CNS: Content-oriented Notification Service for Managing Disasters

CNS: Content-oriented Notification Service
for Managing Disasters
(Extended Materials)
Jiachen Chen∗ , Mayutan Arumaithurai∗ , Xiaoming Fu∗ and K. K. Ramakrishnan†
∗
University of Göttingen, Germany, † University of California, Riverside, U.S.A.
Abstract
Disaster management critically depends on timely and efficient communication. To better deal
with an incident, authorities from different services (e.g., fire, police) and jurisdictions need to work
together in a new dynamically created team, different from their original organizational/administrative hierarchy. Unfortunately, existing solutions (e.g., IP, or traditional telephony) are not wellsuited to deal with such group communication due to the dynamic binding between roles and
individuals, and mobility. A significant burden is placed on administrators to just establish and
maintain necessary channels, distracting them from restoring order. To make things worse, since
senders do not know which individual(s) to send to, information cannot reach the right people,
delaying rescue efforts.
We propose CNS, leveraging the benefits of ICN to provide the essential communication
for efficiently managing disasters. We first design a namespace enabling dynamic creation and
evolution of incident related (sub-)namespaces to represent roles of first responders assigned to
the disaster. This allows first responders to receive the appropriate information on a timely basis,
with senders addressing the recipients based on their roles. Predefined namespace templates for
disaster types minimize management overhead for establishing communication. We also find the
need for a new enhanced forwarding rule to support such a recipient hierarchy.
We have developed a prototype demonstrating feasibility and efficiency. With the help of
large-scale simulations and real-world disaster traces, we compare CNS with an IP-based solution.
CNS can significantly reduce network load and latency in addition to the qualitative benefits of
simplified operations, appropriate prioritization and security.
This material is an extension to the original paper that describes the extended features and
more detailed evaluation preparation and results.
1
Technical Report No. IFI-TB-2015-04, ISSN 1611-1044. – August 18, 2016
Contents
I
Support for IP and MobilityFirst
I-A
CNS over IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
I-B
CNS over Other ICNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3
3
3
II
Detailed Evaluation
II-A
Revisit – London Bombing . . . . . . . . . . . . . .
II-B
Lab Test Bed Evaluation . . . . . . . . . . . . . . .
II-B1
Data Set . . . . . . . . . . . . . . . . . . .
II-B2
Evaluation Results . . . . . . . . . . . . .
II-C
Trace Driven Simulation . . . . . . . . . . . . . . . .
II-C1
Data Set . . . . . . . . . . . . . . . . . . .
II-C2
Communication using Content Hierarchy .
II-C3
Communication using Recipient Hierarchy
4
4
5
5
6
7
7
7
8
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
References
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
8
2
Technical Report No. IFI-TB-2015-04, ISSN 1611-1044. – August 18, 2016
I. Support for IP and MobilityFirst
This section discusses how to deploy CNS over other platforms like IP, NetInf or MobilityFirst. As
we mentioned in the paper, although we use NDN as an example, CNS is an application-layer design
and is able to support different kinds of underlay architectures with proper (minor) adjustments.
A. CNS over IP
The first architecture we are looking at is IP – the most widely deployed architecture nowadays.
As suggested by [1], [2], the ICN can be used as an overlay of IP at the beginning of the deployment
– only the end hosts and some core nodes (e.g., RPs) are ICN nodes. With more users adopt the
ICN semantics, more ICN nodes can be added into the network for efficiency and scalability.
Work in [2] also suggested to use IP multicast to improve the efficiency of one-to-many communication in ICN. It is particularly useful in the communication among the first-responders in a disaster
where most of the traffic is multicast (broadcast among a group of people). The name spaces can
be mapped onto IP multicast addresses (e.g., .../Emergency/AldgateExplosion/FireBrigade 7→
224.0.0.5). By subscribing to proper names (or Content Descriptors, CDs), the application joins
the corresponding multicast groups and the users can get messages accordingly.
The security and the data integrity can be achieved by enforcing rules on the access points.
