Skip to main content

Abstract

Socially-aware traffic management utilizes social information to optimize traffic management in the Internet in terms of traffic load, energy consumption, or end user satisfaction. Several use cases can benefit from socially-aware traffic management and the performance of overlay applications can be enhanced. We present existing use cases and their socially-aware approaches and solutions, but also raise discussions on additional benefits from the integration of social information into traffic management as well as practical aspects in this domain.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://foursquare.com

  2. 2.

    http://www.fon.com

  3. 3.

    http://www.boingo.com

  4. 4.

    http://wefi.com

  5. 5.

    https://yourkarma.com

  6. 6.

    The FP7 project SmartenIT (FP7-2012-ICT-317846) “Socially-aware Management of New Overlay Application Traffic combined with Energy Efficiency in the Internet” is running from Nov 2012 to Oct 2015. More information is available at http://www.smartenit.eu

References

  1. Alimi R, Penno R, Yang Y (2013) ALTO protocol. Technical report, Internet engineering task force application-layer traffic optimization working group. http://tools.ietf.org/wg/alto/

  2. Bakshy E, Hofman JM, Mason WA, Watts DJ (2011) Everyone’s an influencer: quantifying influence on Twitter. In: Proceedings of the 4th ACM international conference on web search and data mining (WSDM ’11), New York

    Google Scholar 

  3. Biancani M, Cruschelli P (eds) (2013) Deliverable D1.2 report on cloud service classifications and scenarios, SmartenIT Consortium (European FP7 STREP No. 317846)

    Google Scholar 

  4. Cisco (2012) Cisco visual networking index: forecast and methodology, 2011–2016. Technical report, Cisco

    Google Scholar 

  5. Costa P, Mascolo C, Musolesi M, Picco GP (2008) Socially-aware routing for publish-subscribe in delay-tolerant mobile ad hoc networks. IEEE J Sel Areas Commun 26(5):748–760

    Article  Google Scholar 

  6. Dinh TN, Xuan Y, Thai MT (2009) Towards social-aware routing in dynamic communication networks. In: Proceedings of the 28th IEEE international performance computing and communications conference (IPCCC), Phoenix

    Google Scholar 

  7. Douceur JR (2002) The Sybil attack. In: Peer-to-peer systems. Springer, Berlin/Heidelberg pp 251–260

    Google Scholar 

  8. Fiedler M, Hossfeld T, Tran-Gia P (2010) A generic quantitative relationship between quality of experience and quality of service. IEEE Netw 24(2):36–41

    Article  Google Scholar 

  9. Ganley B (2013) Optimize the virtual desktop experience through strong back-end design. Technical report, Dell Power Solutions. http://i.dell.com/sites/doccontent/business/solutions/power/en/Documents/ps4q13-20130371-ganley.pdf

  10. Gautam N, Petander H, Noel J (2013) A comparison of the cost and energy efficiency of prefetching and streaming of mobile video. In: Proceedings of the 5th workshop on mobile video (MoVid ’13), New York

    Google Scholar 

  11. Hausheer D, Rückert J (eds) (2013) Deliverable D3.1 report on initial system architecture, SmartenIT Consortium (European FP7 STREP No. 317846)

    Google Scholar 

  12. Hoßfeld T, Hausheer D, Hecht F, Lehrieder F, Oechsner S, Papafili I, Racz P, Soursos S, Staehle D, Stamoulis GD, Tran-Gia P, Stiller B (2009) An economic traffic management approach to enable the TripleWin for users, ISPs, and overlay providers. In: Towards the future internet – a European research perspective, Future internet assembly, pp 24–34

    Google Scholar 

  13. Ickin S, Wac K, Fiedler M, Janowski L, Hong JH, Dey AK (2012) Factors influencing quality of experience of commonly used mobile applications. IEEE Commun Mag 50(4):48–56

    Article  Google Scholar 

  14. Kaup F, Hausheer D (2013) Optimizing energy consumption and QoE on mobile devices. In: Proceedings of the IEEE international conference on network protocols (ICNP 2013), Göttingen

    Google Scholar 

  15. Li Z, Shen H, Wang H, Liu G, Li J (2012) SocialTube: P2P-assisted video sharing in online social networks. In: Proceedings of the IEEE INFOCOM, Orlando

    Google Scholar 

  16. Mamatas L, Psaras I, Pavlou G (2010) Incentives and algorithms for broadband access sharing. In: Proceedings of the ACM SIGCOMM workshop on home networks, New Delhi

