Advertisement

Socially-Aware Traffic Management

  • Michael Seufert
  • George Darzanos
  • Ioanna Papafili
  • Roman Łapacz
  • Valentin Burger
  • Tobias Hoßfeld
Conference paper
Part of the Springer Proceedings in Complexity book series (SPCOM)

Abstract

Socially-aware traffic management utilizes social information to optimize traffic management in the Internet in terms of traffic load, energy consumption, or end user satisfaction. Several use cases can benefit from socially-aware traffic management and the performance of overlay applications can be enhanced. We present existing use cases and their socially-aware approaches and solutions, but also raise discussions on additional benefits from the integration of social information into traffic management as well as practical aspects in this domain.

Keywords

Social Information Cloud Provider Internet Service Provider Traffic Management Proxy Server 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Notes

Acknowledgements

This work was partly funded by Deutsche Forschungsgemeinschaft (DFG) under grants HO 4770/1-1 and TR257/31-1, and in the framework of the EU ICT Project SmartenIT (FP7-2012-ICT-317846). The authors alone are responsible for the content.

References

  1. 1.
    Alimi R, Penno R, Yang Y (2013) ALTO protocol. Technical report, Internet engineering task force application-layer traffic optimization working group. http://tools.ietf.org/wg/alto/
  2. 2.
    Bakshy E, Hofman JM, Mason WA, Watts DJ (2011) Everyone’s an influencer: quantifying influence on Twitter. In: Proceedings of the 4th ACM international conference on web search and data mining (WSDM ’11), New YorkGoogle Scholar
  3. 3.
    Biancani M, Cruschelli P (eds) (2013) Deliverable D1.2 report on cloud service classifications and scenarios, SmartenIT Consortium (European FP7 STREP No. 317846)Google Scholar
  4. 4.
    Cisco (2012) Cisco visual networking index: forecast and methodology, 2011–2016. Technical report, CiscoGoogle Scholar
  5. 5.
    Costa P, Mascolo C, Musolesi M, Picco GP (2008) Socially-aware routing for publish-subscribe in delay-tolerant mobile ad hoc networks. IEEE J Sel Areas Commun 26(5):748–760CrossRefGoogle Scholar
  6. 6.
    Dinh TN, Xuan Y, Thai MT (2009) Towards social-aware routing in dynamic communication networks. In: Proceedings of the 28th IEEE international performance computing and communications conference (IPCCC), PhoenixGoogle Scholar
  7. 7.
    Douceur JR (2002) The Sybil attack. In: Peer-to-peer systems. Springer, Berlin/Heidelberg pp 251–260Google Scholar
  8. 8.
    Fiedler M, Hossfeld T, Tran-Gia P (2010) A generic quantitative relationship between quality of experience and quality of service. IEEE Netw 24(2):36–41CrossRefGoogle Scholar
  9. 9.
    Ganley B (2013) Optimize the virtual desktop experience through strong back-end design. Technical report, Dell Power Solutions. http://i.dell.com/sites/doccontent/business/solutions/power/en/Documents/ps4q13-20130371-ganley.pdf
  10. 10.
    Gautam N, Petander H, Noel J (2013) A comparison of the cost and energy efficiency of prefetching and streaming of mobile video. In: Proceedings of the 5th workshop on mobile video (MoVid ’13), New YorkGoogle Scholar
  11. 11.
    Hausheer D, Rückert J (eds) (2013) Deliverable D3.1 report on initial system architecture, SmartenIT Consortium (European FP7 STREP No. 317846)Google Scholar
  12. 12.
    Hoßfeld T, Hausheer D, Hecht F, Lehrieder F, Oechsner S, Papafili I, Racz P, Soursos S, Staehle D, Stamoulis GD, Tran-Gia P, Stiller B (2009) An economic traffic management approach to enable the TripleWin for users, ISPs, and overlay providers. In: Towards the future internet – a European research perspective, Future internet assembly, pp 24–34Google Scholar
  13. 13.
    Ickin S, Wac K, Fiedler M, Janowski L, Hong JH, Dey AK (2012) Factors influencing quality of experience of commonly used mobile applications. IEEE Commun Mag 50(4):48–56CrossRefGoogle Scholar
  14. 14.
    Kaup F, Hausheer D (2013) Optimizing energy consumption and QoE on mobile devices. In: Proceedings of the IEEE international conference on network protocols (ICNP 2013), GöttingenGoogle Scholar
  15. 15.