Since the data packets are signed by the provider using their private keys, and the keys can be
hierarchically verified, the first hop (ICN) routers can decide the priority of a data based on the fact
if the certificate can be rooted back to .../Emergency. On a disaster with infrastructure failure, we
assume that all the routers know how to verify the .../Emergency name space, that is enough to
decide the priority of the messages even when the router is not linked to the backbone. Messages
can also be encrypted using the ABE [3] (where each name space entry can be an attribute) so that
only the certified users can decrypt the messages.
B. CNS over Other ICNs
We also realize that there exist other ICNs like NetInf [4] and MobilityFirst [5]. Of course, we
can try to build an NDN overlay on those architectures similar to IP, but we argue that since
these architectures already separates data/node identity from their locations, we can have a more
light-weight modification to adapt CNS to those architectures.
We suggest to map each node in the name space onto a Globally Unique IDentity (GUID) in
MobilityFirst or a self-certifying name in NetInf. To enable the recipient and content hierarchy (e.g.,
making a call to anyone dealing with the disaster, or sending messages to everyone in the police
team, or listening to an emergency call of Logistics and every sub-topic), we can either use multiple
subscription or have multiple names in the packet.
The multiple subscription solution requires the responders listen to multiple names. E.g., a policeman dealing with triage in Aldgate Bombing need to listen to .../AldgateBombing, .../AldgateBombing/Police and .../AldgateBombing/Police/Triage. When someone sends messages (can
either be Interests or Publications) to everyone dealing with the bombing (.../AldgateBombing)
or everyone in the police team (.../AldgateBombing/Police), he can also receive them.
The multiple names solution requires senders to place more names (or CDs) in the packet header,
but it does not need the listeners listen to multiple names. E.g., a policeman dealing with triage
in Aldgate Bombing only needs to listen to .../AldgateBombing/Police/Triage now, but a commander sending messages to all the policeman dealing with Aldgate Bombing will have to place
.../AldgateBombing/Police, .../AldgateBombing/Police/Triage, .../AldgateBombing/Police/Evacuation, etc. in the header.
Note that the multiple subscription solution will end up having more states (FIB or ST entries) in
the network which might affect the scalability of the architecture, and the multiple names solution
will cause the senders place more names in the data which might affect the convenience of the sender
3
Technical Report No. IFI-TB-2015-04, ISSN 1611-1044. – August 18, 2016
...
Emergency
CasualtyBureau
GovernmentNews
...
FireBrigade
Bishopsgate
SnowHill
Commander
Hospital
...
...
EmergencyCall
London
Police
WoodStreet
...
Regional
Local
Incidents
...
AldgateBombing
Ambulance
Police
Commander
PerimeterEstablishment
FireBrigade
...
Triage
...
Evacuation
CommandPost
Fig. 1: Example of CNS name space.
and cause more traffic in the network. Therefore, we appeal to support hierarchical semantics in the
network architecture to reduce the cost for supporting such systems.
II. Detailed Evaluation
Technical Report No. IFI-TB-2015-04, ISSN 1611-1044. – August 18, 2016
Here, we present both qualitative and quantitative analysis of CNS. To start with, we revisit the
first 30 minutes of the London bombing scenario and present how CNS could have helped to handle
the situation. Then, with the help of a prototype of CNS that we deployed in our lab test bed and a
synthetic data trace, we prove the feasibility of implementing and deploying CNS and the efficiency
of the proposed recipient hierarchy. A real world topology with a real world trace is simulated in
our own simulator (widely used in previous works [2], [6]–[8]) for a comparison between MobileIP [9]
(architecture used nowadays) and CNS.
A. Revisit – London Bombing
Here we provide a more detailed version of dealing with London Bombing (Aldgate Site) using
CNS. The name space is shown in Fig. 1. The event time line is acquired from [10].
• 8:51 First call of 999, incident aware
The civilian dials the emergency number, the application automatically uses name .../Emergency/EmergencyCall. At this time, no one knows what happened exactly, no incident name
space is added. But the emergency center would request the local police to check the site. The
request is sent to name .../London/Police/BTP. (British Transport Police)
• 8:55 BTP officer on scene
• 8:56 Fire Brigade called to a fire and explosion at Aldgate
BTP officer reports back and the incident is confirmed. The incident management center would
receive the report from BTP and instantiate a bomb incident (or explosion incident) with name
AldgateExplosion under Incidents. To avoid name collision, time stamp can be used in the
name (e.g., AldgateExplosion200507070856). The management center would generate keys
and give them to fire department with a call for unit to Aldgate. The messages are sent via
.../London/FireBrigade/Commander.
