Supporting Cooperative Caching in Disruption Tolerant Networks

Slides:



Advertisements
Similar presentations
Robin Kravets Tarek Abdelzaher Department of Computer Science University of Illinois The Phoenix Project.
Advertisements

Transportation-aware Routing in Delay Tolerant Networks (DTNs) Asia Future Internet 2008 Taekyoung Kwon Seoul National University.
ROUTING IN INTERMITTENTLY CONNECTED MOBILE AD HOC NETWORKS AND DELAY TOLERANT NETWORKS: OVERVIEW AND CHALLENGES ZHENSHENG ZHANG.
Capacity of wireless ad-hoc networks By Kumar Manvendra October 31,2002.
Mobility Increase the Capacity of Ad-hoc Wireless Network Matthias Gossglauser / David Tse Infocom 2001.
BY PAYEL BANDYOPADYAY WHAT AM I GOING TO DEAL ABOUT? WHAT IS AN AD-HOC NETWORK? That doesn't depend on any infrastructure (eg. Access points, routers)
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Group #1: Protocols for Wireless Mobile Environments.
A Probabilistic Misbehavior Detection Scheme towards Efficient Trust Establishment in Delay-tolerant Networks Haojin Zhu, Suguo Du, Zhaoyu Gao, Mianxiong.
Forwarding Redundancy in Opportunistic Mobile Networks: Investigation and Elimination Wei Gao 1, Qinghua Li 2 and Guohong Cao 3 1 The University of Tennessee,
Are You moved by Your Social Network Application? Abderrahmen Mtibaa, Augustin Chaintreau, Jason LeBrun, Earl Oliver, Anna-Kaisa Pietilainen, Christophe.
By Libo Song and David F. Kotz Computer Science,Dartmouth College.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
Peer-to-Peer Based Multimedia Distribution Service Zhe Xiang, Qian Zhang, Wenwu Zhu, Zhensheng Zhang IEEE Transactions on Multimedia, Vol. 6, No. 2, April.
ICNP'061 Benefit-based Data Caching in Ad Hoc Networks Bin Tang, Himanshu Gupta and Samir Das Computer Science Department Stony Brook University.
Building Low-Diameter P2P Networks Eli Upfal Department of Computer Science Brown University Joint work with Gopal Pandurangan and Prabhakar Raghavan.
1 CAPS: A Peer Data Sharing System for Load Mitigation in Cellular Data Networks Young-Bae Ko, Kang-Won Lee, Thyaga Nandagopal Presentation by Tony Sung,
ICNP'061 Benefit-based Data Caching in Ad Hoc Networks Bin Tang, Himanshu Gupta and Samir Das Department of Computer Science Stony Brook University.
Novel Self-Configurable Positioning Technique for Multihop Wireless Networks Authors : Hongyi Wu Chong Wang Nian-Feng Tzeng IEEE/ACM TRANSACTIONS ON NETWORKING,
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
Wei Gao Joint work with Qinghua Li, Bo Zhao and Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University Multicasting.
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks Dr. Baruch Awerbuch, David Holmer, and Herbert Rubens Johns Hopkins University Department.
Ad Hoc Wireless Routing COS 461: Computer Networks
© Y. Zhu and Y. University of North Carolina at Charlotte, USA 1 Chapter 1: Social-based Routing Protocols in Opportunistic Networks Ying Zhu and.
UNIVERSITY of NOTRE DAME COLLEGE of ENGINEERING Preserving Location Privacy on the Release of Large-scale Mobility Data Xueheng Hu, Aaron D. Striegel Department.
Hongyu Gong, Lutian Zhao, Kainan Wang, Weijie Wu, Xinbing Wang
EAIT, February 2006 A Pragmatic Approach towards the Improvement of Performance of Ad Hoc Routing ProtocolsOptimizations To Multipath Routing Protocols.
A Cooperative Diversity- Based Robust MAC Protocol in wireless Ad Hoc Networks Sangman Moh, Chansu Yu Chosun University, Cleveland State University Korea,
1 Optimal Power Allocation and AP Deployment in Green Wireless Cooperative Communications Xiaoxia Zhang Department of Electrical.
Wei Gao1 and Qinghua Li2 1The University of Tennessee, Knoxville
Incentive Based Data Sharing in Delay Tolerant Mobile Networks.
Your Friends Have More Friends Than You Do: Identifying Influential Mobile Users Through Random Walks Bo Han, Aravind Srinivasan University of Maryland.
A novel approach of gateway selection and placement in cellular Wi-Fi system Presented By Rajesh Prasad.
Wireless Sensor Networks COE 499 Energy Aware Routing
I2.1: In-Network Storage PI Presentation by Arun Iyengar NS-CTA INARC Meeting March 2011 Cambridge, MA.
Prediction Assisted Single-copy Routing in Underwater Delay Tolerant Networks Zheng Guo, Bing Wang and Jun-Hong Cui Computer Science & Engineering Department,
Socially-aware pub-sub system for human networks Yaxiong Zhao Jie Wu Department of Computer and Information Sciences Temple University Philadelphia
Lab for Advanced Network Design, Evaluation and Research Mobility Profile based Routing Within Intermittently Connected Mobile Ad hoc Networks (ICMAN)
Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks.
Energy Efficient Phone-to-Phone Communication Based on WiFi Hotspots in PSN En Wang 1,2, Yongjian Yang 1, and Jie Wu 2 1 Dept. of Computer Science and.
Distributed Maintenance of Cache Freshness in Opportunistic Mobile Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering Pennsylvania.
On Exploiting Transient Contact Patterns for Data Forwarding in Delay Tolerant Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering.
Routing In Socially Selfish Delay Tolerant Networks Chan-Myung Kim
Content Sharing over Smartphone-Based Delay- Tolerant Networks.
Scaling Laws for Cognitive Radio Network with Heterogeneous Mobile Secondary Users Yingzhe Li, Xinbing Wang, Xiaohua Tian Department of Electronic Engineering.
Selfishness, Altruism and Message Spreading in Mobile Social Networks September 2012 In-Seok Kang
Communication Paradigm for Sensor Networks Sensor Networks Sensor Networks Directed Diffusion Directed Diffusion SPIN SPIN Ishan Banerjee
PRoPHET+: An Adaptive PRoPHET- Based Routing Protocol for Opportunistic Network Ting-Kai Huang, Chia-Keng Lee and Ling-Jyh Chen.
User-Centric Data Dissemination in Disruption Tolerant Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering Pennsylvania State University.
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
SR: A Cross-Layer Routing in Wireless Ad Hoc Sensor Networks Zhen Jiang Department of Computer Science West Chester University West Chester, PA 19335,
1 Utilizing Shared Vehicle Trajectories for Data Forwarding in Vehicular Networks IEEE INFOCOM MINI-CONFERENCE Fulong Xu, Shuo Gu, Jaehoon Jeong, Yu Gu,
Rate-Based Channel Assignment Algorithm for Multi-Channel Multi- Rate Wireless Mesh Networks Sok-Hyong Kim and Young-Joo Suh Department of Computer Science.
KAIS T On the problem of placing Mobility Anchor Points in Wireless Mesh Networks Lei Wu & Bjorn Lanfeldt, Wireless Mesh Community Networks Workshop, 2006.
Mobility Models for Wireless Ad Hoc Network Research EECS 600 Advanced Network Research, Spring 2005 Instructor: Shudong Jin March 28, 2005.
Ching-Ju Lin Institute of Networking and Multimedia NTU
On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay-Tolerant Networks 1 Wei Gao Guohong Cao Tom La Porta Jiawei Han Presented.
Multicasting in delay tolerant networks a social network perspective networks October2012 In-Seok Kang
Localized Low-Power Topology Control Algorithms in IEEE based Sensor Networks Jian Ma *, Min Gao *, Qian Zhang +, L. M. Ni *, and Wenwu Zhu +
A Multicast Routing Algorithm Using Movement Prediction for Mobile Ad Hoc Networks Huei-Wen Ferng, Ph.D. Assistant Professor Department of Computer Science.
Routing in Delay Tolerant Network Qing Ye EDIFY Group of Lehigh University.
Dynamic Proxy Tree-Based Data Dissemination Schemes for Wireless Sensor Networks Wensheng Zhang, Guohong Cao and Tom La Porta Department of Computer Science.
Courtesy Piggybacking: Supporting Differentiated Services in Multihop Mobile Ad Hoc Networks Wei LiuXiang Chen Yuguang Fang WING Dept. of ECE University.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks Zhao, J.; Cao, G. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 鄭宇辰
1 Along & across algorithm for routing events and queries in wireless sensor networks Tat Wing Chim Department of Electrical and Electronic Engineering.
-1/16- Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks C.-K. Toh, Georgia Institute of Technology IEEE.
TEMPLE UNIVERSITY Deadline-Sensitive Mobile Data Offloading via Opportunistic Communications Guoju Gaoa, Mingjun Xiao∗a, Jie Wub, Kai Hana, Liusheng Huanga.
Wonkwang Shin, Byoung-Yoon Min and Dong Ku Kim
En Wang 1,2 , Yongjian Yang 1 , and Jie Wu 2
Presentation transcript:

Supporting Cooperative Caching in Disruption Tolerant Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering Pennsylvania State University Arun Iyengar and Mudhakar Srivatsa IBM T. J. Watson Research Center

Outline Introduction Network Central Locations (NCLs) Caching Scheme Performance Evaluation Summary & Future Work First of all, I would like to give you an overview about our motivation and the major challenges of supporting cooperative caching in DTNs, and also give you a big picture about our proposed caching scheme.

Disruption Tolerant Networks (DTNs) Consist of hand-held personal mobile devices Laptops, PDAs, Smartphones Opportunistic and intermittent network connectivity Result of node mobility, device power outage or malicious attacks Hard to maintain end-to-end communication links Data transmission via opportunistic contacts

Data Transmission in DTNs Carry-and-Forward Mobile nodes physically carry data as relays Forwarding data opportunistically upon contacts Major problem: appropriate relay selection Based on this basic methodology, a lot of work has been done on developing effective relay selection methods for forwarding data to a pre-specified set of destinations in DTNs. However, in this paper, we target a different, more general but also more challenging problem: data dissemination in DTNs. 0.7 0.5

Providing Data Access in DTNs Active data dissemination Data source actively push data to users being interested in the data Publish/Subscribe Brokers forward data to users according to their subscriptions Caching Based on such opportunistic communication paradigm, our focus in this paper is to provide effective data access to users. i.e., there are some data in the networks, and we make it easy and prompt for the users to have access to them. Actually, there are several ways of providing data access. Active dissemination: in this case, nodes are used as relays to carry and forward data to the nodes interested in the data The first one is expensive, and second one needs to additionally maintain network structure, which is expensive in DTNs without end-to-end network connectivity. So, we focus on caching.

Our Focus Cooperative caching in DTNs Major challenges Cache data at appropriate network locations Queries in the future are responded faster Major challenges Where to cache Hard to monitor the network query pattern and determine the caching location for minimizing data access delay How many to cache Uncertainty of opportunistic data transmission Tradeoff between data accessibility and caching overhead Cache data at appropriate network locations based on the query history, so that queries in the future can be responded with less delay. The caching location should minimize the data access delay: delay minimization is the basic goal of caching. In general, when designing a caching scheme, we need to solve the problems of “where to cache”. But in DTNs, due to the opportunistic network connectvitiy, this is more challenging. Uncertainty of transmission: you cannot ensure that a data copy can be transmitted to the request on time, so you need multiple data copies to ensure delivery. due to the uncertainty of data transmission, multiple data copies need to be cached at different locations to ensure data accessibility. The difficulty in coordinating multiple caching nodes makes it hard to optimize the tradeoff between data accessibility and caching overhead.

