BOND: Unifying Mobile Networks with Named Data. Michael Meisel

Similar documents
BOND: Unifying Mobile Networks with Named Data

Listen First, Broadcast Later: Topology-Agnostic Forwarding under High Dynamics

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES

APT: A Practical Transit-Mapping Service Overview and Comparisons

Archna Rani [1], Dr. Manu Pratap Singh [2] Research Scholar [1], Dr. B.R. Ambedkar University, Agra [2] India

A Joint Replication-Migration-based Routing in Delay Tolerant Networks

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

Routing Protocol Approaches in Delay Tolerant Networks

CS 268: Computer Networking. Taking Advantage of Broadcast

PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH

Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay

DYNAMIC DATA ROUTING IN MANET USING POSITION BASED OPPORTUNISTIC ROUTING PROTOCOL

CE693: Adv. Computer Networking

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

Qos Parameters Estimation in MANET Using Position Based Opportunistic Routing Protocol

COMPARATIVE ANALYSIS OF DIFFERENT ROUTING PROTOCOLS IN DELAY TOLERANT NETWORKS

Simulation and Analysis of Opportunistic Routing Protocols

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

Performance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey. Namita Mehta 1 and Mehul Shah 2

Computation of Multiple Node Disjoint Paths

APT Incremental Deployment

Routing Issues & Performance Of Different Opportunistic Routing Protocols In Delay Tolerant Network

Keywords: AODV, MANET, WRP

ECE 598HH: Special Topics in Wireless Networks and Mobile Systems

LECTURE 9. Ad hoc Networks and Routing

Performance Estimation on Opportunistic Routing Protocol based on Reliability Analysis

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Arvind Krishnamurthy Fall 2003

Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1

Poonam kori et al. / International Journal on Computer Science and Engineering (IJCSE)

3. Evaluation of Selected Tree and Mesh based Routing Protocols

Energy Consumption and Performance of Delay Tolerant Network Routing Protocols under Different Mobility Models

Destination Reachability and BGP Convergence Time. Beichuan Zhang (UCLA) Dan Massey (Colorado State) Lixia Zhang (UCLA)

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

CS164 Final Exam Winter 2013

6. Node Disjoint Split Multipath Protocol for Unified. Multicasting through Announcements (NDSM-PUMA)

A Fast and Reliable Tree based Proactive Source Routing in Mobile Adhoc Network 1 Haseena M. K., 2 Annes Philip.

Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols

Evaluation of Routing Protocols for Mobile Ad hoc Networks

Interface The exit interface a packet will take when destined for a specific network.

IN a mobile ad hoc network, nodes move arbitrarily.

Challenge: high throughput despite loss. Roofnet has >30% loss probability. 4 Computer Networks Course (15-744), CMU, 2012.

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

IJMIE Volume 2, Issue 9 ISSN:

Scalable Opportunistic VANET Content Routing With Encounter Information

Webpage: Volume 4, Issue VI, June 2016 ISSN

Store-and-Forward Performance in a DTN

Density-Aware Routing in Highly Dynamic DTNs: The RollerNet Case

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

Design and Implementation of Improved Routing Algorithm for Energy Consumption in Delay Tolerant Network

Studies with ns-2 and ns-3 based DTN Simulators

CSMA based Medium Access Control for Wireless Sensor Network

MobilityFirst GSTAR: Generalized Storage Aware Routing

SENSOR-MAC CASE STUDY

Network Coding Efficiency In The Presence Of An Intermittent Backhaul Network

Impact of Social Networks in Delay Tolerant Routing

Mobile Ad-hoc Networks

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday

CDMR: Cooperative Diversity-based Multi-Copy Relaying in Mesh Networks

Hybrid gateway advertisement scheme for connecting mobile ad hoc networks to the Internet

Wireless Mesh Networks

Lecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT

15-441: Computer Networking. Wireless Networking

hash chains to provide efficient secure solutions for DSDV [7].

