-
Optimized Preprocessing and Machine Learning for Quantitative Raman Spectroscopy in Biology
Authors:
Emily E Storey,
Amr S. Helmy
Abstract:
Raman spectroscopy's capability to provide meaningful composition predictions is heavily reliant on a pre-processing step to remove insignificant spectral variation. This is crucial in biofluid analysis. Widespread adoption of diagnostics using Raman requires a robust model which can withstand routine spectra discrepancies due to unavoidable variations such as age, diet, and medical background. A…
▽ More
Raman spectroscopy's capability to provide meaningful composition predictions is heavily reliant on a pre-processing step to remove insignificant spectral variation. This is crucial in biofluid analysis. Widespread adoption of diagnostics using Raman requires a robust model which can withstand routine spectra discrepancies due to unavoidable variations such as age, diet, and medical background. A wealth of pre-processing methods are available, and it is often up to trial-and-error or user experience to select the method which gives the best results. This process can be incredibly time consuming and inconsistent for multiple operators.
In this study we detail a method to analyze the statistical variability within a set of training spectra and determine suitability to form a robust model. This allows us to selectively qualify or exclude a pre-processing method, predetermine robustness, and simultaneously identify the number of components which will form the best predictive model. We demonstrate the ability of this technique to improve predictive models of two artificial biological fluids.
Raman spectroscopy is ideal for noninvasive, nondestructive analysis. Routine health monitoring which maximizes comfort is increasingly crucial, particularly in epidemic-level diabetes diagnoses. High variability in spectra of biological samples can hinder Raman's adoption for these methods. Our technique allows the decision of optimal pre-treatment method to be determined for the operator; model performance is no longer a function of user experience. We foresee this statistical technique being an instrumental element to widening the adoption of Raman as a monitoring tool in a field of biofluid analysis.
△ Less
Submitted 3 April, 2019;
originally announced April 2019.
-
A Multilingual Encoding Method for Text Classification and Dialect Identification Using Convolutional Neural Network
Authors:
Amr Adel Helmy
Abstract:
This thesis presents a language-independent text classification model by introduced two new encoding methods "BUNOW" and "BUNOC" used for feeding the raw text data into a new CNN spatial architecture with vertical and horizontal convolutional process instead of commonly used methods like one hot vector or word representation (i.e. word2vec) with temporal CNN architecture. The proposed model can be…
▽ More
This thesis presents a language-independent text classification model by introduced two new encoding methods "BUNOW" and "BUNOC" used for feeding the raw text data into a new CNN spatial architecture with vertical and horizontal convolutional process instead of commonly used methods like one hot vector or word representation (i.e. word2vec) with temporal CNN architecture. The proposed model can be classified as hybrid word-character model in its work methodology because it consumes less memory space by using a fewer neural network parameters as in character level representation, in addition to providing much faster computations with fewer network layers depth, as in word level representation. A promising result achieved compared to state of art models in two different morphological benchmarked dataset one for Arabic language and one for English language.
△ Less
Submitted 18 March, 2019;
originally announced March 2019.
-
An Innovative Word Encoding Method For Text Classification Using Convolutional Neural Network
Authors:
Amr Adel Helmy,
Yasser M. K. Omar,
Rania Hodhod
Abstract:
Text classification plays a vital role today especially with the intensive use of social networking media. Recently, different architectures of convolutional neural networks have been used for text classification in which one-hot vector, and word embedding methods are commonly used. This paper presents a new language independent word encoding method for text classification. The proposed model conv…
▽ More
Text classification plays a vital role today especially with the intensive use of social networking media. Recently, different architectures of convolutional neural networks have been used for text classification in which one-hot vector, and word embedding methods are commonly used. This paper presents a new language independent word encoding method for text classification. The proposed model converts raw text data to low-level feature dimension with minimal or no preprocessing steps by using a new approach called binary unique number of word "BUNOW". BUNOW allows each unique word to have an integer ID in a dictionary that is represented as a k-dimensional vector of its binary equivalent. The output vector of this encoding is fed into a convolutional neural network (CNN) model for classification. Moreover, the proposed model reduces the neural network parameters, allows faster computation with few network layers, where a word is atomic representation the document as in word level, and decrease memory consumption for character level representation. The provided CNN model is able to work with other languages or multi-lingual text without the need for any changes in the encoding method. The model outperforms the character level and very deep character level CNNs models in terms of accuracy, network parameters, and memory consumption; the results show total classification accuracy 91.99% and error 8.01% using AG's News dataset compared to the state of art methods that have total classification accuracy 91.45% and error 8.55%, in addition to the reduction in input feature vector and neural network parameters by 62% and 34%, respectively.
△ Less
Submitted 11 March, 2019;
originally announced March 2019.
-
Practical Prediction of Human Movements Across Device Types and Spatiotemporal Granularities
Authors:
Babak Alipour,
Leonardo Tonetto,
Roozbeh Ketabi,
Aaron Yi Ding,
Jörg Ott,
Ahmed Helmy
Abstract:
Understanding and predicting mobility are essential for the design and evaluation of future mobile edge caching and networking. Consequently, research on prediction of human mobility has drawn significant attention in the last decade. Employing information-theoretic concepts and machine learning methods, earlier research has shown evidence that human behavior can be highly predictable.
Despite e…
▽ More
Understanding and predicting mobility are essential for the design and evaluation of future mobile edge caching and networking. Consequently, research on prediction of human mobility has drawn significant attention in the last decade. Employing information-theoretic concepts and machine learning methods, earlier research has shown evidence that human behavior can be highly predictable.
Despite existing studies, more investigations are needed to capture intrinsic mobility characteristics constraining predictability, and to explore more dimensions (e.g. device types) and spatio-temporal granularities, especially with the change in human behavior and technology. We analyze extensive longitudinal datasets with fine spatial granularity (AP level) covering 16 months. The study reveals device type as an important factor affecting predictability. Ultra-portable devices such as smartphones have "on-the-go" mode of usage (and hence dubbed "Flutes"), whereas laptops are "sit-to-use" (dubbed "Cellos").
The goal of this study is to investigate practical prediction mechanisms to quantify predictability as an aspect of human mobility modeling, across time, space and device types. We apply our systematic analysis to wireless traces from a large university campus. We compare several algorithms using varying degrees of temporal and spatial granularity for the two modes of devices; Flutes vs. Cellos. Through our analysis, we quantify how the mobility of Flutes is less predictable than the mobility of Cellos. In addition, this pattern is consistent across various spatio-temporal granularities, and for different methods (Markov chains, neural networks/deep learning, entropy-based estimators). This work substantiates the importance of predictability as an essential aspect of human mobility, with direct application in predictive caching, user behavior modeling and mobility simulations.
△ Less
Submitted 3 March, 2019;
originally announced March 2019.
-
Interest-Aware Delivery for Mobile Social Networks: A TRACE-driven Approach
Authors:
Ahmed Helmy
Abstract:
We envision future mobile networks to be human-centric supporting interest-aware delivery, where an interest maybe based on behavior, such as mobility pattern, location, or web browsing (or user profile) such as affiliation, attributes, or activity. An essential capability in future networks will be the ability to provide scalable group communication. Current communication paradigms, including uni…
▽ More
We envision future mobile networks to be human-centric supporting interest-aware delivery, where an interest maybe based on behavior, such as mobility pattern, location, or web browsing (or user profile) such as affiliation, attributes, or activity. An essential capability in future networks will be the ability to provide scalable group communication. Current communication paradigms, including unicast and multicast, require explicit identification of destination nodes (through node IDs or group membership protocols), while directory services translate logical, interest-specific queries into destination IDs where parties are then connected using interest-oblivious protocols. The power and scalability of such paradigms is quite limited in the context of future, highly dynamic mobile social networks, where it is desirable in many scenarios to support implicit membership based on interest. In such scenarios, membership in interest-groups is not explicitly expressed by users, it is rather autonomously inferred by network protocols based on behavioral profiles. This removes the dependence on third parties (via directory lookup), the need for explicit expression of interest (or human intervention), and minimizes delivery overhead to uninterested users. While existing types of social networks will likely evolve in the context of mobile networks, we provide a novel paradigm of communication, deviating significantly from existing approaches and subsequently enabling qualitatively different capabilities for future services in mobile societies. In addition, our services and protocol design philosophy begins by analyzing the context in which the service is to be deployed, unlike most existing wireless networking approaches of designing general purpose protocols.