    Google Scholar 

  17. Mell P, Grance T (2011) The NIST definition of cloud computing. Technical report, Recommendations of the National Institute of Standards and Technology

    Google Scholar 

  18. Nagaraja S (2007) Anonymity in the wild: mixes on unstructured networks. In: Privacy enhancing technologies. Springer, Berlin/Heidelberg, pp 254–271

    Google Scholar 

  19. Ruhela A, Tripathy RM, Triukose S, Ardon S, Bagchi A, Seth A (2011) Towards the use of online social networks for efficient internet content distribution. In: Proceedings of the IEEE 5th international conference on advanced networks and telecommunication systems (ANTS), Bangalore

    Google Scholar 

  20. Sastry N, Crowcroft J, Sollins K (2007) Architecting citywide ubiquitous Wi-Fi access. In: Proceedings of the 6th workshop on hot topics in networks (HotNets), Atlanta

    Google Scholar 

  21. Sastry N, Yoneki E, Crowcroft J (2009) Buzztraq: predicting geographical access patterns of social cascades using social networks. In: Proceedings of the 2nd ACM EuroSys workshop on social network systems (SocialNets), Nuremberg

    Google Scholar 

  22. Scellato S, Mascolo C, Musolesi M, Crowcroft J (2011) Track globally, deliver locally: improving content delivery networks by tracking geographic social cascades. In: Proceedings of the 20th international conference on world wide web (WWW2011), Hyderabad

    Google Scholar 

  23. Seufert M, Burger V, Hoßfeld T (2013) HORST – home router sharing based on trust. In: Proceedings of the workshop on social-aware economic traffic management for overlay and cloud applications (SETM 2013), Zurich

    Google Scholar 

  24. Traverso S, Huguenin K, Triestan I, Erramilli V, Laoutaris N, Papagiannaki K (2012) TailGate: handling long-tail content with a little help from friends. In: Proceedings of the 21st international conference on world wide web (WWW2012), Lyon

    Google Scholar 

  25. Valancius V, Laoutaris N, Massoulié L, Diot C, Rodriguez P (2009) Greening the internet with nano data centers. In: Proceedings of the 5th international conference on emerging networking experiments and technologies (Co-NEXT ’09), Rome

    Google Scholar 

  26. Vidales P, Manecke A, Solarski M (2009) Metropolitan public WiFi access based on broadband sharing. In: Proceedings of the Mexican international conference on computer science (ENC 2009), Mexico City

    Google Scholar 

  27. Wang Z, Sun L, Wu C, Yang S (2012) Guiding internet-scale video service deployment using microblog-based prediction. In: Proceedings of the IEEE INFOCOM, Orlando

    Google Scholar 

  28. Wittie MP, Pejovic V, Deek L, Almeroth KC, Zhao BY (2010) Exploiting locality of interest in online social networks. In: Proceedings of the 6th international conference on emerging networking experiments and technologies (Co-NEXT ’10), Philadelphia

    Google Scholar 

  29. Yoshida H (2011) The differences between tiering and HSM. http://blogs.hds.com/hu/2011/05/the-differences-between-tiering-and-hsm-hierarchical-storage-management.html

  30. Yu H, Kaminsky M, Gibbons PB, Flaxman A (2006) SybilGuard: defending against sybil attacks via social networks. ACM SIGCOMM Comput Commun Rev 36(4):267–278

    Article  Google Scholar 

  31. Zhou F, Zhang L, Franco E, Mislove A, Revis R, Sundaram R (2012) WebCloud: recruiting social network users to assist in content distribution. In: Proceedings of the 11th IEEE international symposium on network computing and applications (NCA), Cambridge

    Google Scholar 

Download references

Acknowledgements

This work was partly funded by Deutsche Forschungsgemeinschaft (DFG) under grants HO 4770/1-1 and TR257/31-1, and in the framework of the EU ICT Project SmartenIT (FP7-2012-ICT-317846). The authors alone are responsible for the content.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Michael Seufert .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Seufert, M., Darzanos, G., Papafili, I., Łapacz, R., Burger, V., Hoßfeld, T. (2014). Socially-Aware Traffic Management. In: Zweig, K., Neuser, W., Pipek, V., Rohde, M., Scholtes, I. (eds) Socioinformatics - The Social Impact of Interactions between Humans and IT. Springer Proceedings in Complexity. Springer, Cham. https://doi.org/10.1007/978-3-319-09378-9_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-09378-9_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-09377-2

  • Online ISBN: 978-3-319-09378-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics