Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 1 Ditto : Eavesdropping for the Common Good.

Slides:



Advertisements
Similar presentations
Cross-layer Design in Wireless Mesh Networks Hu Wenjie Computer Network and Protocol Testing Laboratory, Dept. of Computer Science & Technology, Tsinghua.
Advertisements

1 S4: Small State and Small Stretch Routing for Large Wireless Sensor Networks Yun Mao 2, Feng Wang 1, Lili Qiu 1, Simon S. Lam 1, Jonathan M. Smith 2.
Ningning HuCarnegie Mellon University1 Optimizing Network Performance In Replicated Hosting Peter Steenkiste (CMU) with Ningning Hu (CMU), Oliver Spatscheck.
REfactor-ing Content Overhearing to Improve Wireless Performance Shan-Hsiang Shen Aaron Gember Ashok Anand Aditya Akella abc 1d ab 1.
NDN in Local Area Networks Junxiao Shi The University of Arizona
Incentive-Compatible Opportunistic Routing for Wireless Networks Fan Wu, Tingting Chen, Sheng Zhong (SUNY Buffalo) Li Erran Li Li Erran Li (Bell Labs)
802.11a/b/g Networks Herbert Rubens Some slides taken from UIUC Wireless Networking Group.
Suphakit Awiphan, Takeshi Muto, Yu Wang, Zhou Su, Jiro Katto
CacheCast: Eliminating Redundant Link Traffic for Single Source Multiple Destination Transfers Piotr Srebrny, Thomas Plagemann, Vera Goebel Department.
ICDCS’07, Toronto, Canada1 SCAP: Smart Caching in Wireless Access Points to Improve P2P Streaming Enhua Tan 1, Lei Guo 1, Songqing Chen 2, Xiaodong Zhang.
Stony Brook Mesh Router: Architecting a Multi-Radio Multihop Wireless LAN Samir R. Das (Joint work with Vishnu Navda, Mahesh Marina and Anand Kashyap)
Prentice HallHigh Performance TCP/IP Networking, Hassan-Jain Chapter 10 TCP/IP Performance over Asymmetric Networks.
June 3, A New Multipath Routing Protocol for Ad Hoc Wireless Networks Amit Gupta and Amit Vyas.
1 Estimation of Link Interference in Static Multi-hop Wireless Networks Jitendra Padhye, Sharad Agarwal, Venkat Padmanabhan, Lili Qiu, Ananth Rao, Brian.
1 Defragmenting DHT-based Distributed File Systems Jeffrey Pang, Srinivasan Seshan Carnegie Mellon University Phillip B. Gibbons, Michael Kaminsky Intel.
Web Caching Schemes1 A Survey of Web Caching Schemes for the Internet Jia Wang.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
1 A Framework for Lazy Replication in P2P VoD Bin Cheng 1, Lex Stein 2, Hai Jin 1, Zheng Zhang 2 1 Huazhong University of Science & Technology (HUST) 2.
An End-to-End Multipath Smooth Handoff Scheme for Stream Media Yi Pan Meejeong Lee Jaime Bae Kim Tatsuya Suda IEEE Journal On Selected Areas In Communications.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
Performance Enhancement of TFRC in Wireless Ad Hoc Networks Mingzhe Li, Choong-Soo Lee, Emmanuel Agu, Mark Claypool and Bob Kinicki Computer Science Department.
AdHoc Probe: Path Capacity Probing in Wireless Ad Hoc Networks Ling-Jyh Chen, Tony Sun, Guang Yang, M.Y. Sanadidi, Mario Gerla Computer Science Department,
CS335 Networking & Network Administration Tuesday, April 20, 2010.
Comparison of Routing Metrics for a Static Multi-Hop Wireless Network Richard Draves, Jitendra Padhye, Brian Zill Microsoft Research Presented by: Jón.
A Guide to major network components
ExOR: Opportunistic Multi-Hop Routing for Wireless Networks Sigcomm 2005 Sanjit Biswas and Robert Morris MIT Computer Science and Artificial Intelligence.
TCP Behavior across Multihop Wireless Networks and the Wired Internet Kaixin Xu, Sang Bae, Mario Gerla, Sungwook Lee Computer Science Department University.
Midterm Review - Network Layers. Computer 1Computer 2 2.
Spring 2000Nitin BahadurAdvanced Computer Networks A Comparison of Mechanisms for Improving TCP Performance over Wireless Links By: Hari B., Venkata P.
SOAR: Simple Opportunistic Adaptive Routing Protocol for Wireless Mesh Networks Authors: Eric Rozner, Jayesh Seshadri, Yogita Ashok Mehta, Lili Qiu Published:
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Common Devices Used In Computer Networks