△ Less
Submitted 16 December, 2018;
originally announced December 2018.
-
Playing with Matches: Vehicular Mobility through Analysis of Trip Similarity and Matching
Authors:
Roozbeh Ketabi,
Babak Alipour,
Ahmed Helmy
Abstract:
Understanding city-scale vehicular mobility and trip patterns is essential to addressing many problems, from transportation and pollution to public safety, among others. Using spatio-temporal analysis of vehicular mobility, promising solutions can be proposed to alleviate these major challenges, utilizing shared mobility and crowd-sourcing. The rise of transportation networks (e.g. Uber, Lyft), is…
▽ More
Understanding city-scale vehicular mobility and trip patterns is essential to addressing many problems, from transportation and pollution to public safety, among others. Using spatio-temporal analysis of vehicular mobility, promising solutions can be proposed to alleviate these major challenges, utilizing shared mobility and crowd-sourcing. The rise of transportation networks (e.g. Uber, Lyft), is a mere beginning to shared mobility. In this paper, we address problems of trip representation and matching. Particularly, we study a real-world dataset of trips (from Cologne, Germany), from spatial and temporal perspectives. Comparison of trajectories is desired for applications relying on spatio-temporal phenomena. For that purpose, we present a novel combined spatio-temporal similarity score, based on the weighted geometric mean (WGM) and conduct experiments on its applicability and strengths. First, we use the score to find clusters of trips that were spatially and/or temporally separable using spectral clustering. The score is then used in a real-time matching of trips for Catch-a-Ride (CaR) and CarPooling (CP) scenarios. CaR and CP achieve $\approx40\%$ and $\approx25\%$ decrease in traveled distances respectively, at the cost of moving to pick-up and from drop-off locations (i.e. drivers going on average $<700m$ out of their way on pick-up and drop-off for CP). Additionally, a comparison with the metrics available in the literature is presented on CaR scenario. We find that main advantages of WGM include the flexibility to favor time or space components, and linearity of runtime complexity. Finally, we formulate an optimal free float Car-Sharing scenario (e.g. scheduling a system of automated vehicles or taxis) resulting in an average of $\approx3.88$ trips serviced by a car in one hour.
△ Less
Submitted 9 November, 2018; v1 submitted 6 September, 2018;
originally announced September 2018.
-
On the Relation Between Mobile Encounters and Web Traffic Patterns: A Data-driven Study
Authors:
Babak Alipour,
Mimonah Al Qathrady,
Ahmed Helmy
Abstract:
Mobility and network traffic have been traditionally studied separately. Their interaction is vital for generations of future mobile services and effective caching, but has not been studied in depth with real-world big data. In this paper, we characterize mobility encounters and study the correlation between encounters and web traffic profiles using large-scale datasets (30TB in size) of WiFi and…
▽ More
Mobility and network traffic have been traditionally studied separately. Their interaction is vital for generations of future mobile services and effective caching, but has not been studied in depth with real-world big data. In this paper, we characterize mobility encounters and study the correlation between encounters and web traffic profiles using large-scale datasets (30TB in size) of WiFi and NetFlow traces. The analysis quantifies these correlations for the first time, across spatio-temporal dimensions, for device types grouped into on-the-go Flutes and sit-to-use Cellos. The results consistently show a clear relation between mobility encounters and traffic across different buildings over multiple days, with encountered pairs showing higher traffic similarity than non-encountered pairs, and long encounters being associated with the highest similarity. We also investigate the feasibility of learning encounters through web traffic profiles, with implications for dissemination protocols, and contact tracing. This provides a compelling case to integrate both mobility and web traffic dimensions in future models, not only at an individual level, but also at pairwise and collective levels. We have released samples of code and data used in this study on GitHub, to support reproducibility and encourage further research (https://github.com/BabakAp/encounter-traffic).
△ Less
Submitted 5 November, 2018; v1 submitted 11 August, 2018;
originally announced August 2018.
-
Analyzing Mobility-Traffic Correlations in Large WLAN Traces: Flutes vs. Cellos
Authors:
Babak Alipour,
Leonardo Tonetto,
Aaron Ding,
Roozbeh Ketabi,
Jörg Ott,
Ahmed Helmy
Abstract:
Two major factors affecting mobile network performance are mobility and traffic patterns. Simulations and analytical-based performance evaluations rely on models to approximate factors affecting the network. Hence, the understanding of mobility and traffic is imperative to the effective evaluation and efficient design of future mobile networks. Current models target either mobility or traffic, but…
▽ More
Two major factors affecting mobile network performance are mobility and traffic patterns. Simulations and analytical-based performance evaluations rely on models to approximate factors affecting the network. Hence, the understanding of mobility and traffic is imperative to the effective evaluation and efficient design of future mobile networks. Current models target either mobility or traffic, but do not capture their interplay. Many trace-based mobility models have largely used pre-smartphone datasets (e.g., AP-logs), or much coarser granularity (e.g., cell-towers) traces. This raises questions regarding the relevance of existing models, and motivates our study to revisit this area. In this study, we conduct a multidimensional analysis, to quantitatively characterize mobility and traffic spatio-temporal patterns, for laptops and smartphones, leading to a detailed integrated mobility-traffic analysis. Our study is data-driven, as we collect and mine capacious datasets (with 30TB, 300k devices) that capture all of these dimensions. The investigation is performed using our systematic (FLAMeS) framework. Overall, dozens of mobility and traffic features have been analyzed. The insights and lessons learnt serve as guidelines and a first step towards future integrated mobility-traffic models. In addition, our work acts as a step**-stone towards a richer, more-realistic suite of mobile test scenarios and benchmarks.
△ Less
Submitted 21 August, 2020; v1 submitted 8 January, 2018;
originally announced January 2018.
-
Performance and Compensation of I/Q Imbalance in Differential STBC-OFDM
Authors:
Lei Chen,
Ahmed G. Helmy,
Guangrong Yue,
Shaoqian Li,
Naofal Al-Dhahir
Abstract:
Differential space time block coding (STBC) achieves full spatial diversity and avoids channel estimation overhead. Over highly frequency-selective channels, STBC is integrated with orthogonal frequency division multiplexing (OFDM) to achieve high performance. However, low-cost implementation of differential STBC-OFDM using direct-conversion transceivers is sensitive to In-phase/Quadrature-phase i…
▽ More
Differential space time block coding (STBC) achieves full spatial diversity and avoids channel estimation overhead. Over highly frequency-selective channels, STBC is integrated with orthogonal frequency division multiplexing (OFDM) to achieve high performance. However, low-cost implementation of differential STBC-OFDM using direct-conversion transceivers is sensitive to In-phase/Quadrature-phase imbalance (IQI). In this paper, we quantify the performance impact of IQI at the receiver front-end on differential STBC-OFDM systems and propose a compensation algorithm to mitigate its effect. The proposed receiver IQI compensation works in an adaptive decision-directed manner without using known pilots or training sequences, which reduces the rate loss due to training overhead. Our numerical results show that our proposed compensation algorithm can effectively mitigate receive IQI in differential STBC-OFDM.
△ Less
Submitted 27 December, 2016;
originally announced December 2016.
-
Performance Analysis and Compensation of Joint TX/RX I/Q Imbalance in Differential STBC-OFDM
Authors:
Lei Chen,
Ahmed G. Helmy,
Guangrong Yue,
Shaoqian Li,
Naofal Al-Dhahir
Abstract:
Differential space time block coding (STBC) achieves full spatial diversity and avoids channel estimation overhead. Over highly frequency-selective channels, STBC is integrated with orthogonal frequency division multiplexing (OFDM) to efficiently mitigate intersymbol interference effects. However, low-cost implementation of STBC-OFDM with direct-conversion transceivers is sensitive to In-phase/Qua…
▽ More
Differential space time block coding (STBC) achieves full spatial diversity and avoids channel estimation overhead. Over highly frequency-selective channels, STBC is integrated with orthogonal frequency division multiplexing (OFDM) to efficiently mitigate intersymbol interference effects. However, low-cost implementation of STBC-OFDM with direct-conversion transceivers is sensitive to In-phase/Quadrature-phase imbalance (IQI). In this paper, we quantify the performance impact of IQI at both the transmitter and receiver radio frequency front-ends on differential STBC-OFDM systems which has not been investigated before in the literature. In addition, we propose a widely-linear compensation algorithm at the receiver to mitigate the performance degradation caused by the IQI at the transmitter and receiver ends. Moreover, a parameter-based generalized algorithm is proposed to extract the IQI parameters and improve the performance under high-mobility. The adaptive compensation algorithms are blind and work in a decision-directed manner without using known pilots or training sequences. Numerical results show that our proposed compensation algorithms can effectively mitigate IQI in differential STBC-OFDM.