• 8:57 4 Fire Brigade units deployed
Fire Brigade commander send deploy command and the keys to .../London/FireBrigade/Bishopsgate. These units would listen to .../Incidents/AldgateExplosion/FireBrigade.
4
Technical Report No. IFI-TB-2015-04, ISSN 1611-1044. – August 18, 2016
8:59 Network control center of London Underground asks emergency services to
check Aldgate, Edgware and King’s Cross
The disaster management center creates name spaces for Edgware and King’s Cross (Aldgate
already exists). New deploy commands are sent similar to fire brigade in Bishopsgate.
• 9:01 BTP requested Ambulance to tend to 3-4 walking wounded
BTP officers can report situation directly to the disaster management commander via .../Incidents/Aldgate/Commander. With CNS, since the central controller already knows it is an
explosion (although it might not be aware of a bomb), according to the template, it should
have already dispatched some ambulance units.
• 9:05 London Fire Brigade declared a major incident
The major incident can be declared via .../Emergency/GovernmentNews (to all the civilians),
and via .../AldgateExplosion (to all the officers dealing with the incident).
• 9:07 BTP identified 25 walking wounded, some of whom were badly injured
BTP reports the situation to the incident commander or to the ambulance commander in the
incident. More ambulances can be mobilized.
• 9:07 F London Ambulance Service Emergency Planning Manager advised Central
Ambulance Control to place hospitals on major incident standby, identify safe RP
(Rendezvous Point) in case of CBRN (Chemical, Biological, Radiological or Nuclear)
risk
Nearby hospitals should have been added shortly after the incident name space is created (∼10
minutes ago); The commands will be sent to .../Incidents/Hospitals/Local.
• 9:08 BTP declares a major incident.
With CNS, different departments only need to declare major incident once (as suggested by
[10]), no duplicate declaration needed.
• 9:10 City of London Police recognize explosion caused by a bomb, declare a major
incident.
New status will be reported to the commander. The commander can add extra function names
to the incident based on the bomb incident plan.
• 9:14 F First ambulance arrives at Aldgate. Explosion reported.
Status report sent via .../Incidents/AldgateExplosion/Ambulance.
• 9:19 F BTP formally requested assistance from MPS (Metropolitan Police Service).
MPS belongs to a higher level, in the command chain. They can be reached directly under
.../Emergency or even a name space above based on the real world situation.
• 9:24 F Major incident declared by London Ambulance Service
No duplicate declaration needed with CNS.
We can see that, CNS gives the commanders better flexibility and convenience in the communication. Since all the messages are prioritized (with name prefix .../Emergency), the officers will not
be affected by the large amount of civilian traffic. These benefits can improve the communication
among the officers. Different departments do not need to declare a major incident separately. The
units that are mis-dispatched can be corrected easily. The status exchange can be more efficient and
therefore the top commander can dispatch resources more efficiently according to the severeness of
the situation.
•
B. Lab Test Bed Evaluation
1) Data Set: Our lab test bed comprises of 6 physical machines that are used as routers and are
connected by links with a 100M bps bandwidth and 10ms delay. We use a single server to emulate 63
users and these users can dynamically link (with 50M bps bandwidth and 5ms delay) to any of the
six routers based on their movement pattern. The topology is shown in Fig. 2. The probability of
when they move is based on a uniform distribution of an interval between 2s to 120s. The users form
5
Technical Report No. IFI-TB-2015-04, ISSN 1611-1044. – August 18, 2016
Link Settings
R4
Server
Type
router-router
router-endhost
R1
R3
Bandwidth
100M bps
50M bps
Delay
10ms
5ms
R2
R6
R5
Fig. 2: Lab test bed topology.