On the Scale and Performance of Cooperative Web Proxy Caching University of Washington Alec Wolman, Geoff Voelker, Nitin Sharma, Neal Cardwell, Anna Karlin,
Aadil Zia Khan and Shahab Baqai LUMS School of Science and Engineering QoS Aware Path Selection in Content Centric Networks Fahad R. Dogar Carnegie Mellon.
1 Heterogeneity in Multi-Hop Wireless Networks Nitin H. Vaidya University of Illinois at Urbana-Champaign © 2003 Vaidya.
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
Computer Networks Performance Metrics. Performance Metrics Outline Generic Performance Metrics Network performance Measures Components of Hop and End-to-End.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
Aditya Akella The Performance Benefits of Multihoming Aditya Akella CMU With Bruce Maggs, Srini Seshan, Anees Shaikh and Ramesh Sitaraman.
Network Security Lecture 20 Presented by: Dr. Munam Ali Shah.
Fast Handoff for Seamless wireless mesh Networks Yair Amir, Clauiu Danilov, Michael Hilsdale Mobisys’ Jeon, Seung-woo.
A Measurement Based Memory Performance Evaluation of High Throughput Servers Garba Isa Yau Department of Computer Engineering King Fahd University of Petroleum.
Ditto - A System for Opportunistic Caching in Multi-hop Mesh Networks Fahad Rafique Dogar Joint work with: Amar Phanishayee, Himabindu Pucha, Olatunji.
Kiew-Hong Chua a.k.a Francis Computer Network Presentation 12/5/00.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Fast Crash Recovery in RAMCloud. Motivation The role of DRAM has been increasing – Facebook used 150TB of DRAM For 200TB of disk storage However, there.
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
Networking Fundamentals. Basics Network – collection of nodes and links that cooperate for communication Nodes – computer systems –Internal (routers,
A Low-bandwidth Network File System Athicha Muthitacharoen et al. Presented by Matt Miller September 12, 2002.
PROP: A Scalable and Reliable P2P Assisted Proxy Streaming System Computer Science Department College of William and Mary Lei Guo, Songqing Chen, and Xiaodong.
Networking Named Content Van Jacobson, Diana K. Smetters, James D. Thornton, Michael F. Plass, Nicholas H. Briggs, Rebecca L. Braynard.
Improving Disk Throughput in Data-Intensive Servers Enrique V. Carrera and Ricardo Bianchini Department of Computer Science Rutgers University.
Rate-Based Channel Assignment Algorithm for Multi-Channel Multi- Rate Wireless Mesh Networks Sok-Hyong Kim and Young-Joo Suh Department of Computer Science.
Cross-Layer Approach to Wireless Collisions Dina Katabi.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Distributed Network Coding Based Opportunistic Routing for Multicast Abdallah Khreishah, Issa Khalil, and Jie Wu.
1 11 Distributed Channel Assignment in Multi-Radio Mesh Networks Bong-Jun Ko, Vishal Misra, Jitendra Padhye and Dan Rubenstein Columbia University.
1 UFlood: High-Throughput Wireless Flooding Jayashree Subramanian Collaborators: Robert Morris, Ramakrishna Gummadi, and Hari Balakrishnan.
Optimization Problems in Wireless Coding Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering.
Trading Structure for Randomness in Wireless Opportunistic Routing Szymon Chachulski, Michael Jennings, Sachin Katti and Dina Katabi MIT CSAIL SIGCOMM.
Overview on Web Caching COSC 513 Class Presentation Instructor: Prof. M. Anvari Student name: Wei Wei ID:
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
An Architecture for Internet Data Transfer Niraj Tolia, Michael Kaminsky, David G. Andersen, and Swapnil Patil NSDI ’ Eunsang Cho.
Using Deduplicating Storage for Efficient Disk Image Deployment Xing Lin, Mike Hibler, Eric Eide, Robert Ricci University of Utah.
Web Caching? Web Caching:.
On the Scale and Performance of Cooperative Web Proxy Caching
Transport Layer Unit 5.
A New Multipath Routing Protocol for Ad Hoc Wireless Networks
If You Can’t Beat Them, Augment Them
Presentation transcript:

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 1 Ditto : Eavesdropping for the Common Good in Multi-hop Wireless Networks Amar Phanishayee Fahad Dogar, Himabindu Pucha, Olatunji Ruwase, Dave Andersen Carnegie Mellon University CMU Speaking Skills Talk

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 2 Wireless Networks Wired Link Wireless Router Wireless Link Cable Modem Access-Point Based (Single Wireless Hop)

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 3 No Infrastructure Cost Effective, Greater Coverage Poor throughput Wireless Networks Multi-hop Wireless (Mesh) Networks Gateway

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 4 Hop Count Affects Throughput Pairwise transfers in a 28 node campus testbed More hops  slower transfers (low throughput) Median 3.2Mbps 0.5Mbps 0.2Mbps

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 5 Ditto: Key Contributions Ditto improves throughput by reducing hop count to acquire commonly requested data Caching of overheard data Also cache data on the path of a transfer Application independent caching Ditto improves throughput (on 2 testbeds) Up to 7x better than on-path caching Up to 10x better than no caching

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 6 Caching In Ditto Helps Speed Transfers On-Path + Opportunistic Caching  Ditto Path of the transfer: Alice--A1--A2--Gateway A1 and A2 -- on-path caching A3 -- opportunistic caching A2 A3 Gateway A1 Request Response Cached copy

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 7 Outline Overview Why poor throughput in mesh networks? Ditto’s Design Evaluation Future Work

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 8 Transmit Range: Range in which router’s transmission can be fully decoded Interference Range: Range in which router’s transmission can interfere but may not be fully decoded Interference Interference: Receivers in Interference Range cannot decode simultaneous transmissions

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 9 Avoiding Interference: Don’t Transmit If You Know Others Are Transmitting one at a time avoids interference

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 10 Gateway A3 A1A2 Subsequent Hops Interfere D1’s transmission from A2 to A3 stalled Cause for poor throughput in mesh networks Subsequent Wireless Hops Interfere D1 D2

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 11 Mesh Networks Have Poor Throughput Some links have a high loss rate Subsequent hops interfere with each other More hops  slower transfers (low throughput) Gateway is a bottleneck A1 A2 A3 Gateway

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 12 Outline Overview Why poor throughput in mesh networks? Ditto’s Design Opportunities to improve throughput How does Ditto utilize these opportunities? Evaluation Future Work

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 13 Opportunities To Improve Throughput Locality in access patterns Many clients from different parts of the network request the same data over time e.g. Operating System Updates, Streaming video Wireless routers can overhear other transfers The positive aspect of broadcast Looks like a job for … Opportunistic Caching

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 14 Challenge: Lossy Overhearing Wireless networks have high loss rates Loss recovery: link layer retransmissions Overhearing node also experiences losses Losses independent of that at Receiver Cannot ask for retransmissions Successfully overhearing a large file is unlikely A3 A1 A A1 A2

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 15 Chunk Based Transfers Lossy overhearing  cannot overhear entire file Smaller caching granularity Divide file into smaller chunks (8 – 32 KB) Use chunk as a unit of transfer Ditto uses Data Oriented Transfer (DOT) 1 for chunk based transfers 1 Tolia et al, An Architecture for Internet Data Transfer. NSDI An Architecture for Internet Data Transfer

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 16 A Ditto Transfer chunkID3 chunkID1 chunkID2 foo.txtfoo.txt Cryptographic Hash Chunking App DITTO chunk ids Chunk request DITTO Chunk response request response request response ReceiverSender Ditto Proxy Request – foo.txt Response: chunk ids{1,2,3} chunk ids

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 17 Proxy Serves Chunk Request Directly If Chunk In Local Cache Proxy Chunk Request Chunk Response Cache

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 18 Proxy Routes Request Towards Gateway If Chunk Not In Cache Next-Hop based on routing table information Separate TCP connection on each hop On-Path Caching Proxy Chunk Request Chunk Response Cache Chunk Request Chunk Response GWNext Hop

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 19 Sniffer Module Caches Overheard Chunks Opportunistic Caching Proxy Sniffer Cache Overhear and reassemble streams Identify chunks in streams Handoff entire chunk to proxy for caching