△ Less
Submitted 27 December, 2016;
originally announced December 2016.
-
Multi-modal Mining and Modeling of Big Mobile Networks Based on Users Behavior and Interest
Authors:
Saeed Moghaddam,
Ahmed Helmy
Abstract:
Usage of mobile wireless Internet has grown very fast in recent years. This radical change in availability of Internet has led to communication of big amount of data over mobile networks and consequently new challenges and opportunities for modeling of mobile Internet characteristics. While the traditional approach toward network modeling suggests finding a generic traffic model for the whole netw…
▽ More
Usage of mobile wireless Internet has grown very fast in recent years. This radical change in availability of Internet has led to communication of big amount of data over mobile networks and consequently new challenges and opportunities for modeling of mobile Internet characteristics. While the traditional approach toward network modeling suggests finding a generic traffic model for the whole network, in this paper, we show that this approach does not capture all the dynamics of big mobile networks and does not provide enough accuracy. Our case study based on a big dataset including billions of netflow records collected from a campus-wide wireless mobile network shows that user interests acquired based on accessed domains and visited locations as well as user behavioral groups have a significant impact on traffic characteristics of big mobile networks. For this purpose, we utilize a novel graph-based approach based on KS-test as well as a novel co-clustering technique. Our study shows that interest-based modeling of big mobile networks can significantly improve the accuracy and reduce the KS distance by factor of 5 comparing to the generic approach.
△ Less
Submitted 17 December, 2016;
originally announced December 2016.
-
An Information-theoretic Model for Knowledge Sharing in Opportunistic Social Networks
Authors:
Mai ElSherief,
Tamer ElBatt,
Ahmed Zahran,
Ahmed Helmy
Abstract:
In this paper we establish fundamental limits on the performance of knowledge sharing in opportunistic social net- works. In particular, we introduce a novel information-theoretic model to characterize the performance limits of knowledge sharing policies. Towards this objective, we first introduce the notions of knowledge gain and its upper bound, knowledge gain limit, per user. Second, we charact…
▽ More
In this paper we establish fundamental limits on the performance of knowledge sharing in opportunistic social net- works. In particular, we introduce a novel information-theoretic model to characterize the performance limits of knowledge sharing policies. Towards this objective, we first introduce the notions of knowledge gain and its upper bound, knowledge gain limit, per user. Second, we characterize these quantities for a number of network topologies and sharing policies. This work constitutes a first step towards defining and characterizing the performance limits and trade-offs associated with knowledge sharing in opportunistic social networks. Finally, we present nu- merical results characterizing the cumulative knowledge gain over time and its upper bound, using publicly available smartphone data. The results confirm the key role of the proposed model to motivate future research in this ripe area of research as well as new knowledge sharing policies.
△ Less
Submitted 12 May, 2015;
originally announced May 2015.
-
A Novel Spectrally-Efficient Scheme for Physical Layer Network Coding
Authors:
Ahmed G. Helmy,
Tamer Khattab,
Mazen O. Hasna
Abstract:
In this paper, we propose a novel three-time-slot transmission scheme combined with an efficient embedded linear channel equalization (ELCE) technique for the Physical layer Network Coding (PNC). Our transmission scheme, we achieve about 33% increase in the spectral efficiency over the conventional two-time-slot scheme while maintaining the same end-toend BER performance.We derive an exact express…
▽ More
In this paper, we propose a novel three-time-slot transmission scheme combined with an efficient embedded linear channel equalization (ELCE) technique for the Physical layer Network Coding (PNC). Our transmission scheme, we achieve about 33% increase in the spectral efficiency over the conventional two-time-slot scheme while maintaining the same end-toend BER performance.We derive an exact expression for the endto- end BER of the proposed three-time-slot transmission scheme combined with the proposed ELCE technique for BPSK transmission. Numerical results demonstrate that the exact expression for the end-to-end BER is consistent with the BER simulation results.
△ Less
Submitted 3 July, 2014;
originally announced July 2014.
-
Comparing Background Subtraction Algorithms and Method of Car Counting
Authors:
Gautam S. Thakur,
Mohsen Ali,
Pan Hui,
Ahmed Helmy
Abstract:
In this paper, we compare various image background subtraction algorithms with the ground truth of cars counted. We have given a sample of thousand images, which are the snap shots of current traffic as records at various intersections and highways. We have also counted an approximate number of cars that are visible in these images. In order to ascertain the accuracy of algorithms to be used for t…
▽ More
In this paper, we compare various image background subtraction algorithms with the ground truth of cars counted. We have given a sample of thousand images, which are the snap shots of current traffic as records at various intersections and highways. We have also counted an approximate number of cars that are visible in these images. In order to ascertain the accuracy of algorithms to be used for the processing of million images, we compare them on many metrics that includes (i) Scalability (ii) Accuracy (iii) Processing time.
△ Less
Submitted 29 January, 2012;
originally announced February 2012.
-
Towards Realistic Vehicular Network Modeling Using Planet-scale Public Webcams
Authors:
Gautam S. Thakur,
Pan Hui,
Hamed Ketabdar,
Ahmed Helmy
Abstract:
Realistic modeling of vehicular mobility has been particularly challenging due to a lack of large libraries of measurements in the research community. In this paper we introduce a novel method for large-scale monitoring, analysis, and identification of spatio-temporal models for vehicular mobility using the freely available online webcams in cities across the globe. We collect vehicular mobility t…
▽ More
Realistic modeling of vehicular mobility has been particularly challenging due to a lack of large libraries of measurements in the research community. In this paper we introduce a novel method for large-scale monitoring, analysis, and identification of spatio-temporal models for vehicular mobility using the freely available online webcams in cities across the globe. We collect vehicular mobility traces from 2,700 traffic webcams in 10 different cities for several months and generate a mobility dataset of 7.5 Terabytes consisting of 125 million of images. To the best of our knowl- edge, this is the largest data set ever used in such study. To process and analyze this data, we propose an efficient and scalable algorithm to estimate traffic density based on background image subtraction. Initial results show that at least 82% of individual cameras with less than 5% deviation from four cities follow Loglogistic distribution and also 94% cameras from Toronto follow gamma distribution. The aggregate results from each city also demonstrate that Log- Logistic and gamma distribution pass the KS-test with 95% confidence. Furthermore, many of the camera traces exhibit long range dependence, with self-similarity evident in the aggregates of traffic (per city). We believe our novel data collection method and dataset provide a much needed contribution to the research community for realistic modeling of vehicular networks and mobility.
△ Less
Submitted 19 May, 2011;
originally announced May 2011.
-
Mobile Testbeds with an Attitude
Authors:
Sungwook Moon,
Ahmed Helmy
Abstract:
There have been significant recent advances in mobile networks, specifically in multi-hop wireless networks including DTNs and sensor networks. It is critical to have a testing environment to realistically evaluate such networks and their protocols and services. Towards this goal, we propose a novel, mobile testbed of two main components. The first consists of a network of robots with personality-…
▽ More
There have been significant recent advances in mobile networks, specifically in multi-hop wireless networks including DTNs and sensor networks. It is critical to have a testing environment to realistically evaluate such networks and their protocols and services. Towards this goal, we propose a novel, mobile testbed of two main components. The first consists of a network of robots with personality- mimicking, human-encounter behaviors, which will be the focus of this demo. The personality is build upon behavioral profiling of mobile users based on extensive wireless-network measurements and analysis. The second component combines the testbed with the human society using a new concept that we refer to as participatory testing utilizing crowd sourcing.
△ Less
Submitted 18 September, 2010;
originally announced September 2010.
