Content Centric Networking in Tactical and Emergency MANETs Soon Y. Oh, Davide Lau, and Mario Gerla Computer Science Department University of California,

Slides:



Advertisements
Similar presentations
Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
Advertisements

1 Mobile IPv6-Based Ad Hoc Networks: Its Development and Application Advisor: Dr. Kai-Wei Ke Speaker: Wei-Ying Huang.
Group #1: Protocols for Wireless Mobile Environments.
Location vs. Identities in Internet Content: Applying Information-Centric Principles in Today’s Networks Instructor: Assoc. Prof. Chung-Horng Lung Group.
802.11a/b/g Networks Herbert Rubens Some slides taken from UIUC Wireless Networking Group.
1 Routing Techniques in Wireless Sensor networks: A Survey.
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Computers Are Your Future © 2008 Prentice-Hall, Inc.
Random Access MAC for Efficient Broadcast Support in Ad Hoc Networks Ken Tang, Mario Gerla Computer Science Department University of California, Los Angeles.
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Communications and Networks Chapter 8.
CSCI 4550/8556 Computer Networks Comer, Chapter 19: Binding Protocol Addresses (ARP)
E-ODMRP: Enhanced ODMRP with Motion Adaptive Refresh Soon Y. Oh, Joon-Sang Park, Mario Gerla Computer Science Dept. UCLA.
MIMO-CAST: A CROSS-LAYER AD HOC MULTICAST PROTOCOL USING MIMO RADIOS Soon Y. Oh*, Mario Gerla*, Pengkai Zhao**, Babak Daneshrad** *Computer Science Dept.,
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
Anonymous Gossip: Improving Multicast Reliability in Mobile Ad-Hoc Networks Ranveer Chandra (joint work with Venugopalan Ramasubramanian and Ken Birman)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 Seminar: Information Management in the Web Gnutella, Freenet and more: an overview of file sharing architectures Thomas Zahn.
7DS: Node Cooperation in Mostly Disconnected Networks Henning Schulzrinne (joint work with Arezu Moghadan, Maria Papadopouli, Suman Srinivasan and Andy.
MAC Reliable Broadcast in Ad Hoc Networks Ken Tang, Mario Gerla University of California, Los Angeles (ktang,
Backbone Support for Host Mobility: A Joint ORBIT/VINI Experiment Jennifer Rexford Princeton University Joint work with the ORBIT team (Rutgers) and Andy.
Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing.
Cellular IP: Proxy Service Reference: “Incorporating proxy services into wide area cellular IP networks”; Zhimei Jiang; Li Fung Chang; Kim, B.J.J.; Leung,
Mobile Ad-hoc Pastry (MADPastry) Niloy Ganguly. Problem of normal DHT in MANET No co-relation between overlay logical hop and physical hop – Low bandwidth,
Mobile IP Performance Issues in Practice. Introduction What is Mobile IP? –Mobile IP is a technology that allows a "mobile node" (MN) to change its point.
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
Ad Hoc Networking via Named Data Michael Meisel, Vasileios Pappas, and Lixia Zhang UCLA, IBM Research MobiArch’10, September 24, Shinhaeng.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Mobile Routing protocols MANET
Scalable Routing Protocols for Mobile Ad Hoc Networks Xiaoyan Hong, Kaixin Xu, and Mario Gerla at UCLA.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
Seung-Hoon Lee, Sewook Jung, Alexander Chang, Dea-Ki Cho, and Mario Gerla Network Research Lab Department of Computer Science University of California,
Today’s Topics Chapter 8: Networks Chapter 8: Networks HTML Introduction HTML Introduction.
1 Distributed Hash Tables (DHTs) Lars Jørgen Lillehovde Jo Grimstad Bang Distributed Hash Tables (DHTs)
Fast Handoff for Seamless wireless mesh Networks Yair Amir, Clauiu Danilov, Michael Hilsdale Mobisys’ Jeon, Seung-woo.
TOMA: A Viable Solution for Large- Scale Multicast Service Support Li Lao, Jun-Hong Cui, and Mario Gerla UCLA and University of Connecticut Networking.
Review of the literature : DMND:Collecting Data from Mobiles Using Named Data Takashima Daiki Park Lab, Waseda University, Japan 1/15.
1 Route Optimization for Large Scale Network Mobility Assisted by BGP Feriel Mimoune, Farid Nait-Abdesselam, Tarik Taleb and Kazuo Hashimoto GLOBECOM 2007.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
#1 EETS 8316/NTU CC725-N/TC/ Routing - Circuit Switching  Telephone switching was hierarchical with only one route possible —Added redundant routes.
DSR: Introduction Reference: D. B. Johnson, D. A. Maltz, Y.-C. Hu, and J. G. Jetcheva, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks,”
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
Internet Architecture and Governance
Outline Introduction Existing solutions for ad hoc
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
Scalable Routing Protocols for
Rate-Based Channel Assignment Algorithm for Multi-Channel Multi- Rate Wireless Mesh Networks Sok-Hyong Kim and Young-Joo Suh Department of Computer Science.
Intro DSR AODV OLSR TRBPF Comp Concl 4/12/03 Jon KolstadAndreas Lundin CS Ad-Hoc Routing in Wireless Mobile Networks DSR AODV OLSR TBRPF.
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
Ασύρματες και Κινητές Επικοινωνίες Ενότητα # 10: Mobile Network Layer: Mobile IP Διδάσκων: Βασίλειος Σύρης Τμήμα: Πληροφορικής.
CS470 Computer Networking Protocols Huiping Guo Department of Computer Science California State University, Los Angeles 4. Internetworking.
Ασύρματες και Κινητές Επικοινωνίες
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
PROWIND (Positioning Relay over Wirelessly Networked Devices) Team Members: Alexander Smithson, Dian Ding, Yeh Cheng Yuan Graduate Advisor: Eric Liao Faculty.
ROUTING TECHNIQUES IN WIRELESS SENSOR NETWORKS: A SURVEY.
1 Along & across algorithm for routing events and queries in wireless sensor networks Tat Wing Chim Department of Electrical and Electronic Engineering.
SOSIMPLE: A Serverless, Standards- based, P2P SIP Communication System David A. Bryan and Bruce B. Lowekamp College of William and Mary Cullen Jennings.
ProbeCast: MANET Admission Control via Probing Soon Y. Oh, Gustavo Marfia, and Mario Gerla Dept. of Computer Science, UCLA Los Angeles, CA 90095, USA {soonoh,
Network Processing Systems Design
Introduction Wireless devices offering IP connectivity
Zueyong Zhu† and J. William Atwood‡
CS4470 Computer Networking Protocols
Introduction to Wireless Sensor Networks
NDN (Named Data Networking)
You Lu, Zhiyang Wang, Yu-Ting Yu, Mario Gerla
Presentation transcript:

