Presentation is loading. Please wait.

Presentation is loading. Please wait.

Potential-Based Entropy Adaptive Routing for Disruption Tolerant Networks Hideya Ochiai Hiroshi Esaki The University of Tokyo / NICT DTNRG, IETF 76 Hiroshima,

Similar presentations


Presentation on theme: "Potential-Based Entropy Adaptive Routing for Disruption Tolerant Networks Hideya Ochiai Hiroshi Esaki The University of Tokyo / NICT DTNRG, IETF 76 Hiroshima,"— Presentation transcript:

1 Potential-Based Entropy Adaptive Routing for Disruption Tolerant Networks Hideya Ochiai Hiroshi Esaki The University of Tokyo / NICT DTNRG, IETF 76 Hiroshima, 2009-11-13

2 Outline Introduction Potential-based entropy adaptive routing Prototype implementation Campus-wide experiment Conclusion

3 Introduction DTN for opportunistic networking –Isolated sensor networking / vehicular ad-hoc networks –Intermittent connectivity / isolated networks API –void sendMessage(ID dst, String msg); –void recvMessage(ID src, String msg); All the nodes are always virtually connected. 1 3 4 2 5 7 6 Intermittent Connectivity 8 Isolated Networks Mobile Node

4 Contributions of this work Implementation and deployment of potential-based entropy adaptive routing (PEAR) –PEAR autonomously enables message delivery in ad-hoc manner. –In general, the performance of routing algorithms are strongly dependent on mobility patterns. –PEAR dynamically adapts to wide-range of mobility patterns without being aware of mobility pattern itself.

5 Outline Introduction Potential-based entropy adaptive routing Prototype implementation Campus-wide experiment Conclusion Small entropy case Large entropy case Potential-field

6 Characterize Mobility Pattern by Entropy Small Entropy CaseLarge Entropy Case Locally DistributedWidely Distributed Delivery by hop-by-hop forwarding Delivery by the movement of the nodes

7 Entropy and Delivery Pattern 1 d 2 s 31 d 2 s 3 Small Entropy CaseLarge Entropy Case A bolder link indicates larger contact time. Biased contact Uniform contact It should choose the best path It should improve delivery rate by increasing redundancy.

8 How does PEAR achieve that ?? For choosing the next hop node: –Potential-based routing –Potential-field construction (inspired by diffusion theory) For message delivery –Copy-based message delivery  Transfer-based message delivery

9 Sensor Truck Internet Gateway Live E! To deliver sensor readings to the Internet GW Potential Data Flow : Wireless Device Potential-Based Routing

10 Potential-Field Construction in PEAR Potential-Field Construction Diffusion Equation

11 Potential-Field Construction

12 Constructed Potential-Field

13 Potential and Message Routing Small Entropy Case Distribution Potential Destination Node Source Node Intermediate Nodes Source Destination Intermediate Message Delivery

14 Potential and Message Routing Large Entropy Case Distribution Intermediate Nodes Source Node Destination Node Source Node Destination Node Direct Path Potential Possible Intermediate Nodes

15 Transfer-Based v.s. Copy-Based Message Delivery Transfer-Based Message Delivery Copy-Based Message Delivery PEAR

16 Copy-Based Message Transfer in PEAR n n-1 n+1 HBODY s d source destination HBODY H H Do you have any information about msg_id= XXXX ?? NOT_HAVE ALREADY_HAVE DELIVERED Algorithm

17 Rough Simulation-Based Evaluation

18 Delivery Rate 100% Mobility Pattern PEAR Link State Based Spray and Wait Rough Simulation-Based Evaluation (Summary) Village-to-villageHuman-to-human

19 Outline Introduction Potential-based entropy adaptive routing Prototype implementation Campus-wide experiment Conclusion

20 Software Design of PEAR Advertisement Manager Message Manager Potential TableNexthop Table Application (Message Send / Receive) Message Copy Advertisement Message Pool Investigation About 3000 lines in C. Footprint is 34k byte in object code.

21 Armadillo220 Battery(6.0V 2100mAh) Power Circuit Wifi 802.11gStorage(2GByte)

22 Armadillo-220

23

24

25

26

27 Outline Introduction Potential-based entropy adaptive routing Prototype implementation Campus-wide experiment Conclusion Contact graph Experiment settings Delivery pattern

28 Members for the experiment The University of Tokyo –Ochiai, Shimotada, Fujita, Kawakami, Himura, Sugita, Lert, Wan, Minshin, Motodate, Kure, Kawaguchi, Ishizuka Nara Institute of Science and Technology –Dr. Matsuura Keio University –Dr. Miyakawa, Yamanouchi Cisco Systems, Inc. –Momose

29 Scenario Overview Sensor Static (#1) Sensor Static (#2) InternetGW (#99) Mobile Node (#3) Mobile Node (#4) Mobile Node (#5) 1. Deploy sensors in remote sites. 2. Sensors periodically transmit data to the GW 3. Mobility of nodes enables delivery of data from sensors to the GW.

30 Gateway 50m

31 The number of received neighbor advertisement packets. e.g., node 8 received 45 advertisement from sensor 1. Contact Graph Mobility Entropy ≒ 2.1

32 Potential for the Gateway

33 Message Flow (1/2) Red arrow: messages from sensor 1 (#1) Blue arrow: messages from sensor 2 (#2) GW: #99

34 Message Flow (2/2) The number along with an arrow indicates the time of the transfer

35 Distribution of Delivery Latency E.g., 50 = [0,100]

36 Collected Temperature Data from Sensor 1 Delivery Rate = 100 %

37 Collected Temperature Data from Sensor 2 Delivery Rate = 100 %

38 Outline Introduction Potential-based entropy adaptive routing Prototype implementation Campus-wide experiment Conclusion

39 We proposed PEAR for opportunistic networking –It directly forwards a message at small entropy cases –It replicates a message to improve delivery latency at large entropy cases Implementation and deployment of PEAR –Prototype system with embedded computers –10-node scale campus wide experiment PEAR has achieved 100% delivery rate with reasonable delay on the experiment settings.

40 Thank you... Google by "Mobility Entropy and Message Routing" Small entropy case Large entropy case PEAR maintains high delivery rate over wide-range of mobility patterns Prototype implementation


Download ppt "Potential-Based Entropy Adaptive Routing for Disruption Tolerant Networks Hideya Ochiai Hiroshi Esaki The University of Tokyo / NICT DTNRG, IETF 76 Hiroshima,"

Similar presentations


Ads by Google