Delegation forwarding

Slides:



Advertisements
Similar presentations
Supporting Cooperative Caching in Disruption Tolerant Networks
Advertisements

An Adaptive Compulsory Protocol for Basic Communication in Ad-hoc Mobile Networks Ioannis Chatzigiannakis Sotiris Nikoletseas April 2002.
Resource Management §A resource can be a logical, such as a shared file, or physical, such as a CPU (a node of the distributed system). One of the functions.
A Mobile Ad hoc Biosensor Network Muzammil KP S7,ECE Govt. Engg. College, Wayanad.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
###-### title - PI - area WiSe (Wireless Sensornets) Laboratory WESTERN MICHIGAN UNIVERSITY WiSe Lab, Western Michigan University, Kalamazoo, MI
Source-Location Privacy Protection in Wireless Sensor Network Presented by: Yufei Xu Xin Wu Da Teng.
1/14 Ad Hoc Networking, Eli M. Gafni and Dimitri P. Bertsekas Distributed Algorithm for Generating Loop-free Routes in Networks With Frequently.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
By Libo Song and David F. Kotz Computer Science,Dartmouth College.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
###-### title - PI - area WiSe (Wireless Sensornet) Laboratory WESTERN MICHIGAN UNIVERSITY WiSe Lab, Western Michigan University, Kalamazoo, MI
Algorithmic Models for Sensor Networks Stefan Schmid and Roger Wattenhofer WPDRTS, Island of Rhodes, Greece, 2006.
Geographic Routing Without Location Information A. Rao, C. Papadimitriou, S. Shenker, and I. Stoica In Proceedings of the 9th Annual international Conference.
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
Wei Gao Joint work with Qinghua Li, Bo Zhao and Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University Multicasting.
© Y. Zhu and Y. University of North Carolina at Charlotte, USA 1 Chapter 1: Social-based Routing Protocols in Opportunistic Networks Ying Zhu and.
Pocket Switched Networks: Real-world Mobility and its Consequences for Opportunistic Forwarding Jon Crowcroft,Pan Hui (Ben) Augustin Chaintreau, James.
CH2 System models.
Wei Gao1 and Qinghua Li2 1The University of Tennessee, Knoxville
+ Mayukha Bairy Disk Intersection graphs and CDS as a backbone in wireless ad hoc networks.
Lab for Advanced Network Design, Evaluation and Research Mobility Profile based Routing Within Intermittently Connected Mobile Ad hoc Networks (ICMAN)
Distributed Maintenance of Cache Freshness in Opportunistic Mobile Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering Pennsylvania.
On Exploiting Transient Contact Patterns for Data Forwarding in Delay Tolerant Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering.
How Small Labels create Big Improvements April Chan-Myung Kim
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
Group 3 Sandeep Chinni Arif Khan Venkat Rajiv. Delay Tolerant Networks Path from source to destination is not present at any single point in time. Combining.
Salah A. Aly,Moustafa Youssef, Hager S. Darwish,Mahmoud Zidan Distributed Flooding-based Storage Algorithms for Large-Scale Wireless Sensor Networks Communications,
Selfishness, Altruism and Message Spreading in Mobile Social Networks September 2012 In-Seok Kang
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
PRoPHET+: An Adaptive PRoPHET- Based Routing Protocol for Opportunistic Network Ting-Kai Huang, Chia-Keng Lee and Ling-Jyh Chen.
A Message Ferrying Approach for Data Delivery in Sparse Mobile Ad Hoc Networks Reporter: Yanlin Peng Wenrui Zhao, Mostafa Ammar, College of Computing,
User-Centric Data Dissemination in Disruption Tolerant Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering Pennsylvania State University.
11/25/2015 Wireless Sensor Networks COE 499 Localization Tarek Sheltami KFUPM CCSE COE 1.
1 Utilizing Shared Vehicle Trajectories for Data Forwarding in Vehicular Networks IEEE INFOCOM MINI-CONFERENCE Fulong Xu, Shuo Gu, Jaehoon Jeong, Yu Gu,
Social-Aware Stateless Forwarding in Pocket Switched Networks Soo-Jin SHIN
On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay-Tolerant Networks 1 Wei Gao Guohong Cao Tom La Porta Jiawei Han Presented.
© SITILabs, University Lusófona, Portugal1 Chapter 2: Social-aware Opportunistic Routing: the New Trend 1 Waldir Moreira, 1 Paulo Mendes 1 SITILabs, University.
Relying on Safe Distance to Achieve Strong Partitionable Group Membership in Ad Hoc Networks Authors: Q. Huang, C. Julien, G. Roman Presented By: Jeff.
Medium Access Control. MAC layer covers three functional areas: reliable data delivery access control security.
Routing Protocols to Maximize Battery Efficiency
Authors: Jiang Xie, Ian F. Akyildiz
The University of Adelaide, School of Computer Science
Delay-Tolerant Networks (DTNs)
CSE 486/586 Distributed Systems Leader Election
Group Multicast Capacity in Large Scale Wireless Networks
Ad-hoc Networks.
PROVEST: Provenance-based Trust Model for Delay Tolerant Networks
Pastry Scalable, decentralized object locations and routing for large p2p systems.
Introduction to Wireless Sensor Networks
Jon Crowcroft Pan Hui Computer Laboratory University of Cambridge
Location Cloaking for Location Safety Protection of Ad Hoc Networks
Internet Networking recitation #4
GeoTORA: A Protocol for Geocasting in Mobile Ad Hoc Networks
Highway Vehicular Delay Tolerant Networks: Information Propagation Speed Properties Emmanuel Baccelli, Philippe Jacquet, Bernard Mans, and Georgios Rodolakis.
Hidden Terminal Decoding and Mesh Network Capacity
Introduction There are many situations in which we might use replicated data Let’s look at another, different one And design a system to work well in that.
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks
Opportunistic Networks: A New Type of Specialized Ad Hoc Networks
Kevin Lee & Adam Piechowicz 10/10/2009
CASE − Cognitive Agents for Social Environments
Data and Computer Communications
Effective Replica Allocation
PRESENTATION COMPUTER NETWORKS
CSE 486/586 Distributed Systems Leader Election
Vocab unit 2 Research.
Changing the paradigm in forwarding : How transform daemons to angels?
Authors: Jinliang Fan and Mostafa H. Ammar
M. Mock and E. Nett and S. Schemmer
Presentation transcript:

