DTN Routing CMPE 257 Philip P. Mathew

Slides:



Advertisements
Similar presentations
Quality-of-Service Routing in IP Networks Donna Ghosh, Venkatesh Sarangan, and Raj Acharya IEEE TRANSACTIONS ON MULTIMEDIA JUNE 2001.
Advertisements

ROUTING IN INTERMITTENTLY CONNECTED MOBILE AD HOC NETWORKS AND DELAY TOLERANT NETWORKS: OVERVIEW AND CHALLENGES ZHENSHENG ZHANG.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
A Presentation by: Noman Shahreyar
1 Routing Techniques in Wireless Sensor networks: A Survey.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
By Libo Song and David F. Kotz Computer Science,Dartmouth College.
An Analysis of the Optimum Node Density for Ad hoc Mobile Networks Elizabeth M. Royer, P. Michael Melliar-Smith and Louise E. Moser Presented by Aki Happonen.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
Ad Hoc Wireless Routing COS 461: Computer Networks
Distributed Quality-of-Service Routing of Best Constrained Shortest Paths. Abdelhamid MELLOUK, Said HOCEINI, Farid BAGUENINE, Mustapha CHEURFA Computers.
Routing Algorithms (Ch5 of Computer Network by A. Tanenbaum)
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Gathering Data in Wireless Sensor Networks Madhu K. Jayaprakash.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Mobile Adhoc Network: Routing Protocol:AODV
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
Wireless Sensor Networks COE 499 Energy Aware Routing
Copyright: S.Krishnamurthy, UCR Power Controlled Medium Access Control in Wireless Networks – The story continues.
Ad Hoc Routing: The AODV and DSR Protocols Speaker : Wilson Lai “Performance Comparison of Two On-Demand Routing Protocols for Ad Hoc Networks”, C. Perkins.
The Destination Sequenced Distance Vector (DSDV) protocol
Group 3 Sandeep Chinni Arif Khan Venkat Rajiv. Delay Tolerant Networks Path from source to destination is not present at any single point in time. Combining.
PRoPHET+: An Adaptive PRoPHET- Based Routing Protocol for Opportunistic Network Ting-Kai Huang, Chia-Keng Lee and Ling-Jyh Chen.
Department of Computer Science Aruna Balasubramanian, Brian Neil Levine, Arun Venkataramani DTN Routing as a Resource Allocation Problem.
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
Cisco Systems Networking Academy S2 C 11 Routing Basics.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Spring 2000CS 4611 Routing Outline Algorithms Scalability.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
RIP Routing Protocol. 2 Routing Recall: There are two parts to routing IP packets: 1. How to pass a packet from an input interface to the output interface.
Spring Routing: Part I Section 4.2 Outline Algorithms Scalability.
Fundamentals of Computer Networks ECE 478/578
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
Routing and Routing Protocols CCNA 2 v3 – Module 6.
1 Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. Dynamic Routing Protocols II OSPF.
William Stallings Data and Computer Communications
The Network Layer.
Routing Metrics for Wireless Mesh Networks
Author:Zarei.M.;Faez.K. ;Nya.J.M.
Instructor Materials Chapter 6: Quality of Service
Dynamic Routing Protocols II OSPF
Delay-Tolerant Networks (DTNs)
DELAY TOLERANT NETWORK
Routing Metrics for Wireless Mesh Networks
Packet Switching Datagram Approach Virtual Circuit Approach
Routing design goals, challenges,
Internet Networking recitation #4
A comparison of Ad-Hoc Routing Protocols
Sensor Network Routing
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Lei Chen and Wendi B. Heinzelman , University of Rochester
Intra-Domain Routing Jacob Strauss September 14, 2006.
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Routing.
Mobile and Wireless Networking
Dynamic Routing Protocols II OSPF
by Saltanat Mashirova & Afshin Mahini
Routing Metrics for Wireless Mesh Networks
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks
Kevin Lee & Adam Piechowicz 10/10/2009
A survey in Delay Tolerant Networks Andrew Steinberg and Rafael Papa.
Switching Techniques.
Chapter 3 Part 3 Switching and Bridging
Routing.
Congestion Control Reasons:
Vinay Singh Graduate school of Software Dongseo University
A Routing Protocol for WLAN Mesh
Routing.
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
Presentation transcript:

