Juan-Antonio CorderoPhilippe JacquetEmmanuel Baccelli Orlando, FL -- March 29 th, 2012 Impact of Jitter-based Techniques on Flooding over Wireless Ad hoc.

Slides:



Advertisements
Similar presentations
Ou Liang, Ahmet Sekercioglu and Nallasamy Mani
Advertisements

Delta Confidential 1 5/29 – 6/6, 2001 SAP R/3 V4.6c PP Module Order Change Management(OCM)
EE:450 – Computer Networks
Advanced Piloting Cruise Plot.
1 Security for Ad Hoc Network Routing. 2 Ad Hoc Networks Properties Mobile Wireless communication Medium to high bandwidth High variability of connection.
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
Chapter 1 The Study of Body Function Image PowerPoint
1 Routing in Multi-Radio, Multi-Hop Wireless Mesh Networks Richard Draves, Jitendra Padhye, and Brian Zill Microsoft Research.
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 11 Information.
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 12 Cross-Layer.
Page 1 Approximately Maximum Bandwidth Routing for Slotted Wireless Ad Hoc Networks Approximately Maximum Bandwidth Routing for Slotted Wireless Ad Hoc.
UNITED NATIONS Shipment Details Report – January 2006.
International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences 1 Interference.
1 A Static-Node Assisted Adaptive Routing Protocol in Vehicular Networks Yong Ding, Chen Wang, Li Xiao {dingyong, wangchen, Department.
Fundamental Relationship between Node Density and Delay in Wireless Ad Hoc Networks with Unreliable Links Shizhen Zhao, Luoyi Fu, Xinbing Wang Department.
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science R3: Robust Replication Routing in Wireless Networks with Diverse Connectivity Characteristics.
1 Multi-Channel Wireless Networks: Capacity and Protocols Nitin H. Vaidya University of Illinois at Urbana-Champaign Joint work with Pradeep Kyasanur Chandrakanth.
Scalable Routing In Delay Tolerant Networks
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Title Subtitle.
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
FACTORING ax2 + bx + c Think “unfoil” Work down, Show all steps.
Addition Facts
2010 fotografiert von Jürgen Roßberg © Fr 1 Sa 2 So 3 Mo 4 Di 5 Mi 6 Do 7 Fr 8 Sa 9 So 10 Mo 11 Di 12 Mi 13 Do 14 Fr 15 Sa 16 So 17 Mo 18 Di 19.
ZMQS ZMQS
Università degli Studi di Firenze 08 July 2004 COST th MCM - Budapest, Hungary 1 Cross-layer design for Multiple access techniques in wireless communications.
A Bandwidth Allocation/Sharing/Extension Protocol for Multimedia Over IEEE Ad Hoc Wireless LANs Shiann-Tsong Sheu and Tzu-fang Sheu IEEE JOURNAL.
Solve Multi-step Equations
Richmond House, Liverpool (1) 26 th January 2004.
BT Wholesale October Creating your own telephone network WHOLESALE CALLS LINE ASSOCIATED.
MIMO Broadcast Scheduling with Limited Feedback Student: ( ) Director: 2008/10/2 1 Communication Signal Processing Lab.
高度情報化社会を支えるネットワーキング技術 (大阪大学 工学部説明会資料)
ABC Technology Project
1 Generating Network Topologies That Obey Power LawsPalmer/Steffan Carnegie Mellon Generating Network Topologies That Obey Power Laws Christopher R. Palmer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Distance Vector Routing Protocols Routing Protocols and Concepts –
Mobile IP: Multicast Service Reference: Multicast routing protocol in mobile networks; Hee- Sook Shin; Young-Joo Suh;, Proc. IEEE International Conference.
1 Capacity analysis of mesh networks with omni or directional antennas Jun Zhang and Xiaohua Jia City University of Hong Kong.
Chapter 15 Integrated Services Digital Network ISDN Services History Subscriber Access Layers BISDN WCB/McGraw-Hill The McGraw-Hill Companies, Inc., 1998.
Countering DoS Attacks with Stateless Multipath Overlays Presented by Yan Zhang.
IP Multicast Information management 2 Groep T Leuven – Information department 2/14 Agenda •Why IP Multicast ? •Multicast fundamentals •Intradomain.
VOORBLAD.
1 Analysis of Random Mobility Models with PDE's Michele Garetto Emilio Leonardi Politecnico di Torino Italy MobiHoc Firenze.
Making Time-stepped Applications Tick in the Cloud Tao Zou, Guozhang Wang, Marcos Vaz Salles*, David Bindel, Alan Demers, Johannes Gehrke, Walker White.
Factor P 16 8(8-5ab) 4(d² + 4) 3rs(2r – s) 15cd(1 + 2cd) 8(4a² + 3b²)
Squares and Square Root WALK. Solve each problem REVIEW:
Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
© 2012 National Heart Foundation of Australia. Slide 2.
Understanding Generalist Practice, 5e, Kirst-Ashman/Hull
GG Consulting, LLC I-SUITE. Source: TEA SHARS Frequently asked questions 2.
Addition 1’s to 20.
1 S Digital Communication Systems Advanced Modulation and Random Access Techniques.
25 seconds left…...
Januar MDMDFSSMDMDFSSS
Week 1.
Location Services for Geographic Routing. Geographic Routing Three major components of geographic routing:  Location services (dissemination of location.
We will resume in: 25 Minutes.
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
Network Operations & administration CS 4592 Lecture 15 Instructor: Ibrahim Tariq.
PSSA Preparation.
Introduction to Ad-hoc & Sensor Networks Security In The Name of God ISC Student Branch in KNTU 4 th Workshop Ad-hoc & Sensor Networks.
1 McGill University Department of Civil Engineering and Applied Mechanics Montreal, Quebec, Canada.
Delay Analysis and Optimality of Scheduling Policies for Multihop Wireless Networks Gagan Raj Gupta Post-Doctoral Research Associate with the Parallel.
Exploring Energy-Latency Tradeoffs for Broadcasts in Energy-Saving Sensor Networks AUTHOR: MATTHEW J. MILLER CIGDEM SENGUL INDRANIL GUPTA PRESENTER: WENYU.
1 4 th International Conference on Systems and Network Communications IEEE ICSNC 2009 Porto, September 2009 Multi-Point Relaying Techniques with.
IDRM: Inter-Domain Routing Protocol for Mobile Ad Hoc Networks C.-K. Chau, J. Crowcroft, K.-W. Lee, S. H.Y. Wong.
Presentation transcript:

Juan-Antonio CorderoPhilippe JacquetEmmanuel Baccelli Orlando, FL -- March 29 th, 2012 Impact of Jitter-based Techniques on Flooding over Wireless Ad hoc Networks Model and Analysis 31st Annual IEEE International Conference on Computer Communications

Link-state routing over MANETs: Estimating the impact of jitter techniques in wireless flooding 2 Motivation: Flooding over wireless ad hoc networks Packet collisions in wireless flooding The jitter technique for flooding Framework: goals, assumptions, approach Main results Discussion Agenda

Link-state routing over MANETs: Estimating the impact of jitter techniques in wireless flooding 3 Motivation Flooding in Wireless Ad hoc Networks Flooding Periodic dissemination of messages over the network Routers participating in flooding: 1) Create and transmit their own messages 2) Receive and forward messages from other routers in the network Example: Link-state routing: OSPF, OLSR Other…

Link-state routing over MANETs: Estimating the impact of jitter techniques in wireless flooding 4 Motivation Wireless Ad hoc Networks Wireless communication Dynamic and unpredictably changing topology Less available bandwidth More updates required (in routing protocols)

Link-state routing over MANETs: Estimating the impact of jitter techniques in wireless flooding 5 Motivation Wireless Ad hoc Networks Wireless communication Dynamic and unpredictably changing topology Less available bandwidth More updates required (in routing protocols) Packet collisions in flooding !

Link-state routing over MANETs: Estimating the impact of jitter techniques in wireless flooding 6 A tx Shared channel (from D) A B B rx processing B tx C C rx processing C tx systematic collision Wireless flooding : Stating the problem A B C D Wireless flooding Packet collisions in flooding

Link-state routing over MANETs: Estimating the impact of jitter techniques in wireless flooding 7 Wireless flooding with jitter | Intuition A tx Shared channel (from D) A B B rx processing B tx C C rx processing C tx random delay for C tx random delay for B tx The jitter technique Jitter for flooding A B C D

Link-state routing over MANETs: Estimating the impact of jitter techniques in wireless flooding 8 Packet piggybacking Wireless flooding with jitter : RFC 5148 Self-generated msg at t=t 1 Received pkt at t=t 0 Assigns a jitter value j to all msgs of the pkt N=1 Extracts N-th msg from the pkt N-th msg needs to be forwarded? Schedule tx at t=t 0 +j Scheduled tx at t=t 2 Next N? Send all msgs scheduled and not sent at t=t 2 Schedule tx at t=t 1 t 2 =t 1 Yes No The jitter technique Jitter for flooding

Link-state routing over MANETs: Estimating the impact of jitter techniques in wireless flooding 9 Advantages Reduction of systematic packet collisions by spreading transmissions Reduction in the number of transmissions due to piggybacking Drawbacks Delay of the flooding operation Increase of the length of the transmitted packets Impact of jitter technique in wireless flooding Main effects

Link-state routing over MANETs: Estimating the impact of jitter techniques in wireless flooding 10 System model Packet arrival ~punctual, homogeneous Poisson process Instantaneous packet transmission All packets received are to be forwarded R In λ in Self-generated λ g Out λ out Impact of jitter technique in wireless flooding Model and assumptions

Link-state routing over MANETs: Estimating the impact of jitter techniques in wireless flooding 11 time (in) Arrival triggering a collecting phase Impact of jitter technique in wireless flooding Variables t t0t0