3 191
3 207
3
3
3
3 213
3
3
3 221
3 220
Technical Report No. IFI-TB-2015-04, ISSN 1611-1044. – August 18, 2016
3
3
3
3
3
3
3
3
3
3
3
317 325 362 339 332 328 360 292 360 338 338 311 275 319 320 332
10
1
w/o
8
0.8
Recipient
0.6
6
w/o
0.4
4
Recipient
0.2 Report No. IFI-TB-2015-04, ISSN 21611-1044. – August 18, 2016
Technical
0
0
3 9 15 21 27 33 39 45 51 57 63
3 9 15 21 27 33 39 45 51 57 63
3 9 15 21 27 33 39 45 51 57 63
w/o
Recipient
# of Messages (×100)
(a) Aggregate network load
Loss (100pkts)
80
60
40
20
0
Delay (s)
Load (Gb)
Fig. 3: Recipient hierarchy (# of receivers, # of msgs) in lab test bed evaluation.
# of Messages (×100)
(b) Average delay
# of Messages (×100)
(c) Message loss
Fig. 4: Evaluation result of CNS (w/ and w/o recipient hierarchy) in test bed.
a 3-level quad tree recipient hierarchy and each node in the tree has 3 users. The total simulation
duration is 70 minutes including 4,390 reconnections in total. The total # of messages exchanged is
Technical Report No. IFI-TB-2015-04, ISSN
Technical
1611-1044.
Report–No.
August
IFI-TB-2015-04,
18, 2016
ISSN
Technical
1611-1044.
Report– No.
August
IFI-TB-2015-04,
18, 2016
6, 300 and the size of each message ranges from 1-99 packets (1,500 bytes per packet). Each message
is assigned to a user (sender) and each sender can choose to multicast the message either to his
own department (i.e., a node he is listening to) or to a subordinate department (i.e., a child node).
Messages are sent based on a uniform distribution for a total period of 60 minutes (first message
is sent at minute 5). The responsibility hierarchy and the # of messages on each node is shown in
Fig. 3.
2) Evaluation Results: In Fig. 4, we compare the two variants of CNS (with and without recipient
hierarchy) in terms of the total-traffic, # of packet loss and delay for varying # of messages. Our
results show that CNS with recipient hierarchy has:1) lower total traffic since only one copy of the
message is sent from the sender (see Fig. 4a); 2) much lower delay since fewer packets go through
the RP, thereby facing a smaller queuing delay (see Fig. 4b); and 3) lower packet loss rate since the
solution is able to better aggregate the subscriptions (see Fig. 4c). Through the packets captured
by Wireshark, we see that the computation overhead for per-packet forwarding is <2%. The results
show that the recipient hierarchy is a cost-worthy enhancement to ICN. But note that the result
does not mean that content hierarchy is not efficient. The problem appears since we try to support
6
Technical Report No. IFI-TB-2015-04, ISSN 1611-1044. – August 18, 2016
TABLE I: Link bandwidth settings.
Link Type
ISP - ISP
ISP - Domain
ISP - HA/RP
Domain - Router
Router - EndHost
Router - Mobile
Bandwidth
100 M bps
100 M bps
100 M bps
10 M bps
100 M bps
50 M bps
Delay
10 ms
5 ms
10 ms
2 ms
2 ms
5 ms
recipient hierarchy with content-hierarchy logic (it is a mismatch). Both of them are needed in a
complete communication framework.
C. Trace Driven Simulation
Now we simulate CNS with a real-world trace
1) Data Set: We use a real world data set, namely the emergency messages that were sent in the
aftermath of the Haiti earthquake [11], [12]. However, since Haiti’s network topology is not available,
we used San-Francisco’s topology [13].
The topology consists of 232 routers (as shown in Fig. 5a). We distributed these routers into 5
overlapping ISPs, and with each ISP having 5 non-overlapping domains (as shown in Fig. 5). In
the case of MobileIP, we set up one home agent for each ISP at its root node. In the case of CNS,
we have just one RP in the whole network. The link parameters are shown in Table I. We used
relatively low bandwidth links (100M bps per inter-ISP link) since it is just for emergency traffic.
Router processing is set to line speed and Home-Agent processing for redirecting packets is 2ms and
location modification is 5ms. Also note that though the data set is not large, our solution can scale
according to other real world needs.