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET

Impact of Hello Interval on Performance of AODV Protocol

Spray and Dynamic: Advanced Routing in Delay Tolerant Networks

PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes

AODV-PA: AODV with Path Accumulation

Simulation and Comparative Analysis of AODV, DSR, DSDV and OLSR Routing Protocol in MANET Abstract Keywords:

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

Wireless Networking & Mobile Computing

DTN Interworking for Future Internet Presented by Chang, Dukhyun

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading

Performance Analysis of Delay Tolerant Network Routing Protocols in Different Mobility Environments

Chapter 7 CONCLUSION

Buffer Management in Delay Tolerant Networks

Making Friends with Broadcast. Administrivia

Mobile and Sensor Systems. Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5

Interference avoidance in wireless multi-hop networks 1

The Importance of Being Opportunistic

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

Routing Protocols in MANETs

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks

UCS-805 MOBILE COMPUTING Jan-May,2011 TOPIC 8. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.

Lecture 16: Wireless Networks

Simulation of Epidemic, Spray and Wait and First Contact Routing Protocols in Delay Tolerant Network

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks

Named Data for Mobile AdHoc Networks

Survey on Location Based Routing Protocols in MANET

TRUST FRAMEWORK FOR DATA FORWARDING IN OPPORTUNISTIC NETWORKS USING MOBILE TRACES

Improvement of Buffer Scheme for Delay Tolerant Networks

DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Multipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network

Transcription:

BOND: Unifying Mobile Networks with Named Data Michael Meisel Ph.D. Dissertation Defense March 16, 2011

Freeform Wireless Networks Multi-hop Unpredictable mobility Can be connected or disconnected Examples: MANETs, VANETs, disruption-tolerant networks, combinations thereof 2

Goals Follow the Named Data Networking (NDN) philosophy Delivery based on what, not where Get rid of holdovers from the wired domain One architecture that will work on any freeform network Stop treating connected and disconnected networks separately 3

Connected or Disconnected? 4

Current Approaches to Freeform Networks 5

The Wired Approach 1. Each node is assigned an IP address 2. Applications communicate using destination IPs 3. The routing protocol finds a single best path from source to destination 4. At each hop along the path, the sender determines which single node (based on step 3) is allowed to forward the data Designed > 30 years ago for stationary networks 6

Issues with The Wired Approach Applications care about data, not location In freeform networks: IP addresses lose topological meaning, aggregatability Finding, maintaining hop-by-hop paths is expensive Pre-determined paths don t take advantage of the broadcast nature of wireless 7

Alternative: Opportunistic Routing Goal: improve throughput in stationary mesh networks with lossy links Basic approach: Track the quality of every link in the network Senders broadcast, receivers make forwarding decisions based on the quality of their path to the source Examples: ExOR [1], MORE [2] [1] S. Biswas and R. Morris. ExOR: opportunistic multi-hop routing for wireless networks. ACM SIGCOMM Computer Communication Review, 35(4):144, 2005. [2] S. Chachulski, M. Jennings, S. Katti, and D. Katabi. Trading structure for randomness in wireless opportunistic routing. In SIGCOMM ʼ07, pages 169 180. ACM, 2007. 8

Alternative: Opportunistic Routing Improvements: Takes advantage of the broadcast nature of wireless Shortcomings: Cannot handle mobility Still dependent on IP addressing, location-based delivery 9

Disconnected Network Routing Goal: in a disconnected network with unpredictable mobility, increase the probability that data reaches its destination Basic approach: Replicate each data packet across many nodes Do not try to figure out where the destination node is Examples: Epidemic routing [3], Spray and Wait [4] [3] A. Vahdat and D. Becker. Epidemic routing for partially-connected ad hoc networks. Technical Report CS-2000-06, Duke University, 2000. [4] T. Spyropoulos, K. Psounis, and C. S. Raghavendra. Spray and wait: an efficient routing scheme for intermittently connected mobile networks. In WDTN: SIGCOMM Workshop on Delay-Tolerant Networking, 2005. 10

