PRIN 2005 - WOMEN PROJECT Research Unit: University of Naples Federico II G. Ferraiuolo

Slides:



Advertisements
Similar presentations
CAN 1.Distributed Hash Tables a)DHT recap b)Uses c)Example – CAN.
Advertisements

MMT (Multi Meshed Tree) Protocols for Cognitive Airborne Networks Nirmala Shenoy Lab for Wireless Networking and Security Rochester Institute of Technology.
Scalable Content-Addressable Network Lintao Liu
1 Mobile IPv6-Based Ad Hoc Networks: Its Development and Application Advisor: Dr. Kai-Wei Ke Speaker: Wei-Ying Huang.
Multicast in Wireless Mesh Network Xuan (William) Zhang Xun Shi.
DSR The Dynamic Source Routing Protocol Students: Mirko Gilioli Mohammed El Allali.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp, Scott Schenker Presented by Greg Nims.
Self-Organizing Hierarchical Routing for Scalable Ad Hoc Networking David B. Johnson Department of Computer Science Rice University Monarch.
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
Common approach 1. Define space: assign random ID (160-bit) to each node and key 2. Define a metric topology in this space,  that is, the space of keys.
Small-world Overlay P2P Network
6/3/ Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross-Layer Information Awareness CS495 – Spring 2005 Northwestern University.
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
An Analysis of the Optimum Node Density for Ad hoc Mobile Networks Elizabeth M. Royer, P. Michael Melliar-Smith and Louise E. Moser Presented by Aki Happonen.
Ad Hoc Networks Routing
Scalable Ad Hoc Routing: The Case for Dynamic Addressing INFOCOM 2004 Jakob Eriksson, Michalis Faloutsos, Srikanth Krishnamurthy University of California,
Di Wu 03/03/2011 Geographic Routing in Clustered Multi-layer Vehicular Ad Hoc Networks for Load Balancing Purposes.
Anonymous Gossip: Improving Multicast Reliability in Mobile Ad-Hoc Networks Ranveer Chandra (joint work with Venugopalan Ramasubramanian and Ken Birman)
1 Name Directory Service based on MAODV and Multicast DNS for IPv6 MANET Jaehoon Jeong, ETRI VTC 2004.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
A Cross Layer Approach for Power Heterogeneous Ad hoc Networks Vasudev Shah and Srikanth Krishnamurthy ICDCS 2005.
MANET Supernodes March 16, 2005 Barry Demchak Zhong-Yi Jin William Chang.
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
Ad Hoc Wireless Routing COS 461: Computer Networks
Other Structured P2P Systems CAN, BATON Lecture 4 1.
Ad Hoc Networking via Named Data Michael Meisel, Vasileios Pappas, and Lixia Zhang UCLA, IBM Research MobiArch’10, September 24, Shinhaeng.
1 Plaxton Routing. 2 Introduction Plaxton routing is a scalable mechanism for accessing nearby copies of objects. Plaxton mesh is a data structure that.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Multi-level Hashing for Peer-to-Peer System in Wireless Ad Hoc Environment Dewan Tanvir Ahmed and Shervin Shirmohammadi Distributed & Collaborative Virtual.
CROSS-ROAD: CROSS-layer Ring Overlay for AD Hoc Networks Franca Delmastro IIT-CNR Pisa Cambridge, March 23 rd 2004.
Routing protocols Basic Routing Routing Information Protocol (RIP) Open Shortest Path First (OSPF)
Multicast Routing in Mobile Ad Hoc Networks (MANETs)
Mobile Networking Challenges1 5.6 Mobile Ad Hoc Networks  Ad hoc network does not have any preexisting centralized server nodes to perform packet routing,
1 Heterogeneity in Multi-Hop Wireless Networks Nitin H. Vaidya University of Illinois at Urbana-Champaign © 2003 Vaidya.
Scalable Ad Hoc Routing the Case for Dynamic Addressing.
Content Addressable Network CAN. The CAN is essentially a distributed Internet-scale hash table that maps file names to their location in the network.
A Scalable Content-Addressable Network (CAN) Seminar “Peer-to-peer Information Systems” Speaker Vladimir Eske Advisor Dr. Ralf Schenkel November 2003.
Designing Routing Protocol For Mobile Ad Hoc Networks Navid NIKAEIN Christian BONNET EURECOM Institute Sophia-Antipolis France.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
#1 EETS 8316/NTU CC725-N/TC/ Routing - Circuit Switching  Telephone switching was hierarchical with only one route possible —Added redundant routes.
A Membership Management Protocol for Mobile P2P Networks Mohamed Karim SBAI, Emna SALHI, Chadi BARAKAT.
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
Scalable Routing Protocols for
Paper by Song Guo and Oliver Yang; supporting images and definitions from Wikipedia Presentation prepared by Al Funk, VT CS 6204, 10/30/07.
Evaluating Mobility Support in ZigBee Networks
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
Middleware issues: From P2P systems to Ad Hoc Networks
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
A Mechanism for Communication- Efficient Broadcast Encryption over Wireless Ad Hoc Networks Johns Hopkins University Department of Computer Science Reza.
PeerNet: Pushing Peer-to-Peer Down the Stack Jakob Eriksson, Michalis Faloutsos, Srikanth Krishnamurthy University of California, Riverside.
Incrementally Improving Lookup Latency in Distributed Hash Table Systems Hui Zhang 1, Ashish Goel 2, Ramesh Govindan 1 1 University of Southern California.
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications * CS587x Lecture Department of Computer Science Iowa State University *I. Stoica,
HoWL: An Efficient Route Discovery Scheme Using Routing History in Mobile Ad Hoc Networks Faculty of Environmental Information Mika Minematsu
A Cluster-based Routing Protocol for Mobile Ad hoc Networks
Nuno Salta Supervisor: Manuel Ricardo Supervisor: Ricardo Morla
A comparison of Ad-Hoc Routing Protocols
ODMRP Enhancement.
CSE 4340/5349 Mobile Systems Engineering
Self-Organizing Hierarchical Routing for Scalable Ad Hoc Networking
Self-Organizing Hierarchical Routing for Scalable Ad Hoc Networking
Weak Duplicate Address Detection in Mobile Ad Hoc Networks
DHT Routing Geometries and Chord
Dewan Tanvir Ahmed and Shervin Shirmohammadi
A Probabilistic Routing Protocol for Mobile Ad Hoc Networks
A Scalable content-addressable network
ECE 544 Project3 Team member: BIAO LI, BO QU, XIAO ZHANG 1 1.
Effective Replica Allocation
Efficient flooding with Passive clustering (PC) in Ad Hoc Networks
Presentation transcript:

PRIN WOMEN PROJECT Research Unit: University of Naples Federico II G. Ferraiuolo

T3.6: Location management and routing in wireless ad hoc and mesh networks

Rome, WOMEN – 3° Meeting3 Mobility management WMNs mesh routers have low mobility: –monitoring the connectivity Mesh clients are mobile: –Mobility management is essential for the ad hoc domain Mobility management: location and handoff management

Rome, WOMEN – 3° Meeting4 Location management in MANETs Node’s identifier and node’s location can not be statically related in self organizing networks Location is retrieved and then routing is performed Routing based on location information can improve scalability respect to proactive/reactive approaches

Rome, WOMEN – 3° Meeting5 DHT based location management Distributed Dynamic management Low control message overhead P2P applications for locate information (scalability and resilience to failures) DHT based routing: –Location by GPS or other dedicated systems –Topology location (by dynamic addressing)

Rome, WOMEN – 3° Meeting6 Addressing in MANETs Twofold goal: –Assign a like-IP address in mobile environments –Solve the location management problem for supporting routing Mandatory requirements: –Distributed mechanism –Scalability

Rome, WOMEN – 3° Meeting7 Resume There are 3 problems to optimize: –Dynamic Address Allocation –Dynamic address based Routing –Distributed Hash Table Lookup There is still work to do toward the definition of a realistic scalable routing approach based on DHT and Dynamic Addressing

Rome, WOMEN – 3° Meeting8 Distributed Address Allocation Identifier: static (IP) Routing address: dynamic Each node can assign a valid address to a joining neighbor node The assigning node also delegates control over half of its address space to the requester Problems: network merge and partition yield to address duplication

Rome, WOMEN – 3° Meeting9 Distributed Address Allocation A level-k sibling of a given address is defined as the subtree that share the same immediate parent of the level-k subtree of the considered address. Example: sibling(100) = 101, 11X, 0XX

Rome, WOMEN – 3° Meeting10 Distributed Address Allocation Each node build a state table –The table stores an entry for each one of node’s level- k sibling subtree –If an entry is empty, the new node get an unoccupied address in that subtree –The new node chooses the largest unoccupied address set –Table dimension O(log n) The table is used also for routing

Rome, WOMEN – 3° Meeting11 Distributed Address Allocation Related works: –Stateless approach: flood the network for duplicate address detection –Stateful approach (DART): based on the underlying Neighbor Discovery Protocol Other stateful approaches dose not face effectively network partition problem –We use the identifier to detect partitions and solve the contention

Rome, WOMEN – 3° Meeting12 Routing Location information is embedded in the dynamic address: –Hierarchical distance-vector routing based on dynamic address –A node compare the address with its own, if the i-th bit is different, it forwards the packet toward the i-th sibling –Routing is a recursive descending through the address tree –Prefix subgraph constraint assures robustness

Rome, WOMEN – 3° Meeting13 Prefix subgraph constraint Nodes with a given address prefix form a connected graph The longer the shared address prefix between two nodes, the shorter the distance in the topology Routing entries for distance nodes can remain valid despite local topology changes Reduce size of routing tables and updates

Rome, WOMEN – 3° Meeting14 Routing optimization 1 Tree address structure –simple and manageable (+) –low route selection flexibility for routing (-) Optimization opportunities: –Enhancing address capability (-) –Increasing table dimension (+) Additional neighbor information in the routing table –Low increment of the table size, same routing overhead

Rome, WOMEN – 3° Meeting15 Routing optimization 1

Rome, WOMEN – 3° Meeting16 Routing optimization 2 Toward an effective routing protocol: –Cross layering is mandatory in MANETs –A simple interaction with MAC can be very useful –When a link failure is detected, the corresponding entry is removed from the state table –Routing is attempted using another available entry Resuming: –Routing protocol 1 (R1): minimum table size –Routing protocol 2 (R2): neighbor information –Routing protocol 3 (R3): minimum table size with cross layer –Routing protocol 4 (R4): neighbor information with cross layer

Rome, WOMEN – 3° Meeting17 Simulated scenario Network Simulator 2 Mobility model: –random waypoint; –speed [0.5;5] m/s, pause time [0;100] s; –density ≈ 121 nodes/km 2 ; Data traffic model: –Constant Bit Rate (CBR) on UDP; –throughput CBR = 0.25 throughput link

Rome, WOMEN – 3° Meeting18 Simulation results

Rome, WOMEN – 3° Meeting19 Simulation results

Rome, WOMEN – 3° Meeting20 Simulation results

Rome, WOMEN – 3° Meeting21 Simulation results

Rome, WOMEN – 3° Meeting22 Conclusions Preliminary results: –Address allocation scheme is effective in assigning valid addresses –Better performance in routing is achieved with slightly more complexity –Cross layering is necessary to achieve effective performance