Delegation forwarding Vijay Erramilli, and Mark Crovella Dept. of Computer Science Boston UniversityAugustin Chaintreau, and Christophe Diot Thomson Paris Paris, France

Mobile opportunistic networks Mobile opportunistic networks or oppnets are networks which can be used in a case of emergency either in remote places where there is no constant infrastructure or in the case where the emergency caused a local network to crash. Oppnets differ from traditional networks, in which the nodes are all deployed together, with the size of the network and locations of all its nodes pre-designed (at least the initial locations for mobile networks).

Mobile opportunistic networks In oppnets, we first deploy a seed oppnet, which may be viewed as a pretty typical ad hoc network. It self-configures itself, and then works to detect “foreign” devices or systems using all kinds of communication media—including Bluetooth, wired Internet, WiFi, am radio, RFID, satellite, etc. Detected systems are identified and evaluated for their usefulness and dependability as candidate helpers for joining the oppnet. Best candidates are invited into the expanded oppnet.

A candidate can accept or reject the invitation (but in life-or-death situation it might be ordered to join). Upon accepting the invitation, a helper is admitted into the oppnet. The resources of the admitted helper are integrated with the oppnet, and tasks can be offloaded to or distributed amongst this and all other helpers. A decentralized command center— either augmenting human operators or fully autonomous— presides over the operations of the oppnet throughout its life.

Mobile opportunistic networks

Mobile opportunistic networks After the goals of the oppnet have been realized, each helper must be released and restored to the state that is the closest to the state that the oppnet admitted it in, thus minimizing intrusiveness of helper’s participation in oppnet’s tasks. In conclusion - Helpers provide access to communication, sensing, computational, storage and other capabilities that would not be available otherwise. In particular, oppnets can be used as a bridge between disjoint communication systems, and a way to leverage a huge set of “foreign” resources and services.

Forwarding algorithms in oppnets Mobile opportunistic networks are characterized by unpredictable mobility, heterogeneity of contact rates and lack of global information. Successful delivery of messages at low costs and delays in such networks is thus challenging.

Most forwarding algorithms avoid the cost associated with flooding the network by forwarding only to nodes that are likely to be good relays, using a quality metric associated with nodes. However it is non-trivial to decide whether an encountered node is a good relay at the moment of encounter.

Forwarding algorithms in oppnets An important performance metric in such networks is cost, which we define as the total number of message replicas created. Forwarding algorithms can be placed on a spectrum from “epidemic forwarding” which relies on flooding the network with messages to wait-for-destination scheme in which a source node forwards only if it encounters the destination.

While the epidemic forwarding guarantees delivery of the message if a path exists, it comes at a high cost. the wait-for-destination scheme has the least cost but also has a low success rate. Most forwarding algorithms seek to find a middle ground between these two extremes by relying on information that can be learned during contacts.

Many algorithms make use of some kind of forwarding metric Many algorithms make use of some kind of forwarding metric. We refer generically to the value of a node’s metric as its quality. At any contact, a node with a lower quality metric will forward messages to the node with higher quality. Thus hoping to reach a node with better chance of reaching the destination.

Examples of forwarding algorithms FRESH: a node will forward if it encounters another node that has seen the destination more recently Greedy-Total: a node will forward if it encounters nodes with a higher contact rate than itself. SimBet routing: relies on a metric calculated using social analysis techniques.

Delegation forwarding The main idea of delegation forwarding is: assume each node has an associated quality metric. A node will forward a message only if it encounters another node whose quality metric is greater than any seen by the message so far. Note that despite the simplicity of this strategy, it works surprisingly well.