-
Spatio-Temporal Modeling of Wireless Users Internet Access Patterns Using Self-Organizing Maps
Authors:
Saeed Moghaddam,
Ahmed Helmy
Abstract:
User online behavior and interests will play a central role in future mobile networks. We introduce a systematic method for large-scale multi-dimensional analysis of online activity for thousands of mobile users across 79 buildings over a variety of web domains. We propose a modeling approach based on self-organizing maps (SOM) for discovering, organizing and visualizing different mobile users' tr…
▽ More
User online behavior and interests will play a central role in future mobile networks. We introduce a systematic method for large-scale multi-dimensional analysis of online activity for thousands of mobile users across 79 buildings over a variety of web domains. We propose a modeling approach based on self-organizing maps (SOM) for discovering, organizing and visualizing different mobile users' trends from billions of WLAN records. We find surprisingly that users' trends based on domains and locations can be accurately modeled using a self-organizing map with clearly distinct characteristics. We also find many non-trivial correlations between different types of web domains and locations. Based on our analysis, we introduce a mixture model as an initial step towards realistic simulation of wireless network usage.
△ Less
Submitted 29 August, 2010;
originally announced August 2010.
-
Analysis of Spatio-Temporal Preferences and Encounter Statistics for DTN Performance
Authors:
Gautam S. Thakur,
Udayan Kumar,
Ahmed Helmy,
Wei-Jen Hsu
Abstract:
Spatio-temporal preferences and encounter statistics provide realistic measures to understand mobile user's behavioral preferences and transfer opportunities in Delay Tolerant Networks (DTNs). The time dependent behavior and periodic reappearances at specific locations can approximate future online presence while encounter statistics can aid to forward the routing decisions. It is theoretically sh…
▽ More
Spatio-temporal preferences and encounter statistics provide realistic measures to understand mobile user's behavioral preferences and transfer opportunities in Delay Tolerant Networks (DTNs). The time dependent behavior and periodic reappearances at specific locations can approximate future online presence while encounter statistics can aid to forward the routing decisions. It is theoretically shown that such characteristics heavily affect the performance of routing protocols. Therefore, mobility models demonstrating such characteristics are also expected to show identical routing performance. However, we argue models despite capturing these properties deviate from their expected routing performance. We use realistic traces to validate this observation on two mobility models. Our empirical results for epidemic routing show those models' largely differ (delay 67% & reachability 79%) from the observed values. This in-turn call for two important activities: (i) Analogous to routing, explore structural properties on a Global scale (ii) Design new mobility models that capture them.
△ Less
Submitted 6 July, 2010;
originally announced July 2010.
-
Similarity Analysis and Modeling in Mobile Societies: The Missing Link
Authors:
Gautam Thakur,
Ahmed Helmy,
Wei-Jen Hsu
Abstract:
A new generation of "behavior-aware" delay tolerant networks is emerging in what may define future mobile social networks. With the introduction of novel behavior-aware protocols, services and architectures, there is a pressing need to understand and realistically model mobile users behavioral characteristics, their similarity and clustering. Such models are essential for the analysis, performance…
▽ More
A new generation of "behavior-aware" delay tolerant networks is emerging in what may define future mobile social networks. With the introduction of novel behavior-aware protocols, services and architectures, there is a pressing need to understand and realistically model mobile users behavioral characteristics, their similarity and clustering. Such models are essential for the analysis, performance evaluation, and simulation of future DTNs. This paper addresses issues related to mobile user similarity, its definition, analysis and modeling. To define similarity, we adopt a behavioral-profile based on users location preferences using their on-line association matrix and its SVD, then calculate the behavioral distance to capture user similarity. This measures the difference of the major spatio-temporal behavioral trends and can be used to cluster users into similarity groups or communities. We then analyze and contrast similarity distributions of mobile user populations in two settings: (i) based on real measurements from four major campuses with over ten thousand users for a month, and (ii) based on existing mobility models, including random direction and time-varying community models. Our results show a rich set of similar communities in real mobile societies with distinct behavioral clusters of users. This is true for all the traces studied, with the trend being consistent over time. Surprisingly, however, we find that the existing mobility models do not explicitly capture similarity and result in homogeneous users that are all similar to each other. Thus the richness and diversity of user behavioral patterns is not captured to any degree in the existing models. These findings strongly suggest that similarity should be explicitly captured in future mobility models, which motivates the need to re-visit mobility modeling in the future.
△ Less
Submitted 13 June, 2010;
originally announced June 2010.
-
Data-driven Co-clustering Model of Internet Usage in Large Mobile Societies
Authors:
Saeed Moghaddam,
Ahmed Helmy,
Sanjay Ranka,
Manas Somaiya
Abstract:
Design and simulation of future mobile networks will center around human interests and behavior. We propose a design paradigm for mobile networks driven by realistic models of users' on-line behavior, based on mining of billions of wireless-LAN records. We introduce a systematic method for large-scale multi-dimensional coclustering of web activity for thousands of mobile users at 79 locations. We…
▽ More
Design and simulation of future mobile networks will center around human interests and behavior. We propose a design paradigm for mobile networks driven by realistic models of users' on-line behavior, based on mining of billions of wireless-LAN records. We introduce a systematic method for large-scale multi-dimensional coclustering of web activity for thousands of mobile users at 79 locations. We find surprisingly that users can be consistently modeled using ten clusters with disjoint profiles. Access patterns from multiple locations show differential user behavior. This is the first study to obtain such detailed results for mobile Internet usage.
△ Less
Submitted 27 May, 2010;
originally announced May 2010.
-
Understanding periodicity and regularity of nodal encounters in mobile networks: A spectral analysis
Authors:
Sungwook Moon,
Ahmed Helmy
Abstract:
Study on human mobility is gaining increasing attention from the research community with its multiple applications to use in mobile networks, particularly for the purpose of message delivery in the Delay Tolerant Networks. To better understand the potential of mobile nodes as message relays, our study investigates the encounter pattern of mobile devices. Specifically, we examine the extensive netw…
▽ More
Study on human mobility is gaining increasing attention from the research community with its multiple applications to use in mobile networks, particularly for the purpose of message delivery in the Delay Tolerant Networks. To better understand the potential of mobile nodes as message relays, our study investigates the encounter pattern of mobile devices. Specifically, we examine the extensive network traces that reflect mobility of communication devices. We analyze the periodicity in encounter pattern by using power spectral analysis. Strong periodicity was observed among rarely encountering mobile nodes while the periodicity was weaker among frequently encountering nodes. Further, we present a method to search regularly encountering pairs and discuss the findings. To our knowledge, we are the first to analyze the periodicity of encounter pattern with large network traces, which is a critical basis for designing an efficient delivery scheme using mobile nodes.
△ Less
Submitted 17 August, 2010; v1 submitted 26 April, 2010;
originally announced April 2010.
-
SHIELD: Social sensing and Help In Emergency using mobiLe Devices
Authors:
Gautam S. Thakur,
Mukul Sharma,
Ahmed Helmy
Abstract:
School and College campuses face a perceived threat of violent crimes and require a realistic plan against unpredictable emergencies and disasters. Existing emergency systems (e.g., 911, campus-wide alerts) are quite useful, but provide delayed response (often tens of minutes) and do not utilize proximity or locality. There is a need to augment such systems with proximity-based systems for more im…
▽ More
School and College campuses face a perceived threat of violent crimes and require a realistic plan against unpredictable emergencies and disasters. Existing emergency systems (e.g., 911, campus-wide alerts) are quite useful, but provide delayed response (often tens of minutes) and do not utilize proximity or locality. There is a need to augment such systems with proximity-based systems for more immediate response to attempt to prevent and deter crime. In this paper we propose SHIELD, an on-campus emergency rescue and alert management service. It is a fully distributed infrastructure-less platform based on proximity-enabled trust and cooperation. It relies on localized responses, sent using Bluetooth and/or WiFi on the fly to achieve minimal response time and maximal availability thereby augmenting the traditional notion of emergency services. Analysis of campus crime statistics and WLAN traces surprisingly show a strong positive correlation (over 55%) between on-campus crime statistics and spatio-temporal density distribution of on-campus mobile users. This result provides a motivation to develop such platform and points to the promise in reducing crime incidences. We also show an implementation of a prototype application to be used in such scenarios.
△ Less
Submitted 25 April, 2010;
originally announced April 2010.
