A Location Service for Beacon Vector Routing Chris Baker, Daekyeong Moon, Jorge Ortiz.

Slides:



Advertisements
Similar presentations
Investigating Distributed Caching Mechanisms for Hadoop Gurmeet Singh Puneet Chandra Rashid Tahir.
Advertisements

ECE /24/2005 A Survey on Position-Based Routing in Mobile Ad-Hoc Networks Alok Sabherwal.
1 S4: Small State and Small Stretch Routing for Large Wireless Sensor Networks Yun Mao 2, Feng Wang 1, Lili Qiu 1, Simon S. Lam 1, Jonathan M. Smith 2.
Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets R. Fonseca, Berkeley; S. Ratnasamy, Intel Research; J. Zhao, ICI; C. T. Ee,
1 Traffic Engineering (TE). 2 Network Congestion Causes of congestion –Lack of network resources –Uneven distribution of traffic caused by current dynamic.
Small-world Overlay P2P Network
Distributed Systems Fall 2010 Replication Fall 20105DV0203 Outline Group communication Fault-tolerant services –Passive and active replication Highly.
Mohamed Hefeeda 1 School of Computing Science Simon Fraser University, Canada Multimedia Streaming in Dynamic Peer-to-Peer Systems and Mobile Wireless.
Progress Report Wireless Routing By Edward Mulimba.
IPSN/SPOTS 2007 Beacon Location Service A Location Service for Point-to-Point Routing in Wireless Sensor Networks EECS Department University of California,
1 Internet Networking Spring 2004 Tutorial 13 LSNAT - Load Sharing NAT (RFC 2391)
Beacon Vector Routing: towards scalable routing for sensor networks NEST Retreat, January 2004 Rodrigo Fonseca joint work with Sylvia Ratnasamy, Ion Stoica,
Receiver Based Forwarding for Wireless Sensor Networks Rodrigo Fonseca OASIS Retreat January 2005 Joint work with Ana Sanz Merino, Ion Stoica.
10/31/2007cs6221 Internet Indirection Infrastructure ( i3 ) Paper By Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Sharma Sonesh Sharma.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
An Algebraic Approach to Practical and Scalable Overlay Network Monitoring Yan Chen, David Bindel, Hanhee Song, Randy H. Katz Presented by Mahesh Balakrishnan.
Internet Indirection Infrastructure Ion Stoica UC Berkeley.
ICNP'061 Benefit-based Data Caching in Ad Hoc Networks Bin Tang, Himanshu Gupta and Samir Das Computer Science Department Stony Brook University.
A Survey of Wireless Sensor Network Data Collection Schemes by Brett Wilson.
Distributed Systems Fall 2009 Replication Fall 20095DV0203 Outline Group communication Fault-tolerant services –Passive and active replication Highly.
Matnet – Matlab Network Simulator for TinyOS Alec WooTerence Tong July 31 st, 2002.
Virtual Topology Adaptation in WDM Mesh Networks (for ECS 259: A. Gencata and B. Mukherjee, UC Davis) 1 Virtual Topology  Wavelength routed network 
Intradomain Anycast for Content Centric Networks.
Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets.
TOSSIM: Visualizing the Real World Philip Levis, Nelson Lee, Dennis Chi and David Culler UC Berkeley NEST Retreat, January 2003.
Power saving technique for multi-hop ad hoc wireless networks.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #12 LSNAT - Load Sharing NAT (RFC 2391)
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
1 Minimization of Network Power Consumption with Redundancy Elimination T. Khoa Phan* Joint work with: Frédéric Giroire*, Joanna Moulierac* and Frédéric.
MATE: MPLS Adaptive Traffic Engineering Anwar Elwalid, et. al. IEEE INFOCOM 2001.
Roadmap-Based End-to-End Traffic Engineering for Multi-hop Wireless Networks Mustafa O. Kilavuz Ahmet Soran Murat Yuksel University of Nevada Reno.
Reliable, Robust Data Collection in Sensor Networks Murali Rangan Russell Sears Fall 2005 – Sensornet.
INTRA- AND INTERDOMAIN ROUTING Routing inside an autonomous system is referred to as intradomain routing. Routing between autonomous systems is.
Designing a DHT for low latency and high throughput Robert Vollmann P2P Information Systems.
Ad Hoc Networking via Named Data Michael Meisel, Vasileios Pappas, and Lixia Zhang UCLA, IBM Research MobiArch’10, September 24, Shinhaeng.
Multi-level Hashing for Peer-to-Peer System in Wireless Ad Hoc Environment Dewan Tanvir Ahmed and Shervin Shirmohammadi Distributed & Collaborative Virtual.
Project #2 Mobile Multiplayer Game: Tic-Tac-Toe Project #3 TinyOS Sensing Application EE194WIR Matt Magpayo
Security for the Optimized Link- State Routing Protocol for Wireless Ad Hoc Networks Stephen Asherson Computer Science MSc Student DNA Lab 1.
Power Save Mechanisms for Multi-Hop Wireless Networks Matthew J. Miller and Nitin H. Vaidya University of Illinois at Urbana-Champaign BROADNETS October.
Logical Topology Design
Web Cache Redirection using a Layer-4 switch: Architecture, issues, tradeoffs, and trends Shirish Sathaye Vice-President of Engineering.
EBAS: An Energy-Efficient Event Boundary Approximated Suppression Algorithm in Wireless Sensor Networks Longjiang Guo Heilongjiang University
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
College of Engineering Grid-based Coordinated Routing in Wireless Sensor Networks Uttara Sawant Major Advisor : Dr. Robert Akl Department of Computer Science.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
Energy-Efficient Shortest Path Self-Stabilizing Multicast Protocol for Mobile Ad Hoc Networks Ganesh Sridharan
Lecture 12 Distributed Hash Tables CPE 401/601 Computer Network Systems slides are modified from Jennifer Rexford.
ICS 156: Networking Lab Magda El Zarki Professor, ICS UC, Irvine.
Location aware CHORD Ashwin, Vivek, Manu CS-7460 Project Presentation.
Plethora: Infrastructure and System Design. Introduction Peer-to-Peer (P2P) networks: –Self-organizing distributed systems –Nodes receive and provide.
1 Presented by Jing Sun Computer Science and Engineering Department University of Conneticut.
CS 6401 Overlay Networks Outline Overlay networks overview Routing overlays Resilient Overlay Networks Content Distribution Networks.
Localized Low-Power Topology Control Algorithms in IEEE based Sensor Networks Jian Ma *, Min Gao *, Qian Zhang +, L. M. Ni *, and Wenwu Zhu +
Active Message Application: CONNECT Presented by Xiaozhou David Zhu Oommen Regi July 6, 2001.
DECOR: A Distributed Coordinated Resource Monitoring System Shan-Hsiang Shen Aditya Akella.
On the Placement of Web Server Replicas Yu Cai. Paper On the Placement of Web Server Replicas Lili Qiu, Venkata N. Padmanabhan, Geoffrey M. Voelker Infocom.
Virtual-Topology Adaptation for WDM Mesh Networks Under Dynamic Traffic.
Why does it need? [USN] ( 주 ) 한백전자 Background Wireless Sensor Network (WSN)  Relationship between Sensor and WSN Individual sensors are very limited.
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
Constraint-Based Routing
Net 435: Wireless sensor network (WSN)
On-Time Network On-chip
StatSense In-Network Probabilistic Inference over Sensor Networks
Intra-Domain Routing Jacob Strauss September 14, 2006.
Plethora: Infrastructure and System Design
ECE 544 Protocol Design Project 2016
The Active Node Transfer System By Chris McAnally & Manu Mittal
Improving Routing & Network Performances using Quality of Nodes
Ch 17 - Binding Protocol Addresses
Naval Research Laboratory Dynamic Backbone Subnets
Presentation transcript:

A Location Service for Beacon Vector Routing Chris Baker, Daekyeong Moon, Jorge Ortiz

Motivation and Problem Formulation  Beacon Vector Routing (BVR)  Point-to-point routing scheme  Dynamic beacon-derived coordinate system  Each node in network has an associated node id and a runtime-derived coordinate  Assumptions  Node id’s are unique and unchanging  Beacon Vector Coordinates are subject to change with topology of the network  Current BVR  sends [node_id, BVCoords] mapping through Ethernet backchannel

Key Solution Ideas  Distributed Cache/Lookup Scheme  Consistent hashing to spread the lookup-request load amongst beacons  Cache entry replacement  Explore cache size and replacement schemes to minimize packets moving through network and balance with system constraints (i.e. memory size, power, etc)  Eavesdropping scheme  Nodes eavesdrop packets on route to beacons and cache beacon responses  Nodes respond to beacon request to shorten response time and decrease network traffic

Current Status and Future Plans  Currently implemented/tested:  Initial version of BVR Location Service modules in place (no local caching)  Cache modules in progress  Code tested in TOSSIM  High-level simulator (HLS) in progress for testing different caching schemes  Future Plans:  Integrate local caching into version 0.1 of Location Service  Test and implement cache entry replacement in HLS and TOSSIM  Test BVR Location Service on Motes  Tweak and turn knobs to find best performance/overhead tradeoffs in real test-bed  Implement Beacon election algorithm

Questions?