Challenges Wireless ad-hoc network with end-to-end network connectivity Incidentally cache pass-by data More specifically, let me use the difference of caching schemes in traditional wireless ad-hoc networks and DTNs to furthermore illustrate these challenges. In traditional caching schemes, because we always have end-to-end network connectivity, the query and response will take the same way. So any node on the path is able to monitor the complete query history, and make decision on caching the “pass-by”data. Such caching is “incidental” because any node can cache the pass-by data.

Challenges Disruption-Tolerant Networks (DTNs) Due to the opportunistic network connectivity, the query and response for a data item may take different ways. Hence, it is difficult to collect the global information about complete query history, and furthermore determine caching locations. For example, the queries from D and F take the same way back, but the response to E will take node H instead of C, because C is disconnected from G by then. In this case, C cannot cache d1, H cannot cache d1 either because it has not received the query q2 so consider d1 is less popular. and d1 can only be cached at G which is further from the requesters.

Basic Ideas Intentionally cache data at a set of Network Central Locations (NCLs) A group of mobile nodes represented by a central node Being easily accessed by other nodes in the network Utility-based cache replacement Popular data is cached near central nodes Coordinate multiple caching nodes Tradeoff between data accessibility and caching overhead These challenges show that it is infeasible to cache data incidentally at random network places in DTNs according to the query history. Our way to solve the aforementioned challenges is: instead of incidentally cache data at dynamic locations, we intentionally cache data at a set of NCLs, i.e., fixed network locations. Note that: here a NCL does not correspond to some geographical location because the nodes in DTNs are keep moving. They just indicate some good locations for the data to be cached.

The Big Picture NCL 2 We have two NCLs, each of which corresponds to a set of nodes, and indicated by central nodes c1 and c2. Data source S multicasts data to the central nodes Central nodes are prioritized for caching data. Buffer of C1 is full, so cached at A near C1. A requester R sends queries to central nodes, and central nodes are responsible for searching data if it is not cached locally. If C2 is too far, the query may not be able to reach C2 before it expires. So finally only A at NCL 1 replies the data to R. NCL 1

Outline Introduction Network Central Locations (NCLs) Caching Scheme Performance Evaluation Summary & Future Work

Network Modeling Contacts in DTNs are described by network contact graph G(V, E) Contact process between nodes i and j is modeled as an edge eij on network contact graph The contacts between nodes i and j are modeled as a Poisson process with contact rate

NCL Selection Central nodes representing NCLs are selected based on a probabilistic metric Central nodes can be easily accessed by other nodes Number (K) of NCLs is a pre-defined parameter Central nodes are selected in a centralized manner based on global network knowledge NCL selection means to choose the central nodes representing the NCLs

NCL Selection Metric Metric of node i to be selected as central node Opportunistic path: Average probability that data can be transmitted from a random non-central node to i within time T Set of existing central nodes Opportunistic path is the path from node I to j on the network contact graph, and its weight evaluates the data transmission delay between the two nodes.

Trace-based Validation The applicability of NCL selection in realistic DTN traces Only few nodes have high metric values Our metric reflects the heterogeneity of node contact pattern In this case, we validate the existence of heterogeneity of node metric values in practice, which is necessary for our selection scheme to work. We ensure that the few selected central nodes have much better contact capability than the other nodes in the network, so that we ensure that they can be effectively used for caching.

Outline Introduction Network Central Locations (NCLs) Caching Scheme Performance Evaluation Summary & Future Work

Caching Scheme Overview Initial caching locations Data source pushes data to NCLs Querying data Requesters pulls data from NCLs by multicasting queries to NCLs Utility-based cache replacement When caching nodes contact each other More popular data is cached nearer to central nodes The caching scheme consists of three components: Initial caching locations are determined during pushing process Queries: how queries are forwarded to the caching nodes and Cache replacement. The data access pattern in the network is dynamic and ever changing. Therefore, we perform real-time cache replacement, to ensure that popular data are always cached near the central nodes, so as the minimize the cumulative delay.