Disconnected Network Routing Improvements: No pre-determined paths Shortcomings: Inefficient for connected networks (or network portions) Still dependent on location-based delivery 11

Named Data Networking (NDN) 12

NDN Architecture Routing/forwarding is based on data names instead of node addresses 13

NDN Names Data names in NDN are hierarchical ucla ucla/home ucla/cs ucla/math ucla/cs/home ucla/math/home NDN routing/forwarding can use name prefixes like IP routing uses IP address prefixes 14

NDN Communication (Optional Step 0: Use a routing protocol to announce names or name prefixes) Step 1: An application sends an Interest packet containing a request for data by name. It can be flooded or routed. Step 2: Any node that has the data can send a Data packet back towards the source of the Interest. Intermediate nodes cache the data. Future Interests for the same name can be serviced by caches 15

ucla/cs/home Requester ucla/cs/home Interest Assume we flood Interests. 16 22

Responder Requester By forwarding the Interests, the intermediate nodes have established a path from any potential responder to the requester. 17 22

ucla/cs/home Responder Requester Data The nodes that forward the data also cache it. 18 22

Requester ucla/cs/home ucla/cs/home Interest Suppose another node requests the same data name. 19 22

Requester ucla/cs/home ucla/cs/home Responder Responder Its immediate neighbors have cached the appropriate data, so they can respond. Data 20 22

NDN s Potential for Freeform Networks Applications could communicate based on data names only, retrieving the closest available copy of any data Unlike IP addresses, data names don t lose any meaning in the face of mobility All nodes could cache data they receive, respond to requests for that data 21

The BOND Protocol 22

BOND: Broadcast-Only Named Data Applies NDN concepts to freeform networks Completely does away with the IP approach: Name-based forwarding in place of IP addresses No control packets or pre-determined paths Broadcast-only transmission at the MAC layer -- forwarding decisions made by the receiver Supports both connected and disconnected networks efficiently 23

Overview BOND in connected networks BOND in disconnected networks Unifying connected and disconnected networks 24

BOND Names BOND exclusively uses names for forwarding Two types of names: data name: hierarchical data name for a single piece of data node name: names a particular node, used in getting data back to the requester Data names can be prefix-matched 25

BOND Communication: Requests Request packets are sent by a node to solicit a response packet from the network, which will contain the requested data At first, requests are flooded (like flooded NDN Interests) All nodes learn the location of the requester s node name Requests contain the desired data name Any number of responders may respond with a data packet 26

BOND Communication: Responses Responses take the best available path to the requester on the fly Responders can advertise a name prefix in the response Nodes overhearing the response: Cache the data Learn a location of the data name and name prefix Future requests for data in the same prefix aren t flooded -- they take the best available path to a responder 27

Broadcast-Only Forwarding Forwarding decisions must be made by the receiver Step 1: Determine if I can make forward progress. If so: Step 2: Listen for some time to see if another node closer to the intended destination forwards the packet. If not: Step 3: Forward the packet 28

Follow-up Questions How does a receiver know how close it is to the destination name? How long should a receiver listen, waiting for someone else to forward? 29

Distances The network shares a single distance metric (Could be: hop count, receive power, geo distance...) In every packet, senders broadcast their distance to the source and destination names Nodes remember their distance to active names for some time Only nodes with a smaller distance to the destination name are eligible forwarders 30

Listening Periods Eligible forwarders choose their listening period based on the network s delay metric Tells the node how long to wait before forwarding Only forward if another node does not forward before the listening period is over 31

Suppose S has all the data in the prefix foo. No other node has this data. A E S B R F C D 32

R broadcasts a request for foo/0, all nodes forward, record their distance from R d(a,r) = 11 A d(e,r) = 3 d(s,r) = 14 S d(b,r) = 8 B E d(f,r) = 3 R d(c,r) = 10 F C d(d,r) = 16 D 33

