that communicate

frequently

Called “social nodes” 18 to 08 , 15 to 02

We expect our best-case to be representative of

average case in a larger network

slide-21
SLIDE 21

WMCSA 2004 -- University of Toronto -- Jing Su 21

End-to-End Latency for Social Nodes

slide-22
SLIDE 22

WMCSA 2004 -- University of Toronto -- Jing Su 22

Distribution of Intermediaries

slide-23
SLIDE 23

WMCSA 2004 -- University of Toronto -- Jing Su 23

Latency versus Replication Trade-off

Minimal replication

Who should be the next hop neighbour? Prefer certain neighbours

Efficient source routing using biased handoff

slide-24
SLIDE 24

WMCSA 2004 -- University of Toronto -- Jing Su 24

Biased Handoff Neighbors

slide-25
SLIDE 25

WMCSA 2004 -- University of Toronto -- Jing Su 25

User Experiences

Graduate students

Used devices sparingly Treated them very carefully Power conservation protocol worked well

Undergraduate students

Frequently used device Many filled the memory with games Power conservation protocol was not sufficient

slide-26
SLIDE 26

WMCSA 2004 -- University of Toronto -- Jing Su 26

Related Work

Jetcheva et al 2003 , Ad Hoc City Buses Zhao et al 2004 , Message Ferries Kotz et al 2002 , Analysis of Wireless Networks Herrmann 2003 , Modeling Sociological Aspects Wang et al 2004 , Postmanet Jain et al 2004 , Delay Tolerant Networks

slide-27
SLIDE 27

WMCSA 2004 -- University of Toronto -- Jing Su 27

Conclusion

Lessons

Current wireless devices need better application-level

control/hints for power management

Context aware computing will be a challenge

Pairwise contact enables building network for

latency insensitive packets

Biased handoff can be used to improve routing

slide-28
SLIDE 28

WMCSA 2004 -- University of Toronto -- Jing Su 28

Future Work

Want “denser” data Practical algorithm to determine biased handoff Using data to evaluate mobility models

slide-29
SLIDE 29

Questions?

slide-30
SLIDE 30

WMCSA 2004 -- University of Toronto -- Jing Su 30

Reachability (user study #1)

All Lecture Times Removed Stationary Nodes Removed Stationary Devices Only 2 4 6 8 10 12 14 16 18 20

Max Median Min

Number of other nodes reachable

slide-31
SLIDE 31

WMCSA 2004 -- University of Toronto -- Jing Su 31

Reachability (user study #2)

All Lecture Times Removed Stationary Nodes Removed Stationary Devices Only 2 4 6 8 10 12 14 16 18 20 22

Max Median Min

Number of other nodes reachable