In our simulations we generate messages according to a Poisson process, and messages are transmitted with no transmission lag. Nodes don’t possess any priori knowledge of the number of nodes in the system or knowledge of any properties of the other nodes.

The metrics we are concerned with are: (1) cost, which is the number of replicas per generated message in the network. (2) success rate, which is the fraction of generated messages for which at least one replica is eventually delivered. (3) average delay, which is the average duration between a message’s generation and the first arrival of one of its replicas at the destination.

By “high performance” it mean high success rate and low average delay By “high performance” it mean high success rate and low average delay. Furthermore, we distinguish per-node cost variants: (1) node transmission load, which is the number of message replicas a node has to forward. (2) node memory load, which is the number of message replicas a node has to store in its buffer.

Delegation forwarding – the algorithm Let N1, . . . ,NN be nodes Let M1, . . . ,MM be messages Node Ni has quality Xim and threshold τ im for Mm. INITIALIZE ∀i,m : τim ← Xim On contact between Ni and node Nj : for m in 1, . . . , M do if Mm is currently held by Ni then if τim < xjm then τim ← xjm if Nj does not have Mm then forward Mm from Ni to Nj end if end for

Delegation forwarding – the algorithm Our approach seeks to forward the message only to the highest quality nodes in the system. Conceptually, we would like to create a small number of replica copies, and place them with the nodes which are the very best candidates for eventual delivery to the destination.

The forwarding question in our approach becomes “is Nj among the very highest quality nodes for message m?” The study of delegation forwarding was done on real mobility traces. and delegation forwarding shows performance as good as other schemes at a much lower cost.

PERFORMANCE ON REAL TRACES given realistic contact patterns, delegation forwarding can yield performance comparable to non-delegation approaches. Further, we assess the degree of cost imbalance under delegation forwarding and show that in realistic contact patterns, certain delegation forwarding algorithms show cost imbalance no worse than the best alternatives.

In order to investigate delegation forwarding schemes in realistic settings, we use a diverse collection of empirical data sets: (1) Contact Traces. (2) AP-Based Traces.

(1) Contact Traces: The first group of data sets consists of contact traces between short-range Bluetooth enabled devices carried by individuals in conference environments, specifically Infocom 2006 and Conext 2006. (2) AP-Based Traces: The second group of data sets consists of data: from a university campus WiFi access points and from device – device data on 100 users (sms, bluetooth) and logs from GSM towers.

The experiments The delegation forwarding schemes are compared to well-known algorithms: Epidemic (Flooding): Node Ni forwards Mm to Nj unless Nj already has a replica of Mm. Epidemic forwarding achieves the best possible performance, so this algorithm yields upper bounds on success rate and average delay. However it is also the case that epidemic forwarding will have the highest costs.

Frequency: Node Ni forwards Mm to node Nj if Nj has more total contacts (with all other nodes) than does Ni. This algorithm is destination independent. This is referred to as the greedy-total scheme in. Last Contact: Node Ni forwards Mm to Nj if Nj has contacted any node more recently than has Ni. This algorithm too is destination independent.

The experiments Destination Frequency: Node Ni forwards Mm to Nj if Nj has contacted Mm’s destination more often than has Ni. Destination Last Contact: Node Ni forwards Mm to Nj if Nj has contacted Mm’s destination more recently than has Ni. This algorithm is also known as FRESH.

Spray and Wait (SpWt): Mm’s source initially creates l replicas of Mm. If node Ni has k > 1 replicas of Mm and Nj has no replicas, Ni will forward half its replicas to Nj and keep the other half. If node Ni has just one replica of Mm, it uses the destination last contact rule (described above). we use two variants, having k = 4 and 8.

The experiments SimBet: Node Ni forwards Mm to node Nj if Nj scores higher on the simbet metric. To compute the simbet metric, one views the underlying contact graph as a social encounter graph, and incorporates two social measures (similarity and betweenness) of a node. Only one replica of the message exists in the network.

The delegation schemes we consider are: Delegation Destination Frequency Delegation Destination Last Contact Delegation Frequency Delegation Last Contact each of which is obtained by applying the delegation forwarding strategy to the corresponding algorithm above.

The results

The results

The results

Conclustions Cost Imbalance

Conclustions In the success rate versus cost plots, the best algorithms are those closest to the upper left corner; in the delay versus cost plots the best are in the lower left corner. Our first observation is that usually, one of the delegation algorithms occupies the best position in these plots.

This means two things: first, as expected, delegation forwarding has very low costs – usually the lowest of any algorithm. Second, and more surprisingly, delegation forwarding usually performs about as well as most other forwarding algorithms.

Indeed delegation schemes reduce cost drastically, by as much as 3/4 of the original cost, while maintaining approximately the same success rate with a modest increase in average delay. Taken as a whole accross all these plots, delegation forwarding is clearly the best choice for trading off performance and cost.

The End