Haiti’s message data set consisted of only a subset of the actual messages sent, i.e. it had 3,131
messages of the total that were sent in the first month after the earthquake. The time-distribution
of the messages are shown in Fig. 6c. Therefore, in order to scale it up, we used these messages and
squeezed them into a 1 hour trace to emulate the situation of a large number of messages being
sent in the immediate aftermath of a disaster (shown in Fig. 6d). The # of packets (each of 1,500
bytes) per message were obtained by dividing the message size by 50. The messages in the data set
have the latitude and longitude of their origin (shown in Fig. 6a). We mapped these messages into
the San-Francisco map by performing linear transformation and scaling it. The result is shown in
Fig. 6b. Since the dataset is small, we can imagine this to be a small-scale disaster (e.g., highway
bomb). Each emergency message is sent by an end-host linked to the router nearest to the messages’
origin (i.e. based on the message’s latitude and longitude).
The movements of the receivers are based on the San-Francisco cab data trace [14]. The data trace
contains the location of ∼500 cabs recorded periodically in between 2008/05/17 and 2008/06/11.
We assume the cabs have uniform motion between the two records and they will link to the nearest
router in Fig. 5a (note that the routers in the topology have at least 500 meter distance among each
other). Since the reconnection pattern repeats on a daily basis as shown in Fig. 7a, we randomly
picked one day (2008/05/28, Wednesday) as our movement trace. The # of reconnections per minute
is shown in Fig. 7b. We observed that there were 494 cabs in action on this day. Since our message
dataset is compacted to 1 hour, we divided the 1 day cab movement into 24 sub-traces to study the
effects of an emergency (e.g., a bomb detonation) at different time periods to correspond to different
movement patterns and load.
2) Communication using Content Hierarchy: The Haiti message dataset is already separated into
a hierarchy consisting of 8 major categories (e.g., urgencies, urgency logistics, public health, etc.)
7
Technical Report No. IFI-TB-2015-04, ISSN 1611-1044. – August 18, 2016
with each category consisting of several sub-categories. The total # of categories is 36, and each
message can belong to multiple categories. We configure each receiver to listen to 1 category, i.e.
the cabs are seen as first responders moving around to help people and they could receive requests
to answer emergency calls.
We compare CNS to MobileIP (Fig. 8) in terms of the # of message losses, aggregate network
load and latency. Our results illustrate that CNS has a significantly lower loss rate (Fig. 8a), lower
network load (Fig. 8b) and lower delay (Fig. 8c) as compared to MobileIP, regardless of which hour
the disaster occurs. This is due to the fact that MobileIP relies on unicast, which results in more
traffic, longer latency (path stretch), and congestion at the 5 home-agents. Moreover, in the case of
MobileIP, the end-host cannot fetch the content from a neighbour who also received that data. Note
that MobileIP consumes 6 times the network load compared to CNS and causes unacceptable delay
(>200s).
On the other hand, CNS can aggregate the subscriptions, lower the probability of message loss
(when you are near a specialist who is also subscribing to the channel or a upper-level channel, your
subscription can work just within 1 hop) and ensure that there is less congestion on the RP even
though there is only one RP compared to 5 home-agents.
3) Communication using Recipient Hierarchy: Finally, we use the Haiti message dataset as a basis
to emulate the information exchange among the authorities to study the benefits of the proposed
recipient hierarchy as compared to content hierarchy. We build a recipient hierarchy containing 6
levels and assign the messages and cabs into the recipient hierarchy randomly.
In Fig. 9, we compare CNS with vs. without recipient hierarchy using the same metrics that we
used to analyze content hierarchy. We can observe that CNS with recipient hierarchy has a slightly
lower loss rate due to improved aggregation. But more importantly, CNS with recipient hierarchy
outperforms the other variant in terms of aggregate network load (almost half) and latency (by up
to 80%) due to its improved design. Solutions such as those proposed in [2], [7], [8] can be used to
increase the number of RPs and load balance among them in order to handle a larger magnitude
of load, thereby benefitting both the variants. But, in this evaluation, we show the difference in
performance in the presence of just one RP to highlight the benefit of the proposed CNS with
recipient hierarchy. These results also confirm the lab testbed based results shown in § II-B.