Initial Caching Locations Central nodes are prioritized to cache data Data is cached at nodes near central nodes if their buffer are full Push the data to the central nodes by initiating a multicast process C2: cache is full, so cached at R4_2 C3: even R4_3 is full, so cached at R3_3

Querying Data Requester multicasts query to central nodes If data is cached at central nodes Respond directly Otherwise Forward query to caching nodes

Analyzing Data Access Delay Related to the number (K) of NCLs K is small 1./3.: Data transmission delay between requester and NCLs is longer 2.: Data can be cached nearer to the central node K is large Metric values of some central nodes may not be high 2. 3. In general, you have only one data copy at each NCL. So when K is small, the amount of data being cached is also smaller, so you have higher chance to cache data nearer to the central node. 1.

Utility-based Cache Replacement Two caching nodes exchange their cached data when they contact each other Cache popular data near central nodes to minimize the cumulative data access delay Data utility The popularity of data in the network The distance from the caching node to the corresponding central node This replacement is necessary because the network query pattern is dynamic, and the popularity of different data items in the network is also changing. SO that, we have to adaptively adjust the caching locations, to ensure that popular data is always cached near central nodes to minimize the delay When two nodes A and B contact each other, we put the data they cache into a common selection pool S, and formulate their cache replacement decision as a knapsack problem. Note that, a data item has different utility at different caching nodes.

Utility-based Cache Replacement Knapsack formulation Data at nodes A and B: Data utilities Data sizes Each data is only cached at one node

Utility-based Cache Replacement Example: A is nearer to the central node

Utility-based Cache Replacement Less popular data may be removed from cache if caching buffer is very limited The data 2 and 3 was moved from A to B. since both 2 and 3 have higher utility than 6, 6 was removed from B’s buffer. In this case, our scheme prioritize to cache popular data in the network, so that the cumulative data access delay is minimized.

Outline Introduction Network Central Locations (NCLs) Caching Scheme Performance Evaluation Summary & Future Work

Experimental Settings Data generation Each node periodically determines whether to generate new data with a fixed probability pG=0.2 Data lifetime is uniformly distributed in [0.5T, 1.5T] Query pattern Randomly generated at all nodes periodically Query pattern follows Zipf distribution Time constraint of query: T/2

Caching Performance On the MIT Reality trace with different data lifetime (T) Higher successful ratio Lower caching overhead

Effectiveness of Cache Replacement Different replacement strategies on MIT Reality trace Improves successful ratio Similar replacement overhead

Impact of the Number of NCLs On Infocom06 trace with T=3 hours Optimal: K=5 When K=5: highest successful ratio K=5:

Summary Cooperative caching in DTNs Future work Intentionally cache data at a pre-specified set of NCLs which can be easily accessed by other nodes NCL selection based on a probabilistic metric Utility-based cache replacement to maximize the cumulative caching performance Future work Distributed NCL selection Load balancing on NCLs

Thank you! http://mcn.cse.psu.edu The paper and slides are also available at: http://www.cse.psu.edu/~wxg139

Traces Record user contacts at university campus Various wireless interfaces Bluetooth: periodically detect nearby peers WiFi: associate to the best Access Point (AP) The two traces differ in their scale, contact detection period, as well as the contact density and duration. Note that the average contact duration in the MIT Reality trace is much shorter than that in the UCSD trace, and this difference will lead to significant difference in the later pattern formulation.

Opportunistic Path Each hop corresponds to stochastic contact process with pairwise contact rates Xk: inter-contact time between nodes Nk and Nk+1 Exponentially distributed Y: the time needed to transmit data from A to B along the path follows hypoexponential distribution

Probabilistic Data Selection in Cache Replacement Fairness of caching Every node caches popular data Caching effectiveness is only locally maximized Probabilistic data selection Every caching node probabilistically determine whether to cache the data Data utility is used as the probability It is possible that popular data is cached at every node, but other data is simply ignored.

Comparisons NoCache, where caching is not used for data access RandomCache, where each requester caches the received data randomly CacheData, which is proposed for cooperative caching in wireless ad-hoc networks BundleCache, which caches network data as bundles