Link-state routing over MANETs: Estimating the impact of jitter techniques in wireless flooding 12 time (in) … Arrival triggering a collecting phase Impact of jitter technique in wireless flooding Variables t t1t1

Link-state routing over MANETs: Estimating the impact of jitter techniques in wireless flooding 13 time (in) (self) … (in) D(t) avg length of collecting phase t Arrival triggering a collecting phase Effective time of transmission Impact of jitter technique in wireless flooding Variables

Link-state routing over MANETs: Estimating the impact of jitter techniques in wireless flooding 14 Impact of jitter technique in wireless flooding Average duration of collecting phase ODE General solution ( D(0) = 0 ; D(0) = 1 ) Out-packet rate

Link-state routing over MANETs: Estimating the impact of jitter techniques in wireless flooding 15 time (in) (self) … (in) t Arrival triggering a collecting phase Effective time of transmission Impact of jitter technique in wireless flooding Variables G(t) T tx (t)

Link-state routing over MANETs: Estimating the impact of jitter techniques in wireless flooding 16 Impact of jitter technique in wireless flooding In-packet delays Average in-packet cumulated delay before out-packet transmission where Average forwarding delay for an in-packet

Link-state routing over MANETs: Estimating the impact of jitter techniques in wireless flooding 17 Impact of jitter technique in wireless flooding Some particular results Uniformly distributed jitter ( RFC 5148 ) Packet delays: D(t), T tx (t) Packet rate: λ out (λ in, λ g ), λ out (T) JmJm 1/J m pdf T j JmJm 1 cdf T j

Link-state routing over MANETs: Estimating the impact of jitter techniques in wireless flooding 18 Impact of jitter technique in wireless flooding Delays before transmission T tx (t) Avg time of transmission D(t) Avg duration of collecting phase ( λ in = 4 pkt/sec, λ g = 0.2 pkt/sec, J m = 1 sec) Model results D(t) T tx (t)

Link-state routing over MANETs: Estimating the impact of jitter techniques in wireless flooding 19 Impact of jitter technique in wireless flooding Out-packet rate λ out Out-packet rate (pkts/sec) (J m = 1 sec) λ g = 0 λ g = 0.9 Model results λ out λ in + λ g

Link-state routing over MANETs: Estimating the impact of jitter techniques in wireless flooding 20 λ out Out-packet rate (pkts/sec) ( λ in = 4 pkts/sec, λ g = 0.2 pkts/sec ) Impact of jitter technique in wireless flooding Out-packet rate Model results with simulations

Link-state routing over MANETs: Estimating the impact of jitter techniques in wireless flooding 21 Discussion & Conclusions Future work Non-instantaneous packet transmissions ( packet collisions) More jitter … less collisions ? Network experimental results RFC 5148 : jitter + piggybacking for flooding (OLSR, OSPF, DYMO…) Theoretical model : additional delay D(t) vs. packet rate ( λ out ) reduction Generality of results Model limitations

Link-state routing over MANETs: Estimating the impact of jitter techniques in wireless flooding 22 Questions ?

Link-state routing over MANETs: Estimating the impact of jitter techniques in wireless flooding 23 Backup slides

Link-state routing over MANETs: Estimating the impact of jitter techniques in wireless flooding 24 Transition equations for D(t) and F(t) Avg duration of collecting phase Avg cumulative delay of in-packets arrived within a collecting phase

Link-state routing over MANETs: Estimating the impact of jitter techniques in wireless flooding 25 Some values… Jitter scale (Friedman, Hay & Kliot, 2009) For Jm = t = 10 msec, λ in = 15 pkt/sec, λ g = 0,25 pkt/sec, λ out = 14,2 pkt/sec (-7%) D(t) = 9,74 msec, T tx (t) = 8,92 msec (worst case)

Link-state routing over MANETs: Estimating the impact of jitter techniques in wireless flooding 26 References (Technical Report, 2009) R. Friedman; D. Hay; G. Kliot: Jittering Broadcast Transmissions in MANETs: Quantification and Implementation Strategies. Department of Computer Science, Technion – Institute of Technology of Israel. (Journal, 2004) C. Adjih; E. Baccelli; T. Clausen; P. Jacquet; G. Rodolakis: Fish Eye OLSR Scaling Properties. In: IEEE Journal of Communications and Networks (JCN), Special Issue on Mobile Ad Hoc Wireless Networks, Volume 6, Number 4, pp , IEEE, December (Conference, 2003) T. Henderson et al.: A Wireless Interface Type for OSPF, Proceedings of the IEEE Military Communications Conference (MILCOM), pp , Boston, MA (United States), October (Conference, 1998) J. Broch; D. A. Maltz; D. B. Johnson; Y.-C. Hu; J. Jetcheva: A performance comparison of multi-hop wireless ad hoc network routing protocols, Proc. ACM Annual International Conference on Mobile Computing and Networking (MobiCom98), pp. 85–97, Dallas, TX (United States), October 1998.