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 20 Outline Overview Why poor throughput in mesh networks? Ditto’s Design Why caching, overhearing? Chunk based transfers and caching How does Ditto overhear and reconstruct chunks? Evaluation Future Work

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 21 Sniffer Module Reassembles Overheard Streams A3 (Overhearing) Path of the transfer: Alice – A1 – A2 … Stream identification & placement within the stream Next Steps: identify chunk A1 A2

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 22 Chunk Identification A3 (Overhearing) Path of the transfer: Alice – A1 – A2 … A1 A2 Chunk Boundaries Look for Ditto header What if there were losses within the overheard chunk? C1

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 23 Optimization: Inter-Stream Chunk Reassembly Look for Ditto header Chunk Boundaries Sniffer identifies the same chunk across streams Correlates and fills in the blanks A1 A2 C1

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 24 Outline Overview Why poor throughput in mesh networks? Ditto’s Design Evaluation Reconstruction Efficiency Transfer Throughput Future Work

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 25 Emulab Indoor Wireless Testbed

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 26 MAP Campus Testbed (Purdue Univ.) Gateway node Indoor/Outdoor Campus-wide Mesh Network

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 27 Experiment Can we overhear complete chunks? Receiver Observer A receiver initiates transfer 1MB file, 8KB chunks Observers report % of chunks reconstructed Receiver reports throughput Caches are cleared & next node becomes a receiver If n nodes in network, [n* (n - 1)] observers in all

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 28 Overhearing Complete Chunks Is Feasible Overhearing Complete Chunks Is Feasible Around 30% of the observers reconstruct at least 50% chunks For any transfer, ~30% of the nodes can overhear a large fraction of the chunks Complete chunks overheard (%)

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 29 Nodes farthest from the gateway & transfer paths overhear nothing Complete chunks overheard (%)

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 30 Gateway

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 31 Nodes closer to the gateway & transfer paths overhear effectively Complete chunks overheard (%)

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 32 Gateway Shield the gateway from becoming a bottleneck

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 33 Factors Affecting Chunk Reconstruction FactorInsight ProximityNodes closer to gateway overhear more chunks. Can shield the gateway from becoming a hotspot. Chunk Size Smaller Chunk Size  Better Reconstruction 8 KB provides good reconstruction efficiency with low overhead.

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 34 Experiment: Throughput Evaluation Receiver Observer Leaf nodes are receivers A receiver initiates transfer reports throughput Next receiver downloads the same file

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 35 Opportunistic Caching >> On-path Caching Receiver On-path Caching Overhearing & Caching

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 36 Throughput Improvement Using Ditto Median Log Scale! ~900 Kbps No Caching

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 37 Throughput Improvement Using Ditto Median Log Scale! ~1200Kbps ~900 Kbps No Caching

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 38 Throughput Improvement Using Ditto Opportunistic caching >> On-path caching > No caching Median Log Scale! ~1200Kbps ~900 Kbps 9000 Kbps No Caching

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 39 Future Work Support for mobility Alternate proxy selection techniques Application specific Ditto gateways

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 40 Conclusion Ditto improves throughput by reducing hop count to acquire commonly requested data Caching of overheard data Also cache data on the path of a transfer Chunk based transfer, inter-stream chunk reconstruction Ditto improves throughput (on 2 testbeds) Up to 7x better than on-path caching Up to 10x better than no caching

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 41 Thank you!

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 42 Extra Slides

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 43 Experimental Setup Mode b RateAuto Other ParametersDefault RoutingStatic OLSR (Setup) Cross TrafficNo Cache EvictionNo File Sizes1MB - 5 MB Chunk Sizes8KB, 16KB, 32KB

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 44 Hop Count Affects Throughput 85% > 1Mbps 35% > 1Mbps 10% > 1Mbps Pairwise transfers in a 28 node campus testbed More hops  slower transfers (low throughput)

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 45 Evaluation Summary Metric/FactorInsight ProximityNodes closer to gateway have a very high reconstruction efficiency. Can shield the gateway from becoming a hotspot. Chunk SizeSmaller the chunk size better the reconstruction efficiency. 8 KB provides good reconstruction efficiency with low overhead. ThroughputUp to an order of magnitude improvement with Ditto. Inter-Stream Reassembly A few opportunities for multiple overhearing; 10% improvement where applicable