References
[1] Van Jacobson, Diana K Smetters, James D Thornton, Michael F Plass, Nicholas H Briggs, and Rebecca L
Braynard. Networking Named Content. In CoNext, 2009.
[2] Jiachen Chen, Mayutan Arumaithurai, Xiaoming Fu, and K. K. Ramakrishnan. Coexist: Integrating Content
Oriented Publish/Subscribe Systems with IP. In ANCS, 2012.
[3] Vipul Goyal, Omkant Pandey, Amit Sahai, and Brent Waters. Attribute-based Encryption for Fine-grained
Access Control of Encrypted Data. In CCS. ACM, 2006.
[4] Bengt Ahlgren, Matteo D’Ambrosio, Marco Marchisio, Ian Marsh, Christian Dannewitz, Börje Ohlman, Kostas
Pentikousis, Ove Strandberg, René Rembarz, and Vinicio Vercellone. Design Considerations for a Network of
Information. In ReArch, 2008.
[5] Arun Venkataramani, James F Kurose, Dipankar Raychaudhuri, Kiran Nagaraja, Morley Mao, and Suman
Banerjee. MobilityFirst: A Mobility-Centric and Trustworthy Internet Architecture. SIGCOMM CCR, pages
74–80, 2014.
[6] Jiachen Chen, Mayutan Arumaithurai, Lei Jiao, Xiaoming Fu, and K. K. Ramakrishnan. COPSS: An Efficient
Content Oriented Pub/Sub System. In ANCS, 2011.
[7] Jiachen Chen, Mayutan Arumaithurai, Xiaoming Fu, and K. K. Ramakrishnan. G-COPSS: A Content Centric
Communica- tion Infrastructure for Gaming. In ICDCS, 2012.
[8] Mayutan Arumaithurai, Jiachen Chen, Edo Monticelli, Xiaoming Fu, and Kadangode K Ramakrishnan.
Exploiting ICN for Flexible Management of Software-Defined Networks. In ICN, 2014.
[9] Charles E Perkins. Mobile IP. Communications Magazine, 35(5):84–99, 1997.
[10] London Assembly, July Review Committee, Richard Barnes, et al. Report of the 7 July review committee. Greater
London Authority, 2006.
[11] Wikipedia. Timeline of relief efforts after the 2010 Haiti earthquake. http://en.wikipedia.org/wiki/Timeline_
of_relief_efforts_after_the_2010_Haiti_earthquake.
8
Technical Report No. IFI-TB-2015-04, ISSN 1611-1044. – August 18, 2016
[12] datahub.
Haiti Crisis Map.
http://datahub.io/dataset/ushahidi/resource/81d058a8-173a-49d9-8ce94edf5e7cafc9.
[13] Feixiong Zhang, Chenren Xu, Yanyong Zhang, K. K. Ramakrishnan, Shreyasee Mukherjee, Roy Yates, and
Thu Nguyen. EdgeBuffer: Caching and Prefetching Content at the Edge in the MobilityFirst Future Internet
Architecture. In WoWMoM, 2015.
[14] Michal Piorkowski, Natasa Sarafijanovic-Djukic, and Matthias Grossglauser. Dataset of Mobility Traces of Taxi
Cabs in San Francisco, USA. http://crawdad.org/epfl/mobility/20090224/, February 2009.
9
Technical Report No. IFI-TB-2015-04, ISSN 1611-1044. – August 18, 2016
ISP1
Dom1
ISP2
ISP3
ISP4
(a) Routers in all ISPs
Dom2
Dom3
Dom4
ISP5
Dom1
Dom5
Dom1
Dom2
Dom3
Dom4
(b) Routers in ISP1
Dom2
Dom3
Dom4
Dom5
Dom5
Technical Report No. IFI-TB-2015-04, ISSN 1611-1044.
Technical
– August
Report
18, 2016
No. IFI-TB-2015-04, ISSN 1611-1044. –
Dom1
(c) Routers in ISP2
Dom2
Dom3
Dom4
Dom5
Dom1
(d) Routers in ISP3
Dom2
Dom3
Dom4
Dom5
Technical Report No. IFI-TB-2015-04, ISSN 1611-1044.
