Improving Opportunistic Data Dissemination via Known Vector

Slides:



Advertisements
Similar presentations
Supporting Cooperative Caching in Disruption Tolerant Networks
Advertisements

Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
On Using Probabilistic Forwarding to Improve HEC-based Data Forwarding in Opportunistic Networks Ling-Jyh Chen 1, Cheng-Long Tseng 2 and Cheng-Fu Chou.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
By Libo Song and David F. Kotz Computer Science,Dartmouth College.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
© nCode 2000 Title of Presentation goes here - go to Master Slide to edit - Slide 1 Reliable Communication for Highly Mobile Agents ECE 7995: Term Paper.
ICNP'061 Benefit-based Data Caching in Ad Hoc Networks Bin Tang, Himanshu Gupta and Samir Das Computer Science Department Stony Brook University.
Data Sharing in OSD Environment Dingshan He September 30, 2002.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Opportunistic Routing Based Scheme with Multi-layer Relay Sets in Cognitive Radio Networks Ying Dai and Jie Wu Department of Computer and Information Sciences.
1 A Distributed Algorithm for Joint Sensing and Routing in Wireless Networks with Non-Steerable Directional Antennas Chun Zhang *, Jim Kurose +, Yong Liu.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Does Packet Replication Along Multipath Really Help ? Swades DE Chunming QIAO EE Department CSE Department State University of New York at Buffalo Buffalo,
Energy-Efficient Video Multicast in 4G Wireless Systems Ya-Ju Yu 1, Pi-Cheng Hsiu 2,3, and Ai-Chun Pang 1,4 1 Graduate Institute of Networking and Multimedia,
Securing Every Bit: Authenticated Broadcast in Wireless Networks Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zarko Milosevic, and Calvin Newport.
Deadline-sensitive Opportunistic Utility-based Routing in Cyclic Mobile Social Networks Mingjun Xiao a, Jie Wu b, He Huang c, Liusheng Huang a, and Wei.
Incentive Based Data Sharing in Delay Tolerant Mobile Networks.
IEEE Globecom 2010 Tan Le Yong Liu Department of Electrical and Computer Engineering Polytechnic Institute of NYU Opportunistic Overlay Multicast in Wireless.
Evgueni (Eugene) Khokhlov1 A Mobility-Centric Data Dissemination Algorithm for Vehicular Networks (MDDV) Evgueni (Eugene) Khokhlov.
A Hybrid Routing Approach for Opportunistic Networks Ling-Jyh Chen 1, Chen-Hung Yu 2, Tony Sun 3, Yung-Chih Chen 1, and Hao-hua Chu 2 1 Academia Sinica.
PPWEB: A Peer-to-Peer Approach for Web Surfing On the Go Ling-Jyh Chen, Ting-Kai Huang Institute of Information Science, Academia Sinica, Taiwan Guang.
PRoPHET+: An Adaptive PRoPHET- Based Routing Protocol for Opportunistic Network Ting-Kai Huang, Chia-Keng Lee and Ling-Jyh Chen.
User-Centric Data Dissemination in Disruption Tolerant Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering Pennsylvania State University.
Web Surfing on the Move: Needs, Opportunities, and Challenges Ling-Jyh Chen Institute of Information Science Academia Sinica,
An Adaptive Energy-Efficient and Low- Latency MAC for Data Gathering in Wireless Sensor Networks Gang Lu, Bhaskar Krishnamachari, and Cauligi S. Raghavendra.
A Scalable Routing Protocol for Ad Hoc Networks Eric Arnaud Id:
1 Utilizing Shared Vehicle Trajectories for Data Forwarding in Vehicular Networks IEEE INFOCOM MINI-CONFERENCE Fulong Xu, Shuo Gu, Jaehoon Jeong, Yu Gu,
An Evaluation of Routing Reliability in Non-Collaborative Opportunistic Networks Ling-Jyh Chen, Che-Liang Chiou, and Yi-Chao Chen Institute of Information.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
UCLA ENGINEERING Computer Science RobustGeo: a Disruption-Tolerant Geo-routing Protocol Ruolin Fan, Yu-Ting Yu *, Mario Gerla UCLA, Los Angeles, CA, USA.
Social-Aware Stateless Forwarding in Pocket Switched Networks Soo-Jin SHIN
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
A Multicast Routing Algorithm Using Movement Prediction for Mobile Ad Hoc Networks Huei-Wen Ferng, Ph.D. Assistant Professor Department of Computer Science.
Grid-Based Energy-Efficient Routing from Multiple Sources to Multiple Mobile Sinks in Wireless Sensor Networks Kisuk Kweon, Hojin Ghim, Jaeyoung Hong and.
Routing in Delay Tolerant Network Qing Ye EDIFY Group of Lehigh University.
Chien-Shiu Lin, Wei-Shyh Chang, Ling-Jyh Chen, Cheng-Fu Chou, and Ting-Kai Huang.
Courtesy Piggybacking: Supporting Differentiated Services in Multihop Mobile Ad Hoc Networks Wei LiuXiang Chen Yuguang Fang WING Dept. of ECE University.
Doc.: IEEE /r0 Submission November 2005 Xin Yu and Hang LiuSlide 1 Implementation and Evaluation of AODV with Proactive Route Announcements.
PROJECT DOMAIN : NETWORK SECURITY Project Members : M.Ananda Vadivelan & E.Kalaivanan Department of Computer Science.
COMP8330/7330/7336 Advanced Parallel and Distributed Computing Communication Costs in Parallel Machines Dr. Xiao Qin Auburn University
Speaker: Ju-Mei Li Virtual Paths Routing: A Highly Dynamic Routing Protocol for Ad Hoc Wireless Networks Abdulrahman H. Altalhi and Golden G. Richard Computer.
Cooperative Caching in Wireless P2P Networks: Design, Implementation And Evaluation.
Reliable Transmission
Authors: Jiang Xie, Ian F. Akyildiz
Delay-Tolerant Networks (DTNs)
Ad-hoc Networks.
A Study of Group-Tree Matching in Large Scale Group Communications
Chapter 25: Advanced Data Types and New Applications
Internet Networking recitation #12
Net 435: Wireless sensor network (WSN)
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
ECE 544 Protocol Design Project 2016
INFOCOM 2013 – Torino, Italy Content-centric wireless networks with limited buffers: when mobility hurts Giusi Alfano, Politecnico di Torino, Italy Michele.
Kevin Lee & Adam Piechowicz 10/10/2009
Effective Replica Allocation
A Probabilistic Routing Protocol for Mobile Ad Hoc Networks
Staged Refresh Timers for RSVP
Improving Routing & Network Performances using Quality of Nodes
Data-Centric Networking
Improving Bluetooth EDR Data Throughput Using FEC and Interleaving
Distributed Systems CS
Tony Sun, Guang Yang, Ling-Jyh Chen, M. Y. Sanadidi, Mario Gerla
Ch 17 - Binding Protocol Addresses
Vinay Singh Graduate school of Software Dongseo University
Ling-Jyh Chen and Ting-Kai Huang
PPWEB: A Peer-to-Peer Approach for Web Surfing On the Go
On Constructing k-Connected k-Dominating Set in Wireless Networks
Distributed Systems CS
Presentation transcript:

Improving Opportunistic Data Dissemination via Known Vector Jyh-How Huang1, Ying-Yu Chen2, Yi-Chao Chen2, Shivakant Mishra3, and Ling-Jyh Chen2 1 Department of Electronic Engineering, National Taiwan University 2 Institute of Information Science, Academia Sinica 3 Department of Computer Science, University of Colorado Boulder

Motivation Replication is the most popular design choice for opportunistic network routing protocols. For example, the Epidemic Routing protocol sends identical copies of a message over multiple paths to mitigate the effects of a single path failure. Two encountered nodes may have some messages in common. It is necessary to avoid sending the messages that the other node already has.

Motivation (Cont.) Intuitively, exchanging meta-messages with indices of messages in the buffer can solve the problem. However, meta-message exchange may become a big overhead. We propose a new scheme, called Known Ventor (KV), to reduce the overhead.

Meta-Message Meta-message is used to avoid sending duplicate messages that the other node already has. Most protocols apply a scheme called Summary Vector as the meta-message. A summary vector comprises all identifiers of the messages buffered on the node. An identifier of a message is unique for each message in the network. Let’s take the Epidemic Routing protocol as an example 

Epidemic Routing When two nodes encounter, they exchange the summary vector with each other. Each node compares the received summary vector to its buffer, and then requests the messages that are not in its buffer. We call the request of messages as Request Vector. After receiving a request vector, the node transmits the requested messages.

Example of Epidemic Routing Define: BUFx: the set of messages in the buffer of node x SVx,y: the summary vector generated by node x for node y RVx,y: the request vector generated by node x for node y Node i Node j 1. Before encounter BUFi = {M1, M2, M3} BUFj = {M3, M4, M5} 2. Exchange summary vectors SVi,j = {M1, M2, M3} SVj,i = {M3, M4, M5} 3. Send a request vector and transmit messages RVi,j = {M4, M5} RVj,i = {M1, M2} 4. After transmission BUFi = {M1, M2, M3, M4, M5} BUFj = {M1, M2, M3, M4, M5} SV results in tremendous overhead when 1) nodes move in a group; and 2) network connectivity is good.