DTN Routing CMPE 257 Philip P. Mathew 9/17/2018

DTN Delay and Disruption Tolerant Networks. Contact between nodes within the network may not be available for long durations. Long duration link failures. End to end paths may not be available always. 9/17/2018

DTN examples Mobile sensor networks for tracking wild life. Inter planetary networks. Military or Disaster recovery networks deployed in an area with limited coverage 9/17/2018

Routing Objectives Maximize the probability of message delivery Minimum use of storage resources Maximum energy efficiency. Minimize hop count and reduce the message delivery latency. 9/17/2018

Routing Challenges No end-to-end path. Prolonged link failures. Traditional MANET Ad-hoc routing protocols like AODV and DSR would fail. Prolonged link failures. Forced discarding of data when buffers are exhausted. Routing Loops. Frequent topology changes due to the mobility of the nodes. 9/17/2018

DTN Routing Store and forward method for routing. Nodes maintain buffers for message storing. Queues are maintained for message management. ACKS are piggybacked on messages. 9/17/2018

DTN Routing Classifications Protocols that Replicate Packets Epidemic Spray & Wait Prophet Rapid Protocols that Forward single copy of Packets Simple Graph Moby space Oracle based (Jane et al) 9/17/2018

Epidemic Routing Random pair wise exchange of message between mobile ad-hoc nodes. Each node maintains a buffer for messages originating from the host. Each node maintains buffer for messages stored on behalf of other nodes. 9/17/2018

Epidemic Routing – Msg Id Messages are identified by a unique identifier. Message id is 32 bit, 16 bit host identifier and 16 bit message identifier. A hash table indexes this list of messages, using the message identifier as the key. Summary vector bitmap maintained by hosts, indicates the entries filled in the hash table. 9/17/2018

Epidemic –Msg Exchange Hosts exchange summary vector. Based on summary vector, hosts requests copies of messages that it has not seen. Hosts have complete autonomy in accepting a message. Hosts reject messages, if the message size is larger than a specific size. if the messages are destined to a specific host. 9/17/2018

Epidemic Routing – Msgs Messages are associated with hop count. Hop count is similar to IP TTL field ACK field requests an acknowledgement for a message received. ACK’s are piggybacked on messages. 9/17/2018

Epidemic Routing – Msg Buffer Message buffer size at a node is limited. Buffer is implemented as a FIFO Differentiated QOS for distributing the buffer space efficiently among hosts. 9/17/2018

Epidemic – performance* 9/17/2018

Epidemic – Performance* 9/17/2018

Epidemic - conclusion A higher delivery rate require larger memory resources. A method for identifying dead messages and purge them saves resources. Employing a good QOS mechanism to allocate priority queuing improve performance. 9/17/2018

PREP Prioritized epidemic routing Prioritize bundles based on cost to destination Cost from source Expiry time Generation time Average availability of the nodes 9/17/2018

PREP - Continue Average availability of the nodes is epidemically distributed to other nodes. Two modular independent components A topology awareness scheme that enable the routing cost from a source to destination. Average Availability metrics (AA) associated with each link. 9/17/2018

PREP - AA AA measure the average amount of time in the near future the link would be available Ta is the time in the most recent past for which up/down information is available Tm is a configured “max window” time. Ti = min(Ta, Tm). Tup be the total time within Ti that the link was “up”. AAds = Tup/Ti 9/17/2018

PREP-LSA Link State Advertisement messages advertises links and AA of links. Each LSA is associated with incremental version number. LSA is disseminated using epidemic routing. Whenever there is a change in AA above or below a threshold an LSA is generated. 9/17/2018

