CHANTS 2012

Technical Program

Program in PDF.

8:30 - WELCOME from TPC co-Chairs
Eiko Yoneki (University of Cambridge) and Robin Hillary Kravets (University of Illinois, Urbana-Champaign) 

8:50 - 9:50 KEYNOTE

Title: A Random Walk on Challenged Networks (slides)

Speaker: Dr. Pan Hui (Telekom Innovation Laboratories/Aalto University)

Abstract: In this talk, I am aiming to cover several important aspects of challenged networks. Mobility is a double-edge sword; it creates disruption and disconnection in the network, but at the same time potentially increases the capacity of the network.  Understanding mobility is a key to challenged networks research. I will first introduce several mobility experiments using mobile devices and illustrate several observed properties regarding contact patterns and social behavior, which are shown to have high impact on forwarding protocol performance. Second , I will highlight how planet-scale public web camera and public transportation system equipped with GPS devices can be exploited to explore mobility and dynamics of global cities. On the other hand, the feasibility of challenged networks largely rely on the willingness of potential relays to forward information for others, and for that matter, altruism is an important factor. Third, I will outline an experiment for measuring the altruism level of mobile users, discuss the challenges, and show some results regarding the impact of battery level, social ties, and mood.  A large scale and realistic testbed is essential for performance evaluation of challenged networks. Fourth, I will introduce TUNIE, a challenged network testbed that use visualization technology to emulate thousands of wireless nodes on a server with realistic wireless settings. In future, we plan to make this platform publicly available for challenged networks evaluation by the research community.  Killer applications are the key to put theory into reality and to ensure the sustainability of the research field. I will select several potential examples, which include using challenged networks for cellular traffic offloading, privacy-preserved adverts, and anonymous communication in the presence of adversary authorities. Finally, I believe an understanding of the underlying real environment and the need of local people is very important for researchers to tackle the real problem.  In this regard, I will share my experience on deploying challenged networks into several rural areas in the past 4 years, including the Swedish Lapland, India Himalaya, Brazilian Amazon, and Swiss Alps.  

 Biography:   Dr. Pan HUI is a senior research scientist at Telekom Innovation Laboratories (T-labs) Germany, and an adjunct Professor of social computing and networking at Aalto University (Helsinki University of Technology) Finland. He received his PhD from Computer Laboratory, University of Cambridge. During his PhD, he was also an affiliated researcher with Intel Research Cambridge. His current research interests include challenged networks, social networking and computing, cloud computing, mobile and pervasive systems, and the application of complex network science in communication systems design. Dr. Hui has around 100 publications and has accumulated more than 3,000 citations. He has founded and chaired several IEEE/ACM conferences/workshops mainly in the area of challenged networks, and served on the technical program committee of numerous international conferences and workshops including IEEE Infocom, SECON, MASS and Globecom. Dr. Hui also has several granted and pending European patents. Apart from research, he enjoys adventure in challenged environments and bringing technology to rural communities, for example he did a 4,000km bicycle trip across Tibet in 2002 and has co-organized 4 editions of ExtremeCom conferences. More information about his profile and his research work can be found at http://www.deutsche-telekom-laboratoriesde/~panhui/

Technical Sessions:

10:00 - 11:00 - SESSION 1. Managing Disruption, Disconnectivity and Delay
Session Chair: Eiko Yoneki (University of Cambridge)
(2 x 25 mn/talk)

Time-Reference Distribution in Delay Tolerant Networks 
Johannes Morgenroth and Lars Wolf (IBR, TU Braunschweig)

Free-Riding the BitTorrent DHT to Improve DTN Connectivity 
Sebastian Schildt, Till Lorentzen, Johannes Morgenroth, Wolf-Bastian Pottner, and Lars Wolf (TU Braunschweig) 

11:00 - 11:30 - COFFEE BREAK


11:30 - 13:00: SESSION 2. Being Opportunistic
Session Chair: Robin Hillary Kravets (University of Illinois, Urbana-Champaign) 
(3 x 25 mn/talk, 1 x 15 mn/talk)