Content Centric Networking in Tactical and Emergency MANETs Soon Y. Oh, Davide Lau, and Mario Gerla Computer Science Department University of California, Los Angeles {soonoh, chiume,

Introduction  Infrastructureless nature and quick deployment  a MANET is ideally suited for emergency & tactical operation, but  Challenging environments  Lossy channel and high mobility  Limited resources  Hard to find necessary content  No search engine  Scalable & efficient content search and dissemination in MANETs  Content Centric Networking 2

Content Centric Networking (CCN)  Users are interested in WHAT content – not WHERE it is or WHO has it  Data is addressed by NAME OR CONTENT – rather than by location or IP address  No overhead in binding name to location  Enabled by low storage prices and high speed links Can CCN be directly applied to MANET environment? 3

WiCCN = CCN in MANETs  Advantages  Group based mobility/operation  resource sharing within group  Hierarchical data structure  Information locality (via Cache)  Challenges  Lossy channel and resource shortage  Data Push and Pull is required while Internet CCN is only Pull  Must Push Critical information and operation messages  Security and content authentication  Critical data and wireless broadcast medium 4 Content Centric Networking

WiCCN protocol design goals  Hierarchical storage/search architecture  Topic based data vs spatial/temporal contents  Cross-layer approach  Scalable and resource aware 5