Our Approach: Known Vector The idea: if a node knows which messages are not interesting to the other node, he removes those message IDs in advance, and thus reduces the SV size. A simple solution: Keep a record about who has the message Send the record along with the message

The Known Vector Scheme In the Known Vector scheme, each message has two parts: the original data a known vector A known vector is a list of nodes who have already “known” this message. Known Vectors of the same message may be different on different nodes (i.e., each node has its own view of the KVs for each stored message)

Why using Known Vector? The Known Vector scheme can be considered as a pre-processor that removes non-interested meta-messages from a Summary Vector. Every protocol that implements the Summary Vector scheme can apply the Known Vector scheme to improve its performance.

Procedures of Known Vector (0/4) Define: BUFx: the set of messages in the buffer of node x SVx,y: the summary vector generated by node x for node y RVx,y: the request vector generated by node x for node y Mk,x: the copy of a message Mk resided in node x KVMk,x: the known vector of Mk,x

Procedures of Known Vector (1/4) Generate and exchange summary vectors: Node x generates SVx,y that contains IDs of the messages whose known vectors do not contain node y. For example, when node i and j encounter: - Status of node i: BUFi={M1, M2}, KVM1,i={m, j, n}, KVM2,i={a, b} - Status of node j: BUFj={M3, M1}, KVM3,j={a}, KVM1,j={m} - Node i generate SVi,j={M2} (Note: M1 is not included because KVM1,i contains j.) - Node j generate SVj,i={M3, M1}

Procedures of Known Vector (2/4) 2. Generate and send request vectors: After receiving SVy,x, node x requests all messages in SVy,x but not in BUFx, that is, RVx,y = SVy,x – BUFx For the previous example: - Node i generates: RVi,j={M3} (Note: Node i does not request M1.) - Node j generates: RVj,i={M2}

Procedures of Known Vector (3/4) 3. Transmit messages requested: 3.1) For every message Mk transmitted from node x to node y, node x duplicates Mk,x as Mk,x’ including KVMk,x, and sends it to node y. 3.2) After transmission: KVMk,x <- KVMk,x U {y} Mk,y <- Mk,x’, KVMk,y <- KVMk,x’ U {x} For the previous example: - After node i sends M2,i’ to node j: KVM2,i={a,b,j}, KVM2,j={a,b,i} - After node j sends M3,j’ to node i: KVM3,j={a,i}, KVM3,i={a,j}

Procedures of Known Vector (4/4) 4. Update known vectors: Node x add y into the known vector of every message in the set SVx,y – RVy,x because node y is supposed to request every message in SVx,y unless it already has that message. For the previous example: - SVi,j – RVj,i = {} - SVj,i – RVi,j = {M1} => KVM1,j={m,i}

Evaluation Evaluate the performance on top of Epidemic Routing Simulator: The ONE The Opportunistic Network Environment simulator A Java-based simulator

Evaluation Scenarios Use two realistic wireless network traces: ZebraNet iMote Trace Name ZebraNet iMote Device N/A Network Type Bluetooth Duration(days) 16 3 Devices participating 34 274 Number of contacts 31,693 28,217 Avg # Contacts/pair/day 3.53086 0.12574

Evaluation Settings Messages: Transmission rate: 240Kbps Generated in the first 10% of the simulation time Are either 1K bytes or 100 bytes With a Poisson rate of 40 seconds/message in iMote and 200 seconds/message in ZebraNet Transmission rate: 240Kbps

Evaluation I: Infinite Buffer CDF(cumulative distribution function) of delivery ratio: - In both scenario, the two schemes are comparable.

Evaluation I: Infinite Buffer CDF of overhead / total data transmitted: - In iMote, KV reduces about 16% of overhead - In ZebraNet, KV reduces about 31% of overhead

Evaluation II: Finite Buffer CDF of delivery ratio: Message size is fixed at 100 bytes. The KV scheme outperforms the SV scheme in all test cases, and the performance gain increases as the buffer size decreases. For example, the performance gain is about 16%, 7%, and 3% in the ZebraNet when the buffer is 20k, 40k, and 60k bytes.

Evaluation II: Finite Buffer CDF of overhead / total data transmitted: Message size is fixed at 100 bytes. The KV scheme is able to reduce traffic overhead when comparing with the SV scheme. For example, the KV scheme reduces about 77%, 77%, and 71% in ZebraNet when the buffer size is 20k, 40k, and 60k bytes.

Conclusion The SV overhead may increase substantially as the number of messages buffered on each node increases. We propose a novel approach, Known Vector, to mitigate the overhead. The evaluation results show that the two schemes are comparable when the buffer is infinite. However, when the buffer is constrained, the Known Vector scheme is much superior to the Summary Vector scheme.

Thanks! http://www.iis.sinica.edu.tw/~cclljj/ http://nrl.iis.sinica.edu.tw/