S has foo/0, broadcasts a response specifying foo as the name prefix. A, B, C and D cache foo/0 and learn their distance to foo. A E S B R F C D 34

d(a,r) = 11 D will never forward. A, B, or C may forward... after some delay. A d(s,r) = 14 S d(b,r) = 8 B E R d(c,r) = 10 F C d(d,r) = 16 16 > 14 ineligible D 35

The delay depends on the network s delay metric. d(a,r) = 11 A wait =? d(s,r) = 14 S d(b,r) = 8 B wait =? d(c,r) = 10 E F R C wait =? D 36

Simplest delay metric: random. A wait = random() E S B wait = random() F R C wait = random() D 37

d(a,r) = 11 But the receivers have some useful information: their own distance to R and S s distance to R. A d(s,r) = 14 S d(b,r) = 8 B E R d(c,r) = 10 F C D 38

A C can calculate its listening period by comparing S s claimed distance to R with its own prediction, assuming the packet were to travel through C. Its listening period will be proportional to the difference. d(s,r) = 14 S B E R 5 F C distance traversed from S = 5 d(c,r) = 10 d(s,c,r) = 5+10 = 15 wait! 15-14 D 39

Suppose all neighbors received the packet. B will forward immediately. A d(s,r) = 14 S wait! 2 6 C B distance traversed from S = 6 d(b,r) = 8 F d(s,r) = 6+8 = 14 wait! 14-14 E R wait! 1 D 40

A and C hear B before their listening period ends, so they do not forward. A E S B R F C D 41

But suppose B moved away. B A E S B R F C D 42

C will forward the packet instead, once its listening period is over. B A wait! 2 E S R F C wait! 1 D 43

A will hear C before its listening period ends, so A will not forward. B A E S R F C D 44

Similarly, one of E or F will forward the packet. Suppose it s F. B, C, E, and R will overhear. All nodes cache foo/0 and learn their distance to foo. A B E S R F C D 45

The response has reached R. B A E S R F C D 46

When R requests foo/1, the same forwarding procedure can be used, the request is not flooded. Any node that overheard S s response knows its distance to foo and can potentially help in forwarding. A B E S R F C D 47

On Reliability BOND provides no guarantees The requester should re-request any missing data Re-requests may not need to travel very far, the data could be cached nearby as a result of the previous request 48

Disconnected Networks Caching ferries data between disconnected portions of the network But requests need to be ferried, too Request replay: intermediate nodes retransmit request at regular intervals until either: They hear a response to the request, or They reach a fixed maximum number of replays 49

Suppose Q is the only node that has data/0. A Q R B C 50

R broadcasts a request for data/0, A and B receive it. A Q R B C 51

A and B flood R s request, but Q is not close enough to hear. A Q R B C 52

Suppose A moves towards Q. A A Q R B C 53

With request replay, A, B, and R will all retransmit R s request at regular intervals. A Q R B C 54

When A replays R s request, Q will receive it. A Q R B C 55

Q will send a response, A and C will receive it. Neither A nor C can reach R, but they will still cache the data. A Q R B C 56

Suppose C moves near R. A Q R B C C 57

R replays its own request, C receives it. A Q R B C 58

C responds with its cached copy of data/0, B and R receive it. B heard a response, so it stops replaying R s request. A Q R B C 59

Unifying Connected and Disconnected Networks 60

Disconnected, but Locally Connected 61

Limiting Replays Request replays are needed to support disconnected networks, but: Request replays are an unnecessary expense within locally connected areas Solution: Replays should only be used when they are needed by a particular requester 62

Determining When Replays Are Needed In the locally connected network, all responders should hear flooded requests No response to repeated flooded requests? The data is not available locally The requester should enable replays for its next request 63

Avoiding False Positives Problem: lack of response could also be due to heavy congestion Request replay means even more traffic -- bad idea! Solution: check the portion of the time that the channel is busy (busy ratio) High busy ratio: loss could be due to congestion, don t replay Low busy ratio: loss not due to congestion, replay if no response 64