Bundle drop policy A bundle is a data unit or data and meta data of a session. Each bundle is associated with a drop priority. Drop priority is based on the cost of lowest cost path from Src to Dest High drop priority is given to bundles that have the high cost from Src to Dest. When buffers are full, bundles with higher drop priority are dropped first. 9/17/2018

Bundles transmission Priority Transmission priority Pt, is based on two factors. The peer to which the transmission is to be done has a smaller cost to destination, smaller cost higher priority. Time to expire field of the bundle, low value of TTL, high priority. Bundles with low value of Pt (high priority), gets transmitted first. 9/17/2018

PREP - performance Delivery rate 20% better than Epidemic. 54 % better than AODV. Delivery rate independent of the transmission range. Low storage parameter Delivery rate of epidemic falls linearly PREP remains almost flat. 9/17/2018

Spray & Wait Sprays message copies until enough copies are sprayed with guarantee for delivery. When enough copies have been sprayed, the nodes change to direct transmission. Two phases Spray phase, L copies of the message are spread initially. Wait phase, if destination is not found during the spraying phase, each node carrying a copy of the message, does direct transmission. 9/17/2018

Spray & Wait Spray & Wait performs fewer transmission that Epidemic. Contention is low under high traffic loads. Optimal delivery delay. Highly scalable despite changes in network size. 9/17/2018

Binary Spray and Wait Copies n/2 copies out of the n messages (n > 1) to the next node encountered (which don’t have any copies of n). If n == 1, node does direct transmission 9/17/2018

Spray and Wait Protocol Choosing L to achieve the expected delay. The minimum number of copies Lmin, needed for Spray and Wait to achieve an expected delay at most aEDopt is independent of the size of the network N and transmission range K, and only depends on a and the number of nodes M to destination. Estimating L when network parameters are unknown. 9/17/2018

Spray and Wait performance Spray & Wait overcome the short comings of Epidemic and flooding based schemes. Spray & Wait outperforms other schemes in terms of delivery delay and completed transactions. Highly scalable as the network connectivity level increases. 9/17/2018

Prophet Routing Probabilistic DTN Routing Protocol History of encounters Transitivity algorithm for communication. Alternative to epidemic routing Lower buffer space and bandwidth demand Equal or better performance when the above resources are limited. 9/17/2018

Delivery Predictability Vector PROPHET uses a probability vector for message exchange. Delivery predictability is established at every node , for each known destinations of the node. 0 <= P(A, B) < = 1, indicates the probability for node A message exchange to node B. Vector contain Delivery Predictability information. Two prophet nodes exchange summary vectors. 9/17/2018

Summary Vector Summary vectors contain the identifiers for the bundles each node carries Delivery Predictability information for the destinations known by the node. Internal Delivery Predictability vector is updated 9/17/2018

Computation of Delivery Predictability Delivery Predictability zero for nodes that don’t have any delivery predictability stored. Nodes often encountered have a high delivery predictability. P(A,B) = P(A,B)_old + ( 1 - P_(A,B)_old ) * P_encounter, P_encounter >= 0 and <=1. Delivery predictability values age, if the nodes do not encounter for a long time. P_(A,B) = P_(A,B)_old * gamma^K Gamma is the aging constant K is the numer of time units elapased after the last time the matrix was aged. 9/17/2018

Delivery Predictability Delivery predictability is transitive. P_(A,C) = P_(A,C)_old + ( 1 - P_(A,C)_old ) * P_(A,B) * P_(B,C) * beta. Where beta is a scaling constant for transitivity, beta >=0 and beta <= 1. 9/17/2018

Optimizations A list of NUM_P delivery predictabilities are kept for every node. When a new delivery predictability is computed the oldest one is discarded. The average of NUM_P delivery predictabilities The newest value of delivery predictability is used for computations. Average is used for forwarding decisions 9/17/2018

Optimizations Exponential Weighted Moving Average of the delivery predictability is used for forwarding decisions. Forwarding strategies and queueing decisions depending on the special conditions of the nodes. For neighbor discovery and maintenance PROPHET uses lower layers neighbor discovery protocol. 9/17/2018

Protocol Neighbor discovery Information Exchange Phase. Uses Routing Information base dictionary TLV. Parameters for computing delivery predictability. Parameter Recommended Value P_encounter .75 beta .25 gamma .99 9/17/2018

Protocol Nodes receive Bundle offer TLV. Nodes send Bundle offer TLV Nodes request Bundle request TLV. Pass custody of a bundle to another node. PROPHET ACK’s. 9/17/2018

Queuing Policies Evict First In First Out (FIFO). Evict Most Forwarded First (MOFO). Evict Most Favorably Forwarded First (MOPR). Keep a variable FAV for each bundle in the queue, initialized to zero. Each time the bundle is forwarded, update FAV. FAV_new = FAV_old + P (Predictability Metric) Evict Shortest Life Time First (SHLI). Evict Least Probable First (LEPR) (Low delivery probability). 9/17/2018

Security Considerations Attack prevention solution. Sending nodes sign all bundles. 9/17/2018

RAPID Resource Allocation Protocol for Intentional DTN problem. Allocates resources to packets to optimize an adminstrator specified routing metric. Bandwidth is allocated to a set of packets. Oppurtunistic replication of packets. 9/17/2018

RAPID - Tracks network resources through a control plane. Uses an in-band channel for exchanging network information among nodes. Uses a fraction of the bandwidth for exchanging network info. RAPID computes the effect of replication on the routing while accounting for resource constraints (Intentional routing). 9/17/2018

RAPID – structural comparison Method Routing Type Storage Bandwidth Epidemic Replication Unlimited Spray & Wait Prophet Finite Jain et al Forwarding RAPID Modified Dijikstra 9/17/2018

RAPID - design Computes a per packet Utility function to optimize a particular routing metrics. Replicate packets that results in high per packet utility function. The bandwidth is taken into account. Parameters Di – Packet i, expected delay Ti - Time since creation of i Ti + Ai ai - Random variable that determine the remaining time to deliver. Ai – Expected remaining time E(ai). Mxz – Intermeeting time between nodes x and z. 9/17/2018

RAPID - Protocol rapid(X, Y ): Step 1. Initialization: Obtain metadata from Y about packets in its buffer as well as metadata it collected over past meetings (detailed in Section Step 2. Direct delivery: Deliver packets destined to Y in decreasing order of creation times. Step 3. Replication: For each packet i in node X’s buffer. (a) If i is already in Y ’s buffer (as determined from the metadata), ignore i. (b) Estimate marginal utility, Ui/si, of replicating i to Y . (c) Replicate packets in decreasing order of marginal utility. Step 4. Termination: End transfer when out of radio range or all packets replicated. 9/17/2018

RAPID - Performance 9/17/2018

RAPID - Performance 9/17/2018

RAPID - Performance 9/17/2018

RAPID performance 9/17/2018

References Epidemic Routing for Partially-Connected Ad Hoc Networks Amin Vahdat and David Becker, Department of Computer Science Duke University Prioritized Epidemic Routing for Opportunistic Networks Ram Ramanathan, Richard Hansen, Prithwish Basu,Regina Rosales-Hain,Rajesh Krishnan Spray and Wait: An Efficient Routing Scheme for Intermittently Connected Mobile Networks Thrasyvoulos, Spyropoulos,Konstantinos Psounis, Cauligi S. Raghavendra Probabilistic Routing Protocol for Intermittently Connected Networks draft-irtf-dtnrg-prophet-06, A. Lindgren,A. Doria July 12, 2010 DTN Routing as a Resource Allocation Problem Aruna Balasubramanian Brian Neil Levine Arun Venkataramani October 25, 2009 9/17/2018