-
PROTECT: Proximity-based Trust-advisor using Encounters for Mobile Societies
Authors:
Udayan Kumar,
Gautam Thakur,
Ahmed Helmy
Abstract:
Many interactions between network users rely on trust, which is becoming particularly important given the security breaches in the Internet today. These problems are further exacerbated by the dynamics in wireless mobile networks. In this paper we address the issue of trust advisory and establishment in mobile networks, with application to ad hoc networks, including DTNs. We utilize encounters in…
▽ More
Many interactions between network users rely on trust, which is becoming particularly important given the security breaches in the Internet today. These problems are further exacerbated by the dynamics in wireless mobile networks. In this paper we address the issue of trust advisory and establishment in mobile networks, with application to ad hoc networks, including DTNs. We utilize encounters in mobile societies in novel ways, noticing that mobility provides opportunities to build proximity, location and similarity based trust. Four new trust advisor filters are introduced - including encounter frequency, duration, behavior vectors and behavior matrices - and evaluated over an extensive set of real-world traces collected from a major university. Two sets of statistical analyses are performed; the first examines the underlying encounter relationships in mobile societies, and the second evaluates DTN routing in mobile peer-to-peer networks using trust and selfishness models. We find that for the analyzed trace, trust filters are stable in terms of growth with time (3 filters have close to 90% overlap of users over a period of 9 weeks) and the results produced by different filters are noticeably different. In our analysis for trust and selfishness model, our trust filters largely undo the effect of selfishness on the unreachability in a network. Thus improving the connectivity in a network with selfish nodes.
We hope that our initial promising results open the door for further research on proximity-based trust.
△ Less
Submitted 25 April, 2010;
originally announced April 2010.
-
Modeling Spatial and Temporal Dependencies of User Mobility in Wireless Mobile Networks
Authors:
Wei-jen Hsu,
Thrasyvoulos Spyropoulos,
Konstantinos Psounis,
Ahmed Helmy
Abstract:
Realistic mobility models are fundamental to evaluate the performance of protocols in mobile ad hoc networks. Unfortunately, there are no mobility models that capture the non-homogeneous behaviors in both space and time commonly found in reality, while at the same time being easy to use and analyze. Motivated by this, we propose a time-variant community mobility model, referred to as the TVC mod…
▽ More
Realistic mobility models are fundamental to evaluate the performance of protocols in mobile ad hoc networks. Unfortunately, there are no mobility models that capture the non-homogeneous behaviors in both space and time commonly found in reality, while at the same time being easy to use and analyze. Motivated by this, we propose a time-variant community mobility model, referred to as the TVC model, which realistically captures spatial and temporal correlations. We devise the communities that lead to skewed location visiting preferences, and time periods that allow us to model time dependent behaviors and periodic re-appearances of nodes at specific locations.
To demonstrate the power and flexibility of the TVC model, we use it to generate synthetic traces that match the characteristics of a number of qualitatively different mobility traces, including wireless LAN traces, vehicular mobility traces, and human encounter traces. More importantly, we show that, despite the high level of realism achieved, our TVC model is still theoretically tractable. To establish this, we derive a number of important quantities related to protocol performance, such as the average node degree, the hitting time, and the meeting time, and provide examples of how to utilize this theory to guide design decisions in routing protocols.
△ Less
Submitted 21 October, 2008;
originally announced October 2008.
-
CSI: A Paradigm for Behavior-oriented Delivery Services in Mobile Human Networks
Authors:
Wei-jen Hsu,
Debojyoti Dutta,
Ahmed Helmy
Abstract:
We propose behavior-oriented services as a new paradigm of communication in mobile human networks. Our study is motivated by the tight user-network coupling in future mobile societies. In such a paradigm, messages are sent to inferred behavioral profiles, instead of explicit IDs. Our paper provides a systematic framework in providing such services. First, user behavioral profiles are constructed…
▽ More
We propose behavior-oriented services as a new paradigm of communication in mobile human networks. Our study is motivated by the tight user-network coupling in future mobile societies. In such a paradigm, messages are sent to inferred behavioral profiles, instead of explicit IDs. Our paper provides a systematic framework in providing such services. First, user behavioral profiles are constructed based on traces collected from two large wireless networks, and their spatio-temporal stability is analyzed. The implicit relationship discovered between mobile users could be utilized to provide a service for message delivery and discovery in various network environments. As an example application, we provide a detailed design of such a service in challenged opportunistic network architecture, named CSI. We provide a fully distributed solution using behavioral profile space gradients and small world structures.
Our analysis shows that user behavioral profiles are surprisingly stable, i.e., the similarity of the behavioral profile of a user to its future behavioral profile is above 0.8 for two days and 0.75 for one week, and remains above 0.6 for five weeks. The correlation coefficient of the similarity metrics between a user pair at different time instants is above 0.7 for four days, 0.62 for a week, and remains above 0.5 for two weeks. Leveraging such a stability in user behaviors, the CSI service achieves delivery rate very close to the delay-optimal strategy (above 94%), with minimal overhead (less than 84% of the optimal). We believe that this new paradigm will act as an enabler of multiple new services in mobile societies, and is potentially applicable in server-based, heterogeneous or infrastructure-less wireless environments.
△ Less
Submitted 7 July, 2008;
originally announced July 2008.
-
Encounter-based worms: Analysis and Defense
Authors:
Sapon Tanachaiwiwat,
Ahmed Helmy
Abstract:
Encounter-based network is a frequently-disconnected wireless ad-hoc network requiring immediate neighbors to store and forward aggregated data for information disseminations. Using traditional approaches such as gateways or firewalls for deterring worm propagation in encounter-based networks is inappropriate. We propose the worm interaction approach that relies upon automated beneficial worm ge…
▽ More
Encounter-based network is a frequently-disconnected wireless ad-hoc network requiring immediate neighbors to store and forward aggregated data for information disseminations. Using traditional approaches such as gateways or firewalls for deterring worm propagation in encounter-based networks is inappropriate. We propose the worm interaction approach that relies upon automated beneficial worm generation aiming to alleviate problems of worm propagations in such networks. To understand the dynamic of worm interactions and its performance, we mathematically model worm interactions based on major worm interaction factors including worm interaction types, network characteristics, and node characteristics using ordinary differential equations and analyze their effects on our proposed metrics. We validate our proposed model using extensive synthetic and trace-driven simulations. We find that, all worm interaction factors significantly affect the pattern of worm propagations. For example, immunization linearly decreases the infection of susceptible nodes while on-off behavior only impacts the duration of infection. Using realistic mobile network measurements, we find that encounters are bursty, multi-group and non-uniform. The trends from the trace-driven simulations are consistent with the model, in general. Immunization and timely deployment seem to be the most effective to counter the worm attacks in such scenarios while cooperation may help in a specific case. These findings provide insight that we hope would aid to develop counter-worm protocols in future encounter-based networks.
△ Less
Submitted 27 June, 2007;
originally announced June 2007.
-
On the Performance Evaluation of Encounter-based Worm Interactions Based on Node Characteristics
Authors:
Sapon Tanachaiwiwat,
Ahmed Helmy
Abstract:
An encounter-based network is a frequently disconnected wireless ad-hoc network requiring nearby neighbors to store and forward data utilizing mobility and encounters over time. Using traditional approaches such as gateways or firewalls for deterring worm propagation in encounter-based networks is inappropriate. Because this type of network is highly dynamic and has no specific boundary, a distr…
▽ More
An encounter-based network is a frequently disconnected wireless ad-hoc network requiring nearby neighbors to store and forward data utilizing mobility and encounters over time. Using traditional approaches such as gateways or firewalls for deterring worm propagation in encounter-based networks is inappropriate. Because this type of network is highly dynamic and has no specific boundary, a distributed counter-worm mechanism is needed. We propose models for the worm interaction approach that relies upon automated beneficial worm generation to alleviate problems of worm propagation in such networks. We study and analyze the impact of key mobile node characteristics including node cooperation, immunization, on-off behavior on the worm propagations and interactions. We validate our proposed model using extensive simulations. We also find that, in addition to immunization, cooperation can reduce the level of worm infection. Furthermore, on-off behavior linearly impacts only timing aspect but not the overall infection. Using realistic mobile network measurements, we find that encounters are non-uniform, the trends are consistent with the model but the magnitudes are drastically different. Immunization seems to be the most effective in such scenarios. These findings provide insight that we hope would aid to develop counter-worm protocols in future encounter-based networks.