Related Work  TRIAD (2000)  User-friendly, structured, with location-independent names and content addressing (has influenced later protocols)  Data-Oriented (and beyond) Network Architecture (DONA) (2007)  Flat, self-certifying names instead of IP addresses and DNS  Contents is published and registered with a tree of trusted Resolution Handlers (RH)  Routing on Flat Levels (ROFL) (2006)  Semantic-free flat labels; it creates a circular namespace, e.g., DHT  Content Centric Network (CCN) (2009)  Network wide content caching and user-friendly, hierarchical names for routing; Digital signature for security  Named Data Networks (NDN) (2010)  Future Internet Architecture 6

WiCCN Network Model  Group based mobility  Hierarchical topology  Interconnection via gateways  Heterogeneous devices – different capacities 7

WiCCN Content Types  Topic based content  Data files, video and audio clips  Data is stored at publisher (originator) or near backbone nodes and travels anywhere in the network  PULLED by users  No location and time sensitivity  Spatial/temporal content  Situation awareness data; operational messages  Content value is time and location sensitive  PUSHED by publisher towards command center or proper location 8

Local Storage  Content Repository  Intermediate nodes cache content  Maximize the probability of sharing  Meta-Data Registry  Hash table for efficient look up  It is used to forward Interest packet  Meta-Data includes content attributes, e.g., type, time, loc, etc  Interest Table  Stores Interest Query packets  To suppress duplicate Interest packets  To relay content to requestors 9 Content Repository Meta-Data Registry Interest Table

WiCCN Routing  Content Pushing  Spatial/temporal content  Geo-routing to command center or other destination 10

WiCCN Routing (Cont.)  Content Pulling  Using an Interest packet and local storages 11 Content Repository Meta-Data Registry Interest Table Interest 1. Check Content Repository and send data if it exists 2. If there is no content, check Meta-Data Repository 3. If Meta-Data entry exist, a node relays Interest toward data origin 4. Otherwise, Interest is passed to a Gateway toward upper level Interest 5. Interest is relayed

WiCCN Routing (Cont.)  Difference to Internet CCN (due to wireless common medium)  Interest aggregation  Time stagger re-broadcast Interest packets  Upon overhearing the same Interest, cancel the re-broadcast  Data Packet collision avoidance  If more than one neighbors tries to transmit  Exchange Request/Reply  Respond with Reply before transmitting data 12

Packet Collision Avoidance 13 Interest REPLY REQUEST Content

Security and Authentication  Using PKI  A gateway has private key and members in the domain have public keys  A gateway adds digital signature using a private key  Members encrypt packets using the public key  The private and public keys are pre-assigned 14

Implementation  Implement WiCCN on Linux OS  A gateway and members  The gateway floods/updates meta-data  A node sends Interest  Request/Reply- exchange and data transmission  Run simple four node topology  Compare performance with peer-to-peer protocol, e.g., Pastry over OLSR 15

Pastry Overhead  Every 3s new data generated (no real data transmitted)  A gateway floods meta-data  Pastry 378B/s average overhead  Traffic suddenly increases to maintain a P2P ring structure  OLSR traffic in the background 16

WiCCN Overhead  Every 3s new data generated (no data transmission in this experiment)  A gateway floods meta-data  Pastry 72B/s average overhead  Only Meta-Data flooding 17

End-to-End Delay  From node A to node D in the 4 node chain topology  File size 1, 5, 10, 15, 20, 25, 100MB  Pastry and WiCCN experience same delay in peer to peer transmissions 18

End-to-End Delay (Cont.)  From node A to all nodes in the previous 4 node topology  No broadcast; each node requests data at different time  WiCCN presents significant lower delay due to content caching  In Pastry, node A transmits 3 times, but WiCCN node A transmits only once; cached data, at an intermediate node, is transmitted 19

Conclusion  WiCCN performs better than DHT based content sharing  Mainly due to caching  Future work:  Implement on smart phones  Experiment with mobility  Design cache strategies  Bigger testbed/emulator 20

21