    Li Z, Shen H, Wang H, Liu G, Li J (2012) SocialTube: P2P-assisted video sharing in online social networks. In: Proceedings of the IEEE INFOCOM, OrlandoGoogle Scholar
  16. 16.
    Mamatas L, Psaras I, Pavlou G (2010) Incentives and algorithms for broadband access sharing. In: Proceedings of the ACM SIGCOMM workshop on home networks, New DelhiGoogle Scholar
  17. 17.
    Mell P, Grance T (2011) The NIST definition of cloud computing. Technical report, Recommendations of the National Institute of Standards and TechnologyGoogle Scholar
  18. 18.
    Nagaraja S (2007) Anonymity in the wild: mixes on unstructured networks. In: Privacy enhancing technologies. Springer, Berlin/Heidelberg, pp 254–271Google Scholar
  19. 19.
    Ruhela A, Tripathy RM, Triukose S, Ardon S, Bagchi A, Seth A (2011) Towards the use of online social networks for efficient internet content distribution. In: Proceedings of the IEEE 5th international conference on advanced networks and telecommunication systems (ANTS), BangaloreGoogle Scholar
  20. 20.
    Sastry N, Crowcroft J, Sollins K (2007) Architecting citywide ubiquitous Wi-Fi access. In: Proceedings of the 6th workshop on hot topics in networks (HotNets), AtlantaGoogle Scholar
  21. 21.
    Sastry N, Yoneki E, Crowcroft J (2009) Buzztraq: predicting geographical access patterns of social cascades using social networks. In: Proceedings of the 2nd ACM EuroSys workshop on social network systems (SocialNets), NurembergGoogle Scholar
  22. 22.
    Scellato S, Mascolo C, Musolesi M, Crowcroft J (2011) Track globally, deliver locally: improving content delivery networks by tracking geographic social cascades. In: Proceedings of the 20th international conference on world wide web (WWW2011), HyderabadGoogle Scholar
  23. 23.
    Seufert M, Burger V, Hoßfeld T (2013) HORST – home router sharing based on trust. In: Proceedings of the workshop on social-aware economic traffic management for overlay and cloud applications (SETM 2013), ZurichGoogle Scholar
  24. 24.
    Traverso S, Huguenin K, Triestan I, Erramilli V, Laoutaris N, Papagiannaki K (2012) TailGate: handling long-tail content with a little help from friends. In: Proceedings of the 21st international conference on world wide web (WWW2012), LyonGoogle Scholar
  25. 25.
    Valancius V, Laoutaris N, Massoulié L, Diot C, Rodriguez P (2009) Greening the internet with nano data centers. In: Proceedings of the 5th international conference on emerging networking experiments and technologies (Co-NEXT ’09), RomeGoogle Scholar
  26. 26.
    Vidales P, Manecke A, Solarski M (2009) Metropolitan public WiFi access based on broadband sharing. In: Proceedings of the Mexican international conference on computer science (ENC 2009), Mexico CityGoogle Scholar
  27. 27.
    Wang Z, Sun L, Wu C, Yang S (2012) Guiding internet-scale video service deployment using microblog-based prediction. In: Proceedings of the IEEE INFOCOM, OrlandoGoogle Scholar
  28. 28.
    Wittie MP, Pejovic V, Deek L, Almeroth KC, Zhao BY (2010) Exploiting locality of interest in online social networks. In: Proceedings of the 6th international conference on emerging networking experiments and technologies (Co-NEXT ’10), PhiladelphiaGoogle Scholar
  29. 29.
  30. 30.
    Yu H, Kaminsky M, Gibbons PB, Flaxman A (2006) SybilGuard: defending against sybil attacks via social networks. ACM SIGCOMM Comput Commun Rev 36(4):267–278CrossRefGoogle Scholar
  31. 31.
    Zhou F, Zhang L, Franco E, Mislove A, Revis R, Sundaram R (2012) WebCloud: recruiting social network users to assist in content distribution. In: Proceedings of the 11th IEEE international symposium on network computing and applications (NCA), CambridgeGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Michael Seufert
    • 1
  • George Darzanos
    • 2
  • Ioanna Papafili
    • 2
  • Roman Łapacz
    • 3
  • Valentin Burger
    • 1
  • Tobias Hoßfeld
    • 1
  1. 1.Institute of Computer ScienceUniversity of WürzburgWürzburgGermany
  2. 2.Department of InformaticsAthens University of Economics and BusinessAthensGreece
  3. 3.Poznań Supercomputing and Networking CenterInstitute of Bioorganic Chemistry of the Polish Academy of SciencesPoznańPoland

Personalised recommendations