△ Less
Submitted 13 June, 2007;
originally announced June 2007.
-
Mining Behavioral Groups in Large Wireless LANs
Authors:
Wei-jen Hsu,
Debojyoti Dutta,
Ahmed Helmy
Abstract:
One vision of future wireless networks is that they will be deeply integrated and embedded in our lives and will involve the use of personalized mobile devices. User behavior in such networks is bound to affect the network performance. It is imperative to study and characterize the fundamental structure of wireless user behavior in order to model, manage, leverage and design efficient mobile net…
▽ More
One vision of future wireless networks is that they will be deeply integrated and embedded in our lives and will involve the use of personalized mobile devices. User behavior in such networks is bound to affect the network performance. It is imperative to study and characterize the fundamental structure of wireless user behavior in order to model, manage, leverage and design efficient mobile networks. It is also important to make such study as realistic as possible, based on extensive measurements collected from existing deployed wireless networks.
In this study, using our systematic TRACE approach, we analyze wireless users' behavioral patterns by extensively mining wireless network logs from two major university campuses. We represent the data using location preference vectors, and utilize unsupervised learning (clustering) to classify trends in user behavior using novel similarity metrics. Matrix decomposition techniques are used to identify (and differentiate between) major patterns. While our findings validate intuitive repetitive behavioral trends and user grou**, it is surprising to find the qualitative commonalities of user behaviors from the two universities. We discover multi-modal user behavior for more than 60% of the users, and there are hundreds of distinct groups with unique behavioral patterns in both campuses. The sizes of the major groups follow a power-law distribution. Our methods and findings provide an essential step towards network management and behavior-aware network protocols and applications, to name a few.
△ Less
Submitted 30 June, 2007; v1 submitted 31 May, 2006;
originally announced June 2006.
-
ATTENTION: ATTackEr traceback using MAC layer abNormality detecTION
Authors:
Yong** Kim,
Ahmed Helmy
Abstract:
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to limited network and host resources. Attacker traceback is a promising solution to take a proper countermeasure near the attack origins, to discourage attackers from launching attacks, and for forensics. However, attacker traceback in Mobile Ad-hoc Networks (MANETs) is a challenging p…
▽ More
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to limited network and host resources. Attacker traceback is a promising solution to take a proper countermeasure near the attack origins, to discourage attackers from launching attacks, and for forensics. However, attacker traceback in Mobile Ad-hoc Networks (MANETs) is a challenging problem due to the dynamic topology, and limited network resources. It is especially difficult to trace back attacker(s) when they are moving to avoid traceback. In this paper, we introduce the ATTENTION protocol framework, which pays special attention to MAC layer abnormal activity under attack. ATTENTION consists of three classes, namely, coarse-grained traceback, fine-grained traceback and spatio-temporal fusion architecture. For energy-efficient attacker searching in MANETs, we also utilize small-world model. Our simulation analysis shows 79% of success rate in DoS attacker traceback with coarse-grained attack signature. In addition, with fine-grained attack signature, it shows 97% of success rate in DoS attacker traceback and 83% of success rate in DDoS attacker traceback. We also show that ATTENTION has robustness against node collusion and mobility.
△ Less
Submitted 2 August, 2005;
originally announced August 2005.
-
IMPACT: Investigation of Mobile-user Patterns Across University Campuses using WLAN Trace Analysis
Authors:
Wei-jen Hsu,
Ahmed Helmy
Abstract:
We conduct the most comprehensive study of WLAN traces to date. Measurements collected from four major university campuses are analyzed with the aim of develo** fundamental understanding of realistic user behavior in wireless networks. Both individual user and inter-node (group) behaviors are investigated and two classes of metrics are devised to capture the underlying structure of such behavi…
▽ More
We conduct the most comprehensive study of WLAN traces to date. Measurements collected from four major university campuses are analyzed with the aim of develo** fundamental understanding of realistic user behavior in wireless networks. Both individual user and inter-node (group) behaviors are investigated and two classes of metrics are devised to capture the underlying structure of such behaviors.
For individual user behavior we observe distinct patterns in which most users are 'on' for a small fraction of the time, the number of access points visited is very small and the overall on-line user mobility is quite low. We clearly identify categories of heavy and light users. In general, users exhibit high degree of similarity over days and weeks.
For group behavior, we define metrics for encounter patterns and friendship. Surprisingly, we find that a user, on average, encounters less than 6% of the network user population within a month, and that encounter and friendship relations are highly asymmetric. We establish that number of encounters follows a biPareto distribution, while friendship indexes follow an exponential distribution. We capture the encounter graph using a small world model, the characteristics of which reach steady state after only one day.
We hope for our study to have a great impact on realistic modeling of network usage and mobility patterns in wireless networks.
△ Less
Submitted 1 August, 2005;
originally announced August 2005.
-
Efficient and Robust Geocasting Protocols for Sensor Networks
Authors:
Karim Seada,
Ahmed Helmy
Abstract:
Geocasting is the delivery of packets to nodes within a certain geographic area. For many applications in wireless ad hoc and sensor networks, geocasting is an important and frequent communication service. The challenging problem in geocasting is distributing the packets to all the nodes within the geocast region with high probability but with low overhead. According to our study we notice a cle…
▽ More
Geocasting is the delivery of packets to nodes within a certain geographic area. For many applications in wireless ad hoc and sensor networks, geocasting is an important and frequent communication service. The challenging problem in geocasting is distributing the packets to all the nodes within the geocast region with high probability but with low overhead. According to our study we notice a clear tradeoff between the proportion of nodes in the geocast region that receive the packet and the overhead incurred by the geocast packet especially at low densities and irregular distributions. We present two novel protocols for geocasting that achieve high delivery rate and low overhead by utilizing the local location information of nodes to combine geographic routing mechanisms with region flooding. We show that the first protocol Geographic-Forwarding-Geocast (GFG) has close-to-minimum overhead in dense networks and that the second protocol Geographic-Forwarding-Perimeter-Geocast (GFPG) provides guaranteed delivery without global flooding or global network information even at low densities and with the existence of region gaps or obstacles. An adaptive version of the second protocol (GFPG*) has the desirable property of perfect delivery at all densities and close-to-minimum overhead at high densities. We evaluate our mechanisms and compare them using simulation to other proposed geocasting mechanisms. The results show the significant improvement in delivery rate (up to 63% higher delivery percentage in low density networks) and reduction in overhead (up to 80% reduction) achieved by our mechanisms. We hope for our protocols to become building block mechanisms for dependable sensor network architectures that require robust efficient geocast services.
△ Less
Submitted 29 April, 2005;
originally announced April 2005.
-
Rendezvous Regions: A Scalable Architecture for Resource Discovery and Service Location in Large-Scale Mobile Networks
Authors:
Karim Seada,
Ahmed Helmy
Abstract:
In large-scale wireless networks such as mobile ad hoc and sensor networks, efficient and robust service discovery and data-access mechanisms are both essential and challenging. Rendezvous-based mechanisms provide a valuable solution for provisioning a wide range of services. In this paper, we describe Rendezvous Regions (RRs) - a novel scalable rendezvous-based architecture for wireless network…
▽ More
In large-scale wireless networks such as mobile ad hoc and sensor networks, efficient and robust service discovery and data-access mechanisms are both essential and challenging. Rendezvous-based mechanisms provide a valuable solution for provisioning a wide range of services. In this paper, we describe Rendezvous Regions (RRs) - a novel scalable rendezvous-based architecture for wireless networks. RR is a general architecture proposed for service location and bootstrap** in ad hoc networks, in addition to data-centric storage, configuration, and task assignment in sensor networks. In RR the network topology is divided into geographical regions, where each region is responsible for a set of keys representing the services or data of interest. Each key is mapped to a region based on a hash-table-like map** scheme. A few elected nodes inside each region are responsible for maintaining the mapped information. The service or data provider stores the information in the corresponding region and the seekers retrieve it from there. We run extensive detailed simulations, and high-level simulations and analysis, to investigate the design space, and study the architecture in various environments including node mobility and failures. We evaluate it against other approaches to identify its merits and limitations. The results show high success rate and low overhead even with dynamics. RR scales to large number of nodes and is highly robust and efficient to node failures. It is also robust to node mobility and location inaccuracy with a significant advantage over point-based rendezvous mechanisms.
