+ All Categories
Home > Technology > Finding Self-Similarities in Opportunistic People Networks

Finding Self-Similarities in Opportunistic People Networks

Date post: 18-Dec-2014
Category:
Upload: multimedia-networking-and-systems-laboratory
View: 666 times
Download: 0 times
Share this document with a friend
Description:
Opportunistic network is a type of Delay Tolerant Networks (DTN) where network communication opportunities appear opportunistic. In this study, we investigate opportunistic network scenarios based on public network traces, and our contributions are the following: First, we identify the censorship issue in network traces that usually leads to strongly skewed distribution of the measurements. Based on this knowledge, we then apply the Kaplan-Meier Estimator to calculate the survivorship of network measurements, which is used in designing our proposed censorship removal algorithm (CRA) that is used to recover censored data. Second, we perform a rich set of analysis illustrating that UCSD and Dartmouth network traces show strong self-similarity, and can be modeled as such. Third, we pointed out the importance of these newly revealed characteristics in future development and evaluation of opportunistic networks.
24
Finding Self Finding Self - - similarity in similarity in Opportunistic People Networks Opportunistic People Networks Ling-Jyh Chen 1 , Yung Yung - - Chih Chih Chen Chen 1 1 , Tony Sun 2 Paruvelli Sreedevi 1 , Kuan-Ta Chen 1 Chen-Hung Yu 3 , Hao-Hua Chu 3 1 Academia Sinica, Taiwan 2 UCLA, USA 3 National Taiwan University, Taiwan
Transcript
Page 1: Finding Self-Similarities in Opportunistic People Networks

Finding SelfFinding Self--similarity in similarity in Opportunistic People NetworksOpportunistic People Networks

Ling-Jyh Chen1, YungYung--ChihChih ChenChen11,Tony Sun2

Paruvelli Sreedevi1, Kuan-Ta Chen1

Chen-Hung Yu3, Hao-Hua Chu3

1Academia Sinica, Taiwan2UCLA, USA

3National Taiwan University, Taiwan

Page 2: Finding Self-Similarities in Opportunistic People Networks

MotivationMotivation• Investigate fundamental properties of

opportunistic networks

• Better understand network connectivity

• Solve the long been ignored censorship issue

Page 3: Finding Self-Similarities in Opportunistic People Networks

ContributionContribution

• Point out and recover censorship within mobility traces of opportunistic networks– Propose Censorship Removal Algorithm– Recover censored measurements

• Prove the inter-contact time process as self-similar for future research on opportunistic networks

Page 4: Finding Self-Similarities in Opportunistic People Networks

OutlineOutline

• Trace Description• Censorship Issue

– Survival Analysis– Censorship Removal Algorithm

• Self-similarity

Page 5: Finding Self-Similarities in Opportunistic People Networks

Trace DescriptionTrace Description•• UCSD campus trace*UCSD campus trace*

– 77 days, 275 nodes involved– Client-based trace

• PDAs record Wi-Fi based APs nearby

•• Dartmouth College trace**Dartmouth College trace**– 1,777 days, 5148 nodes involved – Interface-based trace

• APs maintain the association log for each wireless interface – 77 days extracted for comparison

*UCSD: Wireless Topology Discovery (WTD Project)Wireless Topology Discovery (WTD Project)**Dartmouth: RAWDADRAWDAD

Page 6: Finding Self-Similarities in Opportunistic People Networks

Basic TermsBasic Terms

• What is Contact ?– Two nodes are of their wireless radio range – Associated to the same AP at the same time

• What is Inter-contact Time ?– Period between two consecutive contacts

• Used to observe Network Connectivity– Distribution of inter-contact time

• Disconnection duration• Reconnection frequency

Page 7: Finding Self-Similarities in Opportunistic People Networks

Basic Terms (Basic Terms (ConCon’’tt))

Inter-contact time = 3 weeks

1 2 3 4 5 6 7 8 9 10 11 (Weeks)

Inter-contact time

7 weeks

Inter-contact time ??

Observation End

• In the last case, the inter-contact time has been censored as 6 weeks.

Case A

Case B

Case C

Page 8: Finding Self-Similarities in Opportunistic People Networks

CensorshipCensorship• Inter-contact time samples end after the

termination of the observation.• Censored measurements are inevitable.

UCSD Trace Dartmouth College Trace

Censored Data Censored Data

Page 9: Finding Self-Similarities in Opportunistic People Networks

Survival AnalysisSurvival Analysis

• Important in biostatistics, medicine, …– Estimate patients’ time to live/death– Map to censored inter-contact time samples

• Censored samples should have the same likelihood distribution as the uncensored’s. –– KaplanKaplan--MeierMeier Estimator

(a.k.a. Survival Function or Product Limit EstimatorProduct Limit Estimator)

Page 10: Finding Self-Similarities in Opportunistic People Networks

KaplanKaplan--Meier EstimatorMeier Estimator• Suppose there are N samples (t1<t2<t3…<tN)

• At time ti :– di uncensored samples (complete samples)– ni events (censored/uncensored)

• The survival function is:

Page 11: Finding Self-Similarities in Opportunistic People Networks

KaplanKaplan--Meier Estimator Meier Estimator –– An ExampleAn Example• 10 inter-contact time samples:

1, 2+, 3+, 3.5+, 4, 5+,9, 9.5+, 10, 11+

(in weeks, ++ for censorship)

i-c time interval

ni di(death)

ci(censored)

Survival functionS(t)

0 10 0111

(9,10] 2 1 1 S(10)=0.56 *1/2=0.280

0 S(0)=1(0,1] 10 0 S(1)= 1* 9/10=0.9(1,4] 6 3 S(4)=0.9*5/6=0.75(4,9] 4 1 S(9)=0.75*3/4=0.56

(10,11] 1 1 S(11)=0.28*1/1= 0.28

Page 12: Finding Self-Similarities in Opportunistic People Networks

Censorship Removal AlgorithmCensorship Removal Algorithm

• Based on the survival function S(t) – t1 < t2 < t3…<tN (N : total sample number) – Death Ratio during ti ~ ti+1: D(ti) = S(ti-1)-S(ti)

S(ti)

– Ci: # of censored samples at ti

– Iteratively select Ci*D(ti) samples from Ci• Uniformly distribute their estimated inter-contact time by S(ti)• Mark them as uncensored samples

– Terminate when all the censored samples are removed

Page 13: Finding Self-Similarities in Opportunistic People Networks

Censorship Removal Algorithm (Censorship Removal Algorithm (ConCon’’tt))

• Recovered inter-contact time measurementsUCSD Trace Dartmouth Trace

Page 14: Finding Self-Similarities in Opportunistic People Networks

Censorship Removal Algorithm (Censorship Removal Algorithm (ConCon’’tt))

• Compare the recovered values to their exact values in original trace.

• 80.4% censored measurements are recovered.

Pr (T

>t)

77 days (with censorship)

1,177 days(with exact values)

Inter-contact time

Page 15: Finding Self-Similarities in Opportunistic People Networks

OutlineOutline

• Trace Description • Censorship Issue

– Survival Analysis– Censorship Removal Algorithm

• Self-similarity

Page 16: Finding Self-Similarities in Opportunistic People Networks

SelfSelf--SimilaritySimilarity

• What is self-similarity? – By definition, a self-similar object is exactly or

approximately similar to part of itself.• In opportunistic network, we focus on the

network connectivity• With recovered measurements, we prove inter-

contact time series as a self-similar process– Reconnection/disconnection – Similar mobility pattern in people opp. networks

Page 17: Finding Self-Similarities in Opportunistic People Networks

SelfSelf--SimilaritySimilarity• A self-similar series

– Distribution should be heavy-tailed

– Examined by three statistical analyses • Variance-Time Plot, R/S Plot, Periodogram Plot• Estimated by a specific parameter : Hurst• H should be in the range of 0.5~1

– Results of three methods should be in the 95% confidence interval of Whittle estimator

Page 18: Finding Self-Similarities in Opportunistic People Networks

SelfSelf--Similarity (Similarity (ConCon’’tt))• Previous works show inter-contact time

dist. as power-law dist. • A random variable XX is called heavy-tailed:

– If P[XX>x] ~ cx -α, with 0<α<2 as x -> ∞– α can be found by log-log plot– Survival curves show the α for

• UCSD: 0.26• Dartmouth: 0.47

Page 19: Finding Self-Similarities in Opportunistic People Networks

SelfSelf--Similarity (Similarity (ConCon’’tt))•• VarianceVariance--Time MethodTime Method

– Variance decreases very slowly, even when the size grows large

• The Hurst estimates are– UCSD: 0.801– Dartmouth: 0.7973

UCSD

Dartmouth

Page 20: Finding Self-Similarities in Opportunistic People Networks

SelfSelf--Similarity (Similarity (ConCon’’tt))•• Rescaled Adjusted Range Rescaled Adjusted Range (R/S) method(R/S) method

– Keep similar properties when the dataset is divided into several sub-sets

• The Hurst estimates are– UCSD:0.7472– Dartmouth:0.7493

UCSD

Dartmouth

Page 21: Finding Self-Similarities in Opportunistic People Networks

SelfSelf--Similarity (Similarity (ConCon’’tt))•• PeriodogramPeriodogram MethodMethod

– Use the slope of power spectrum of the series as frequency approaches zero

• The Hurst estimates are – UCSD: 0.7924– Dartmouth: 0.7655

UCSD

Dartmouth

Page 22: Finding Self-Similarities in Opportunistic People Networks

SelfSelf--Similarity (Similarity (ConCon’’tt))

•• Whittle EstimatorWhittle Estimator– Usually being considered as a more robust method– Provide a confidence interval

• Results of the three graphical methods are in the 95% confidence interval.

Aggregation level (UCSD) Aggregation level (Dartmouth)

Hur

st E

stim

ate

Hur

st E

stim

ate

95% Confidence Interval

Page 23: Finding Self-Similarities in Opportunistic People Networks

ConclusionConclusion• Two major properties exists in modern

opportunistic networks: – Censorship– Self-similarity

• Using CRA, we could recover censored inter-contact time to have more accurate datasets.

• With recovered datasets, we prove that inter-contact time series is self-similar.

Page 24: Finding Self-Similarities in Opportunistic People Networks

Thank You !Thank You !


Recommended