BOND Evaluation 65

General Simulation Setup QualNet simulator Random waypoint model uses steady-state initialization [5] To compare traditional routing to BOND s name-based system: Client-server pairs for other protocols, client sends requests at regular intervals, server responds to requests Imitate the above in BOND by never requesting the same data name twice; only one potential responder for each requester [5] W. Navidi and T. Camp. Stationary distributions for the random waypoint mobility model. Mobile Computing, IEEE Transactions on, 3(1):99 108, Jan 2004. 66

Evaluation Metrics Roundtrip time: Time from request sent to response received Response ratio: Non-duplicate responses received over requests sent Overhead: Total bytes transmitted by all nodes over nonduplicate response bytes received Path length: Average length of a roundtrip for delivered data (request + response) 67

BOND Evaluation: Connected Networks 68

Percent of Nodes Mobile (Setup) 100 nodes, 1500 by 1500 meter area, 20 minute duration Mobile nodes: Random waypoint mobility, 30 meters per second, no pause time Other nodes: stationary 8 requester-responder pairs (no overlapping names) Requesters send a request every 100 ms What happens as the number of mobile nodes increases? 69

Percent of Nodes Mobile (Latency) 70

Percent of Nodes Mobile (Response %) 71

Percent of Nodes Mobile (Overhead) 72

Caching Named Data (Setup) 100 nodes, 1500 by 1500 meter area, 20 minute duration All nodes travel between 10 and 30 meters per second, random waypoint mobility, no pause time 8 requesters, 8 potential responders What if the requesters all request the same vs. a different sequence of data names? 73

Caching Named Data 74

BOND Evaluation: Disconnected Networks 75

Bridge (Setup) 45 nodes each, 5-15 m/s 10 nodes, 20-40 m/s 2 requesters 2 responders Nodes do not change areas, random waypoint within each area Comparison protocols: Epidemic Routing, Spray and Wait 76

Bridge (Results) 77

Manhattan (Setup) Manhattan mobility model 100 nodes, 3000 by 3000 meter area, 20 blocks wide 30 min duration Nodes travel 10-20 meters per second 78

Manhattan (Results) 79

Suggestions for Future Work Reducing overhead when request replays are used Security Data name assignment 80

Concluding Thoughts With the growing number of portable wireless devices, freeform networks could ease strain on infrastructure, but the industry has not made use of them BOND removes many of the barriers to deploying multi-hop wireless networks in practice: Devices do not need to be assigned IP addresses The network can be connected or disconnected 81

Publications and Talks Dan Jen and Michael Meisel. APT: A Practical Transit-Mapping Service: Overview and Comparisons. At 70th Internet Engineering Task Force Meeting, Routing Research Group. Vancouver, British Columbia, Canada: December 7, 2007. Dan Jen, Michael Meisel, He Yan, Dan Massey, Lan Wang, Beichuan Zhang, and Lixia Zhang. Towards a New Internet Routing Architecture: Arguments for Separating Edges from Transit Core. In Proceedings of the Seventh ACM Workshop on Hot Topics in Networks (HotNets-VII). October 2008. Dan Jen and Michael Meisel. APT: An Architecture for Practical Transit Core Separation. At Internet Multi-Resolution Analysis Workshop III: Beyond Internet MRA: Network of Networks. Institute for Pure & Applied Mathematics, Los Angeles, California: November 7, 2008. Michael Meisel, Vasileios Pappas, and Lixia Zhang. A Taxonomy of Biologically Inspired Research in Computer Networking. Computer Networks, 54(6): 901 -- 916. April 2010. Michael Meisel, Vasileios Pappas, and Lixia Zhang. Ad Hoc Networking via Named Data. In Proceedings of the Fifth ACM Workshop on Mobility in the Evolving Internet Architecture (MobiArch). September 2010. 82