△ Less
Submitted 14 April, 2005;
originally announced April 2005.
-
Efficient Micro-Mobility using Intra-domain Multicast-based Mechanisms (M&M)
Authors:
Ahmed Helmy,
Muhammad Jaseemuddin,
Ganesha Bhaskara
Abstract:
One of the most important metrics in the design of IP mobility protocols is the handover performance. The current Mobile IP (MIP) standard has been shown to exhibit poor handover performance. Most other work attempts to modify MIP to slightly improve its efficiency, while others propose complex techniques to replace MIP. Rather than taking these approaches, we instead propose a new architecture…
▽ More
One of the most important metrics in the design of IP mobility protocols is the handover performance. The current Mobile IP (MIP) standard has been shown to exhibit poor handover performance. Most other work attempts to modify MIP to slightly improve its efficiency, while others propose complex techniques to replace MIP. Rather than taking these approaches, we instead propose a new architecture for providing efficient and smooth handover, while being able to co-exist and inter-operate with other technologies. Specifically, we propose an intra-domain multicast-based mobility architecture, where a visiting mobile is assigned a multicast address to use while moving within a domain. Efficient handover is achieved using standard multicast join/prune mechanisms. Two approaches are proposed and contrasted. The first introduces the concept proxy-based mobility, while the other uses algorithmic map** to obtain the multicast address of visiting mobiles. We show that the algorithmic map** approach has several advantages over the proxy approach, and provide mechanisms to support it. Network simulation (using NS-2) is used to evaluate our scheme and compare it to other routing-based micro-mobility schemes - CIP and HAWAII. The proactive handover results show that both M&M and CIP shows low handoff delay and packet reordering depth as compared to HAWAII. The reason for M&M's comparable performance with CIP is that both use bi-cast in proactive handover. The M&M, however, handles multiple border routers in a domain, where CIP fails. We also provide a handover algorithm leveraging the proactive path setup capability of M&M, which is expected to outperform CIP in case of reactive handover.
△ Less
Submitted 16 August, 2002;
originally announced August 2002.
-
Contact-Based Architecture for Resource Discovery (CARD) in Large Scale MANets
Authors:
Saurabh Garg,
Priyatham Pamu,
Nitin Nahata,
Ahmed Helmy
Abstract:
In this paper we propose a novel architecture, CARD, for resource discovery in large scale Mobile Ad hoc Networks (MANets) which, may scale up to thousands of nodes and may span wide geographical regions. Unlike previously proposed schemes, our architecture avoids expensive mechanisms such as global flooding as well as complex coordination between nodes to form a hierarchy. CARD is also independ…
▽ More
In this paper we propose a novel architecture, CARD, for resource discovery in large scale Mobile Ad hoc Networks (MANets) which, may scale up to thousands of nodes and may span wide geographical regions. Unlike previously proposed schemes, our architecture avoids expensive mechanisms such as global flooding as well as complex coordination between nodes to form a hierarchy. CARD is also independent of any external source of information such as GPS. In our architecture nodes within a limited number of hops from each node form the neighborhood of that node. Resources within the neighborhood can be readily accessed with the help of a proactive scheme within the neighborhood. For accessing resources beyond the neighborhood, each node also maintains a few distant nodes called contacts. Contacts help in creating a small world in the network and provide an efficient way to query for resources beyond the neighborhood. As the number of contacts of a node increases, the network view (reachability) of the node increases. Paths to contacts are validated periodically to adapt to mobility. We present mechanisms for contact selection and maintenance that attempt to increase reachability while minimizing overhead. Our simulation results show a clear trade-off between increase in reachability on one hand, and contact selection and maintenance overhead on the other. Our results suggest that CARD can be configured to provide a desirable reachability distribution for different network sizes. Comparisons with other schemes for resource discovery, such as flooding and bordercasting, show our architecture to be much more efficient and scalable.
△ Less
Submitted 16 August, 2002;
originally announced August 2002.
-
The STRESS Method for Boundary-point Performance Analysis of End-to-end Multicast Timer-Suppression Mechanisms
Authors:
Ahmed Helmy,
Sandeep Gupta,
Deborah Estrin
Abstract:
Evaluation of Internet protocols usually uses random scenarios or scenarios based on designers' intuition. Such approach may be useful for average-case analysis but does not cover boundary-point (worst or best-case) scenarios. To synthesize boundary-point scenarios a more systematic approach is needed.In this paper, we present a method for automatic synthesis of worst and best case scenarios for…
▽ More
Evaluation of Internet protocols usually uses random scenarios or scenarios based on designers' intuition. Such approach may be useful for average-case analysis but does not cover boundary-point (worst or best-case) scenarios. To synthesize boundary-point scenarios a more systematic approach is needed.In this paper, we present a method for automatic synthesis of worst and best case scenarios for protocol boundary-point evaluation.
Our method uses a fault-oriented test generation (FOTG) algorithm for searching the protocol and system state space to synthesize these scenarios. The algorithm is based on a global finite state machine (FSM) model. We extend the algorithm with timing semantics to handle end-to-end delays and address performance criteria. We introduce the notion of a virtual LAN to represent delays of the underlying multicast distribution tree. The algorithms used in our method utilize implicit backward search using branch and bound techniques and start from given target events. This aims to reduce the search complexity drastically. As a case study, we use our method to evaluate variants of the timer suppression mechanism, used in various multicast protocols, with respect to two performance criteria: overhead of response messages and response time. Simulation results for reliable multicast protocols show that our method provides a scalable way for synthesizing worst-case scenarios automatically. Results obtained using stress scenarios differ dramatically from those obtained through average-case analyses. We hope for our method to serve as a model for applying systematic scenario generation to other multicast protocols.
△ Less
Submitted 16 August, 2002;
originally announced August 2002.
-
Small Large-Scale Wireless Networks: Mobility-Assisted Resource Discovery
Authors:
Ahmed Helmy
Abstract:
In this study, the concept of small worlds is investigated in the context of large-scale wireless ad hoc and sensor networks. Wireless networks are spatial graphs that are usually much more clustered than random networks and have much higher path length characteristics. We observe that by adding only few random links, path length of wireless networks can be reduced drastically without affecting…
▽ More
In this study, the concept of small worlds is investigated in the context of large-scale wireless ad hoc and sensor networks. Wireless networks are spatial graphs that are usually much more clustered than random networks and have much higher path length characteristics. We observe that by adding only few random links, path length of wireless networks can be reduced drastically without affecting clustering. What is even more interesting is that such links need not be formed randomly but may be confined to a limited number of hops between the connected nodes. This has an important practical implication, as now we can introduce a distributed algorithm in large-scale wireless networks, based on what we call contacts, to improve the performance of resource discovery in such networks, without resorting to global flooding. We propose new contact-based protocols for adding logical short cuts in wireless networks efficiently. The new protocols take advantage of mobility in order to increase reachability of the search. We study the performance of our proposed contact-based architecture, and clarify the context in which large-scale wireless networks can be turned into small world networks.
△ Less
Submitted 17 July, 2002;
originally announced July 2002.
-
Fair Stateless Aggregate Traffic Marking using Active Queue Management Techniques
Authors:
Abhimanyu Das,
Deboyjoti Dutta,
Ahmed Helmy
Abstract:
In heterogeneous networks such as today's Internet, the differentiated services architecture promises to provide QoS guarantees through scalable service differentiation. Traffic marking is an important component of this framework. In this paper, we propose two new aggregate markers that are stateless, scalable and fair. We leverage stateless Active Queue Management (AQM) algorithms to enable fai…
▽ More
In heterogeneous networks such as today's Internet, the differentiated services architecture promises to provide QoS guarantees through scalable service differentiation. Traffic marking is an important component of this framework. In this paper, we propose two new aggregate markers that are stateless, scalable and fair. We leverage stateless Active Queue Management (AQM) algorithms to enable fair and efficient token distribution among individual flows of an aggregate. The first marker, Probabilistic Aggregate Marker (PAM), uses the Token Bucket burst size to probabilistically mark incoming packets to ensure TCP-friendly and proportionally fair marking. The second marker, Stateless Aggregate Fair Marker (F-SAM) approximates fair queueing techniques to isolate flows while marking packets of the aggregate. It distributes tokens evenly among the flows without maintaining per-flow state. Our simulation results show that our marking strategies show upto 30% improvement over other commonly used markers while marking flow aggregates. These improvements are in terms of better average throughput and fairness indices, in scenarios containing heterogeneous traffic consisting of TCP (both long lived elephants and short lived mice) and misbehaving UDP flows. As a bonus, F-SAM helps the mice to win the war against elephants.
