K-Anycast Routing Schemes for Mobile Ad Hoc Networks 指導老師 : 黃鈴玲 教授 學生 : 李京釜.

Slides:



Advertisements
Similar presentations
Ranveer Chandra Ramasubramanian Venugopalan Ken Birman
Advertisements

ROUTING IN INTERMITTENTLY CONNECTED MOBILE AD HOC NETWORKS AND DELAY TOLERANT NETWORKS: OVERVIEW AND CHALLENGES ZHENSHENG ZHANG.
An Adaptive Compulsory Protocol for Basic Communication in Ad-hoc Mobile Networks Ioannis Chatzigiannakis Sotiris Nikoletseas April 2002.
The Selective Intermediate Nodes Scheme for Ad Hoc On-Demand Routing Protocols Yunjung Yi, Mario gerla and Taek Jin Kwon ICC 2002.
Weight based Multicast Routing Protocol for Ad hoc Wireless Networks 學生:陳信皇 教授:陳仁暉.
SEEKER: An Adaptive and Scalable Location Service for Mobile Ad Hoc Networks Jehn-Ruey Jiang and Wei-Jiun Ling Presented by Jehn-Ruey Jiang National Central.
指導教授:許子衡 教授 報告學生:馬敏修 2010/8/ Introduction 2. Geocast Routing Protocols  2.1 GAMER Overview 3. GAMER Details  3.1 Building the Mesh  3.2 Adaptation.
Introduction to Wireless Sensor Networks
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
An Interest-Driven Approach to Integrated Unicast and Multicast Routing in MANETs Rolando Menchaca-Mendez J.J. Garcia-Luna-Aceves 280N Seminar: 4/28/2008.
Rumor Routing in Sensor Networks David Braginsky and Deborah Estrin LECS – UCLA Modified and Presented by Sugata Hazarika.
1 Location-Aided Routing (LAR) in Mobile Ad Hoc Networks Young-Bae Ko and Nitin H. Vaidya Yu-Ta Chen 2006 Advanced Wireless Network.
“Location-Aided Routing (LAR) in Mobile Ad Hoc Network” by Young-bae ko Nitin H. Validya presented by Mark Miyashita.
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
A Novel Cluster-based Routing Protocol with Extending Lifetime for Wireless Sensor Networks Slides by Alex Papadimitriou.
Secure and Efficient Key Management in Mobile Ad Hoc Networks Bing Wu, Jie Wu, Eduardo B. Fernandez, Mohammad Ilyas, Spyros Magliveras Department of Computer.
Small-world Overlay P2P Network
1 Efficient Retrieval of User Contents in MANETs Marco Fiore, Claudio Casetti, Carla-Fabiana Chiasserini Dipartimento di Elettronica, Politecnico di Torino,
E-ODMRP: Enhanced ODMRP with Motion Adaptive Refresh Soon Y. Oh, Joon-Sang Park, Mario Gerla Computer Science Dept. UCLA.
Kyushu University Graduate School of Information Science and Electrical Engineering Department of Advanced Information Technology Supervisor: Professor.
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
Adaptive Web Caching Lixia Zhang, Sally Floyd, and Van Jacob-son. In the 2nd Web Caching Workshop, Boulder, Colorado, April 25, System Laboratory,
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Address Auto-configuration in Mobile Ad Hoc Networks Current Approaches and Future Directions Date : 2005 / 1 / 20 Speaker : Xu Jia-Hao Advisor : Ke Kai-Wei.
Ad Hoc Mobility Management with Uniform Quorum Systems.
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Election Algorithms and Distributed Processing Section 6.5.
The Zone Routing Protocol (ZRP)
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
COCONET: Co-Operative Cache driven Overlay NETwork for p2p VoD streaming Abhishek Bhattacharya, Zhenyu Yang & Deng Pan.
09/07/2004Peer-to-Peer Systems in Mobile Ad-hoc Networks 1 Lookup Service for Peer-to-Peer Systems in Mobile Ad-hoc Networks M. Tech Project Presentation.
Mobile Routing protocols MANET
Multicast Routing in Mobile Ad Hoc Networks (MANETs)
Presented by Chaitanya Nemallapudi Understanding and Exploiting the Trade-Offs between Broadcasting and Multicasting in Mobile Ad Hoc Networks Lap Kong.
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
G-REMiT: An Algorithm for Building Energy Efficient Multicast Trees in Wireless Ad Hoc Networks Bin Wang and Sandeep K. S. Gupta NCA’03 speaker : Chi-Chih.
Optimal Base Station Selection for Anycast Routing in Wireless Sensor Networks 指導教授 : 黃培壝 & 黃鈴玲 學生 : 李京釜.
A Survey of Geocast Routing Protocols 指導教授:許子衡 教授 報告學生:馬敏修 指導教授:許子衡 教授 報告學生:馬敏修.
Hop State Prediction Method using Distance Differential of RSSI on VANET 指導教授:許子衡 教授 學 生:董藝興 學生 1.
1 Shape Segmentation and Applications in Sensor Networks Xianjin Xhu, Rik Sarkar, Jie Gao Department of CS, Stony Brook University INFOCOM 2007.
Dynamic Routing in Mobile Ad Hoc Network 報告者:呂佐鴻 指導教授:李鴻璋.
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
KAIS T High-throughput multicast routing metrics in wireless mesh networks Sabyasachi Roy, Dimitrios Koutsonikolas, Saumitra Das, and Y. Charlie Hu ICDCS.
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
An Efficient Wireless Mesh Network A New Architecture 指導教授:許子衡 教授 學生:王志嘉.
On Reducing Mesh Delay for Peer- to-Peer Live Streaming Dongni Ren, Y.-T. Hillman Li, S.-H. Gary Chan Department of Computer Science and Engineering The.
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
A Bandwidth Scheduling Algorithm Based on Minimum Interference Traffic in Mesh Mode Xu-Yajing, Li-ZhiTao, Zhong-XiuFang and Xu-HuiMin International Conference.
2010 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), pp , 作者: Yoh Shiraishi, Ryo Miki 指導教授:許子衡 教授.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
A Multicast Routing Algorithm Using Movement Prediction for Mobile Ad Hoc Networks Huei-Wen Ferng, Ph.D. Assistant Professor Department of Computer Science.
An efficient reliable broadcasting protocol for wireless mobile ad hoc networks Chih-Shun Hsu, Yu-Chee Tseng, Jang-Ping Sheu Ad Hoc Networks 2007, vol.
Relying on Safe Distance to Achieve Strong Partitionable Group Membership in Ad Hoc Networks Authors: Q. Huang, C. Julien, G. Roman Presented By: Jeff.
VORONOI DIAGRAM AND CONVEX HULL BASED GEOCASTING AND ROUTING IN WIRELESS NETWORKS 指導教授:許子衡 報告學生:翁偉傑 1 Copyright # 2006 John Wiley & Sons, Ltd. Wirel. Commun.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Peter Pham and Sylvie Perreau, IEEE 2002 Mobile and Wireless Communications Network Multi-Path Routing Protocol with Load Balancing Policy in Mobile Ad.
Mobile Networks and Applications (January 2007) Presented by J.H. Su ( 蘇至浩 ) 2016/3/21 OPLab, IM, NTU 1 Joint Design of Routing and Medium Access Control.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
1 Along & across algorithm for routing events and queries in wireless sensor networks Tat Wing Chim Department of Electrical and Electronic Engineering.
GeoTORA: A Protocol for Geocasting in Mobile Ad Hoc Networks
Author:Zarei.M.;Faez.K. ;Nya.J.M.
Mesh-based Geocast Routing Protocols in an Ad Hoc Network
MZR: A Multicast Protocol based on Zone Routing
ODMRP Enhancement.
Introduction to Wireless Sensor Networks
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
Presentation transcript:

k-Anycast Routing Schemes for Mobile Ad Hoc Networks 指導老師 : 黃鈴玲 教授 學生 : 李京釜

Author & Source Author : Bing Wu; Jie Wu Source :Parallel and Distributed Processing Symposium, IPDPS th International April 2006 Page(s):10 pp. Digital Object Identifier /IPDPS

Outline Introduction Three k-anycast approaches k-anycast routing schemes Simulation Conclusion

Different types of communication services (a)unicast, (b)broadcast, (c)multicast, (d)anycast and (e)k-anycast.

Introduction The potential advantages of this scheme are fault tolerance, load balancing, security, and improvement in system performance. In mobile ad hoc networks (MANETs), anycast can provide easier service in a dynamic and distributed environment.

Introduction In a network configuration where any threshold number of servers can provide particular services, a user needs to locate any k servers out of a server group and efficient k-anycast protocols are necessary to realize such needs.

Introduction The first scheme is called controlled flooding. The increase in flooding radius is based on the number of responses. The second scheme is to form multiple components such that each component has at least k members. The third scheme also maintains components, however, each component can have number of members less than threshold k.

Controlled Flooding Whenever a node needs to contact any k servers out of a server group, it floods the request. This can be done through the traditional linear or exponential expanding ring searching approach to limit the scope of flooding. A controlled flooding scheme by adjusting the flooding scope according to the number of responses for a request.

Two multicomponent schemes First scheme is to form multiple components with each component maintaining at least k members. Whenever a node demands service, it can contact any one of these components. Second scheme, components may have less than k members maintained. During service request, the service from multiple components could be aggregated instead of forcing each component to maintain k members

Controlled flooding k-anycast scheme Whenever a node needs to contact any k servers out of a server group, it floods the request to the network with a limited TTL. The TTL keeps increasing until a node receives responses from at least k servers. A node predicts its future searching radius when necessary based on the number of responses it received.

Component-based scheme I To form a component, a server decides to act as a leader and sends out inviting messages (join component) with its identity as the identifier of the component. The replies from servers propagate back to the leader. These processes repeat until the number of replies reaches k.

Componentbased scheme I & II For the componentbased scheme I, each component needs to maintain at least k members. Whenever affiliated members drop below k, certain procedures (merging components) are invoked. But for the component-based scheme II, components could have less than k members maintained and the service requesting nodes could aggregate service from multiple components.

Illustration of component architecture and k-anycast model

Component initialization(Scheme I) A percentage is defined as (0 < m< 1). Initially, every server i generates a random number α i between 0 and 1 and a threshold value. If α i ≤ m, this server will become a component leader. A server decides to act as a component leader, it issues message joinComponent to invite servers to join its group.

Component initialization(Scheme I) The non-leader servers wait for the inviting message. They will reply to the first inviting message and ignore the subsequent messages. The non-server nodes need to forward the inviting and replying messages and become the component tree members of multiple components if they are on the path. If a server does not receive any inviting messages within the predetermined time, it will decide to serve as a component leader and send out inviting messages.

Component initialization(Scheme I) The leader counts the number of members memberCount i, if memberCount i < k, the leader will expand the searching ring.When search radius reaches network diameter, if memberCount i < k, a merge procedure needs to be invoked.

Component maintenance (Scheme I) When a component does not invite enough members or a component is partitioned and causes the number of component members to be less than k, the leader of the component will issue a request to merge with neighboring component(s). To decide the new leader of the merged component, we use the leader with the smallest ID becomes the new leader; of course, other options exist.

Illustration of the component merge procedure

k-anycast routing (Scheme I) When a service request message arrives at a component, the component member who receives the request can send a reply message back to the requesting node, meanwhile, it could forward the request to the component leader.

Illustration of k-anycast routing model of (a) Scheme I and (b) Scheme II.

Component-based k-anycast routing scheme II 1) If a component leader cannot invite enough servers to join its group, no merge procedure will be invoked in Scheme II. 2) In Scheme II, a server that has not received any inviting messages will not decide to be a leader, instead, it will move around until it receives one or more incoming MemberReinforce messages from some components.

Advantages of component-based schemes 1) The amortized cost of component maintenance is relatively low and is more efficient than the flooding scheme when service rate is high. 2)It is quite simple and efficient for servers to coordinate with each other within the component rather than searching for nodes scattered across the whole network.

Simulation environment The simulation was conducted in a 100* D free-space by randomly allocating a given number of nodes in the range from 50m to 200m. We assume every node has fixed transmission range r = 20m. Two nodes are directly connected if their distance is within each other ’ s transmission range. We conduct experiments in both static and dynamic network environments.

Simulation environment ρ is defined as the probability of movement for each host (ρ= 0.5). Update interval, a random number in [0...1], is associated with each node. server rate p (percentage of nodes that are servers) was 30%.

Cost measurement C F is the average message cost during the component initialization phase. C M is the average message cost per round during the component maintenance phase. C S is the average message cost per service request during the service request phase.

Average cost in static settings when k = 8, f β = 20, and (a) f α = 0.5, (b) f α = 1

Average cost in static settings when f α = 0.5 and (a) k = 5, f β = 20, (b) k = 5, f β = 30

Average cost in dynamic environment when k = 8, f β = 20, and (a) f α = 0.5, (b) f α = 1

Average component size in dynamic environment when (a) k = 5, (b) k = 8

Conclusion The simulation results show that the multiple component schemes are more reliable, and requires less maintenance overhead and better adapt to the dynamic network environment compared to the one-component scheme.