MADServer: An Architecture for Opportunistic Mobile Advanced Delivery 
Agoston Petz (The University of Texas at Austin), Anders Lindgren (Swedish Institute of Computer Science), Pan Hui (Deutsche Telekom Labs), and Christine Julien (The University of Texas at Austin)

Loading Zones: Leveraging Street Parking to Enable Vehicular Internet Access
Riccardo Crepaldi, Ryan Beavers, Braden Ehrat, Jason Sze, Matt Jaeger, Steven Biersteker, and Robin Kravets (University of Illinois)

Enabling Ad-hoc-Style Communication in Public WLAN Hot-Spots  
Teemu Karkkainen, Mikko Pitkanen, and Joerg Ott (Aalto University)

Performance Evaluation of DTN Implementations on a Large-scale Network Emulation Testbed (Short Paper)
Razvan Beuran and Shinsuke Miwa (National Institute of Information and Communications Technology) and Yoichi Shinoda (Japan Advanced Institute of Science and Technology)

13:00 - 14:30 - LUNCH

14:30 - 15:20 - SESSION 3. Space and Null Space
Session Chair: Anders Lindgren (SICS)
(2 x 25 mn/talk)

A Secure Content Network in Space 
Craig Partridge, Robert Walsh, Matthew Gillen, Greg Lauer, John Lowry, W. Timothy Strayer, Derrick Kong, David Levin, and Joe Loyall (Raytheon BBN Technologies) and Michael Paulitsch (EADS)

Nullspace-based Stopping Conditions for Network-Coded Transmissions in DTNs 
Angela Hennessy (The Laboratory for Telecommunications Sciences), Alex Gladd (BBN Technologies), and Brenton Walker (The Laboratory for Telecommunications Sciences)

15:20 - 16:30 - DEMO and POSTER SESSION
1 min of elevator pitch for each Demo/Poster.

(16:00 - 16:30 - COFFEE BREAK)

16:30 - 17:25 - SESSION 4. Evaluating It All
Session Chair: Milena Radenkovic (University of Nottingham)
(1 x 25mn/talk + 2 x 15 mn/talk)

An Analysis of Evaluation Practices for DTN Routing Protocols 
Samo Grasic (Lulea University of Technology) and Anders Lindgren (SICS)

Flow Control Mechanisms for the Bundle Protocol in IEEE 802.15.4 Low-power Networks (Short Paper)
Wolf-Bastian Pottner and Lars C. Wolf (IBR, TU Braunschweig)

Adaptive Usage of Cellular and WiFi Bandwidth: An Optimal Scheduling Formulation  (Short Paper)
Ozlem Bilgir Yetim and Margaret Martonosi (Princeton University)

17:30-17:50 - Best Paper Award Announcement!

                         Discussion and Closing

 

DEMOS

Pocket Backup Storage System with Cloud
Karthik Nilakant and Eiko Yoneki (University of Cambridge)

A Performance Comparison of DTN Bundle Protocol Implementations on Resource Constrained Nodes 
Gleneesha M. Johnson Williams, Angela Hennessy, and Brenton Walker (LTS)

Adaptive User Anonymity for Mobile Opportunistic Networks 
Milena Radenkovic (University of Nottingham) and Ivan Vaghi (Early Morning)

SCAMPI Application Platform 
Teemu Karkkainen and Mikko Pitkanen (Aalto University), Paul Houghton (Futurice), and Joerg Ott (Aalto University)

Is It Worth Taking A Planned Approach To Design Ad Hoc Infrastructure For Post Disaster Communication? 
Sujoy Saha, V. K. Shah, and Rohit Verma (National Institute of Technology Durgapur,India), Ratna Mandal (west Bengal University of Technology,India), and Subrata Nandi (National Institute of Technology Durgapur,India)

POSTERS

Supporting Sensing Application in Vehicular Networks 
Mohammad Nozari Zarmehri and Ana Aguiar (Faculty of Engineering of University of Porto, Institute of Telecommunications)

Adaptive User Anonymity for Mobile Social Networks 
Milena Radenkovic (University of Nottingham) and Ivan Vaghi (Early Morning)