△ Less
Submitted 8 April, 2002;
originally announced April 2002.
-
Architectural Framework for Large-Scale Multicast in Mobile Ad Hoc Networks
Authors:
Ahmed Helmy
Abstract:
Emerging ad hoc networks are infrastructure-less networks consisting of wireless devices with various power constraints, capabilities and mobility characteristics. An essential capability in future ad hoc networks is the ability to provide scalable multicast services. This paper presents a novel adaptive architecture to support multicast services in large-scale wide-area ad hoc networks. Existin…
▽ More
Emerging ad hoc networks are infrastructure-less networks consisting of wireless devices with various power constraints, capabilities and mobility characteristics. An essential capability in future ad hoc networks is the ability to provide scalable multicast services. This paper presents a novel adaptive architecture to support multicast services in large-scale wide-area ad hoc networks. Existing works on multicast in ad hoc networks address only small size networks. Our main design goals are scalability, robustness and efficiency. We propose a self-configuring hierarchy extending zone-based routing with the notion of contacts based on the small world graphs phenomenon and new metrics of stability and mobility. We introduce a new geographic-based multicast address allocation scheme coupled with adaptive anycast based on group popularity. Our scheme is the first of its kind and promises efficient and robust operation in the common case. Also, based on the new concept of rendezvous regions, we provide a bootstrap mechanism for the multicast service; a challenge generally ignored in previous work.
△ Less
Submitted 5 September, 2001;
originally announced September 2001.
-
State Analysis and Aggregation Study for Multicast-based Micro Mobility
Authors:
Ahmed Helmy
Abstract:
IP mobility addresses the problem of changing the network point-of-attachment transparently during movement. Mobile IP is the proposed standard by IETF. Several studies, however, have shown that Mobile IP has several drawbacks, such as triangle routing and poor handoff performance. Multicast-based mobility has been proposed as a promising solution to the above problems, incurring less end-to-end…
▽ More
IP mobility addresses the problem of changing the network point-of-attachment transparently during movement. Mobile IP is the proposed standard by IETF. Several studies, however, have shown that Mobile IP has several drawbacks, such as triangle routing and poor handoff performance. Multicast-based mobility has been proposed as a promising solution to the above problems, incurring less end-to-end delays and fast smooth handoff. Nonetheless, such architecture suffers from multicast state scalability problems with the growth in number of mobile nodes. This architecture also requires ubiquitous multicast deployment and more complex security measures. To alleviate these problems, we propose an intra-domain multicast-based mobility solution. A mobility proxy allocates a multicast address for each mobile that moves to its domain. The mobile uses this multicast address within a domain for micro mobility. Also, aggregation is considered to reduce the multicast state. We conduct multicast state analysis to study the efficiency of several aggregation techniques. We use extensive simulation to evaluate our protocol's performance over a variety of real and generated topologies. We take aggregation gain as metric for our evaluation.
Our simulation results show that in general leaky aggregation obtains better gains than perfect aggregation. Also, we notice that aggregation gain increases with the increase in number of visiting mobile nodes and with the decrease in number of mobility proxies within a domain.
△ Less
Submitted 23 May, 2001;
originally announced May 2001.
-
Systematic Testing of Multicast Routing Protocols: Analysis of Forward and Backward Search Techniques
Authors:
Ahmed Helmy,
Deborah Estrin,
Sandeep Gupta
Abstract:
In this paper, we present a new methodology for develo** systematic and automatic test generation algorithms for multipoint protocols. These algorithms attempt to synthesize network topologies and sequences of events that stress the protocol's correctness or performance. This problem can be viewed as a domain-specific search problem that suffers from the state space explosion problem. One goal…
▽ More
In this paper, we present a new methodology for develo** systematic and automatic test generation algorithms for multipoint protocols. These algorithms attempt to synthesize network topologies and sequences of events that stress the protocol's correctness or performance. This problem can be viewed as a domain-specific search problem that suffers from the state space explosion problem. One goal of this work is to circumvent the state space explosion problem utilizing knowledge of network and fault modeling, and multipoint protocols. The two approaches investigated in this study are based on forward and backward search techniques. We use an extended finite state machine (FSM) model of the protocol. The first algorithm uses forward search to perform reduced reachability analysis. Using domain-specific information for multicast routing over LANs, the algorithm complexity is reduced from exponential to polynomial in the number of routers. This approach, however, does not fully automate topology synthesis. The second algorithm, the fault-oriented test generation, uses backward search for topology synthesis and uses backtracking to generate event sequences instead of searching forward from initial states. Using these algorithms, we have conducted studies for correctness of the multicast routing protocol PIM. We propose to extend these algorithms to study end-to-end multipoint protocols using a virtual LAN that represents delays of the underlying multicast distribution tree.
△ Less
Submitted 4 July, 2000;
originally announced July 2000.
-
Systematic Performance Evaluation of Multipoint Protocols
Authors:
Ahmed Helmy,
Sandeep Gupta,
Deborah Estrin,
Alberto Cerpa,
Yan Yu
Abstract:
The advent of multipoint (multicast-based) applications and the growth and complexity of the Internet has complicated network protocol design and evaluation.
In this paper, we present a method for automatic synthesis of worst and best case scenarios for multipoint protocol performance evaluation.
Our method uses a fault-oriented test generation (FOTG) algorithm for searching the protocol and…
▽ More
The advent of multipoint (multicast-based) applications and the growth and complexity of the Internet has complicated network protocol design and evaluation.
In this paper, we present a method for automatic synthesis of worst and best case scenarios for multipoint protocol performance evaluation.
Our method uses a fault-oriented test generation (FOTG) algorithm for searching the protocol and system state space to synthesize these scenarios. The algorithm is based on a global finite state machine (FSM) model. We extend the algorithm with timing semantics to handle end-to-end delays and address performance criteria. We introduce the notion of a virtual LAN to represent delays of the underlying multicast distribution tree.
As a case study, we use our method to evaluate variants of the timer suppression mechanism, used in various multipoint protocols, with respect to two performance criteria: overhead of response messages and response time. Simulation results for reliable multicast protocols show that our method provides a scalable way for synthesizing worst-case scenarios automatically. We expect our method to serve as a model for applying systematic scenario generation to other multipoint protocols.
△ Less
Submitted 17 June, 2000;
originally announced June 2000.
-
Multicast-based Architecture for IP Mobility: Simulation Analysis and Comparison with Basic Mobile IP
Authors:
Ahmed Helmy
Abstract:
With the introduction of a newer generation of wireless devices and technologies, the need for an efficient architecture for IP mobility is becoming more apparent. Several architectures have been proposed to support IP mobility. Most studies, however, show that current architectures, in general, fall short from satisfying the performance requirements for wireless applications, mainly audio. Othe…
▽ More
With the introduction of a newer generation of wireless devices and technologies, the need for an efficient architecture for IP mobility is becoming more apparent. Several architectures have been proposed to support IP mobility. Most studies, however, show that current architectures, in general, fall short from satisfying the performance requirements for wireless applications, mainly audio. Other studies have shown performance improvement by using multicast to reduce latency and packet loss during handoff. In this study, we propose a multicast-based architecture to support IP mobility. We evaluate our approach through simulation, and we compare it to mainstream approaches for IP mobility, mainly, the Mobile IP protocol. Comparison is performed according to the required performance criteria, such as smooth handoff and efficient routing.
Our simulation results show significant improvement for the proposed architecture. On average, basic Mobile IP consumes almost twice as much network bandwidth, and experiences more than twice as much end-to-end and handoff delays, as does our proposed architecture. Furthermore, we propose an extension to Mobile IP to support our architecture with minimal modification.
△ Less
Submitted 10 June, 2000;
originally announced June 2000.