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 46 Related Work Hierarchical Caching [Fan98, Das07,..] Caching more effective on lossy wireless links Ditto’s overhearing feature is unique Packet Level Caching [Spring00, Afanasyev08] Ditto is purely opportunistic Ditto exploits similarity at inter-request timescale Making the best of broadcast [MORE, ExOR,..] Largely orthogonal

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 47 Packet Format

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 48 (Chunk) Size Matters Average Reconstruction Effectiveness (% chunks) 8KB 70% of the observers reconstructed at most 50% of total chunks Complete chunks overheard (%)

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 49 (Chunk) Size Matters 32KB 70% of the observers reconstructed at most 10% of total chunks 8KB 70% of the observers reconstructed at most 50% of total chunks Smaller Chunk Size  Better Reconstruction Effectiveness Complete chunks overheard (%)

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 50 Inter-Stream Reassembly Reconstruction Efficiency

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 51 Useless Bytes --- Different Chunk Sizes

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 52 Useless Bytes Reduction Due to Inter- Stream Reassembly

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 53 Rabin Fingerprinting File Data Rabin Fingerprints Given Value - 8 Natural Boundary Hash 1 Hash 2

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 54 Rabin Fingerprinting: Examples of Edits 1. Original File 2. Addition in chunk Changes only one hash 3. Addition creating a new breakpoint 4. Deletion changing size of chunk Figure from “A Low-bandwidth Network File System”

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 55 Does Ditto work with encrypted data? If the data is only meant for one user Then opportunistic caching doesn’t work and it need not work If the data is shared by many users all of them can have a shared key and data can be encrypted using this shared key Convergent Encryption Uses content hash as the encryption key Middle ground between strong encryption and low overheard

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 56

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 57 How much traffic locality is there in mesh network? No accurate estimate as yet! Reasonable to assume that locality is present Similar users in mesh networks --- e.g: software updates, video viewing, DARPA’s military apps Internet access exhibits locality Packet Level (roughly % traffic is redundant) HTTP caching (lower than packet level caching)

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 58 Overhead: Cache Size Practically need some cache eviction policy Cheap Storage -> bigger caches can be maintained Worst case analysis using numbers from Meraki’s mesh deployments 2 Deployments and 10 Meraki minis respectively Assuming a mesh node overhears ALL traffic passing through other mesh nodes Most software updates take place within 24 hours 3 GB cache size is enough to serve software updates

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 59 Overhead Overhead of Sniffer Sniffer overhears at line speed Sniffer runs as a separate process and doesn’t affect performance Didn’t miss a picket at g 54 Mbps transfer We filter out non-Ditto traffic Overhead of Proxying Going up the stack can be costly Separate TCP connection can be beneficial (lower RTT) We observe that things balance out in practice i.e., performance with/without proxying is similar

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 60 FAQ Should one design multi-hop networks with overhearing in mind? Our approach --- No --- we didn’t want the request that doesn’t benefit from caching to suffer Other approach can be adopted based on the goals (for example: goal is to minimize the wired bw used by the gateway) What if routes change? System wouldn’t break But you would have longer/sub-optimal paths (next-hop Ditto proxy remains the same) Recent study(PAM 2007) shows that in mesh networks you only have 1-2 very good paths to the gw, so better route selection can minimize this problem

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 61 FAQ Is Ditto’s evaluation the best-case scenario? Yes, in terms of cache hit No, in terms of request pattern (we consider a random order request pattern) Cost of missing the chunk header? Offline analysis shows that we could’ve constructed approx. 5% more chunks had we received the chunk headers

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 62 FAQ Impact of different things? Multi-Radio: Less interference but still reducing number of transmissions and hence interference is important Different mode (a/g): Opportunistic caching still possible (we tested that on a smaller set of nodes) --- we don’t know how #s will compare to our current eval. Directional antennas: less overhearing -> opportunistic caching less useful Rate selection: we only tried auto-rate, shouldn’t fundamentally change results with other mechanisms Cross Traffic: Reconstruction #s shouldn’t be too different, throughput #s may be lower for all schemes

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 63 FAQ Do we necessarily need Ditto on the server side? No --- we can have an application level proxy at the gateway that translates between the application and Ditto’s chunk based transfer Do we need Ditto on all the nodes? No, some nodes in the mesh could just forward traffic (simple mesh routers) Do we need Ditto on the client? Yes! You can’t skip that.

Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 64 icons