Technical
– August
Report
18, 2016
No. IFI-TB-2015-04, ISSN 1611-1044. –
(e) Routers in ISP4
(f) Routers in ISP5
Fig. 5: San Francisco Router Topology.
10
Technical Report No. IFI-TB-2015-04, ISSN 1611-1044.
Technical
– August
Report
18, 2016
No. IFI-TB-2015-04, ISSN 1611-1044. –
Technical Report No. IFI-TB-2015-04, ISSN 1611-1044. – August 18, 2016
(a) Messages in Haiti (original)
(b) Messages in San Francisco (modified)
1
0.8
0.8
0.6
0.6
CDF
CDF
1
0.4
0.4
Technical Report No. IFI-TB-2015-04, ISSN 1611-1044. – AugustTechnical
18, 2016 Report No. IFI-TB-2015-04, ISSN 1611-10
0.2
0
0.2
0
4
8
12
16
20
24
28
0
32
Days since 2010/01/12
0
10
20
30
40
50
60
Minutes since time 0
(c) Messages in Haiti (original)
(d) Messages in San Francisco (modified)
Fig. 6: Messages transformation Haiti 7→ San Francisco, on space and time.
Technical Report No. IFI-TB-2015-04, ISSN 1611-1044. – August
18, 2016
Technical
Report No. IFI-TB-2015-04, ISSN 1611-104
11
Technical Report No. IFI-TB-2015-04, ISSN 1611-1044. – August 18, 2016
2
11 W
10 T
09 M
08 S
07 S
06 F
05 T
04 W
03 T
02 M
6/01 S
31 S
30 F
29 T
28 W
27 T
26 M
25 S
24 S
23 F
22 T
21 W
18 S
20 T
0
19 M
1
5/17 S
Movements (×1000)
3
Date (M/DD Day)
(a) # of cab reconnections per 10 minutes in the whole data set
Movements (×100)
3
2
1
0
Technical Report No. IFI-TB-2015-04, ISSN 1611-1044. – August 18, 2016
0
1
2
3
4
5
6
7
8
9
10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
Time (hr)
(b) # of cab reconnections per min on 2008/05/28 (Wednesday)
MobileIP
CNS
0
4
8
12
16
Start Hour
(a) Message loss
20
440
231
Technical
1611-1044. – August 18, 2016
430 Report No. IFI-TB-2015-04, ISSN229
MobileIP
MobileIP
227
420
CNS
CNS
80
.049
75
.048
70
.047
0
4
8 12 16 20
0
4
8 12 16 20
Delay (s)
2.5
2
1.5
1
0.5
0
Load (Gb)
Loss (×1000)
Fig. 7: Cab movement data trace.
Start Hour
Start Hour
(b) Aggregate network load
(c) Average delay
Fig. 8: Simulation result of content hierarchy (Note different scale for Load and Delay).
Loss
80
40
0
0
4
416
24
Technical Report No. IFI-TB-2015-04,
Technical
ISSN 1611-1044.
Report–No.
August
IFI-TB-2015-04,
ISSN
Technical
1611-1044.
Report–No.
August
IFI-TB-2015-04,
18, 2016
41418, 2016
w/o
23
412
Recipient
w/o
85
12.5
Recipient
83
11.5
81
8 12 16 20
0
4
8 12 16 20
0
4
8 12 16 20
Recipient
Start Hour
(a) Message loss
Delay (ms)
w/o
120
Load (Gb)
160
Start Hour
(b) Aggregate network load
Start Hour
(c) Average delay
Fig. 9: Simulation result of recipient hierarchy (Note different scale for Load and Delay).
12
TechnicalReport
ReportNo.
No.IFI-TB-2015-04,
IFI-TB-2015-04,
ISSN1611-1044.
1611-1044.
– August
2016 ISSN
Technical
Technical
ISSN
Report –No.
August
IFI-TB-2015-04,
18,18,
2016
1611-1044.
August
18, 2016
Technical
Report–No.
IFI-TB-2015-04,