ROUTING IN INTERMITTENTLY CONNECTED MOBILE AD HOC NETWORKS AND DELAY TOLERANT NETWORKS: OVERVIEW AND CHALLENGES ZHENSHENG ZHANG.

Slides:



Advertisements
Similar presentations
Scalable Routing In Delay Tolerant Networks
Advertisements

Supporting Cooperative Caching in Disruption Tolerant Networks
Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
802.11a/b/g Networks Herbert Rubens Some slides taken from UIUC Wireless Networking Group.
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
Generated Waypoint Efficiency: The efficiency considered here is defined as follows: As can be seen from the graph, for the obstruction radius values (200,
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Forwarding Redundancy in Opportunistic Mobile Networks: Investigation and Elimination Wei Gao 1, Qinghua Li 2 and Guohong Cao 3 1 The University of Tennessee,
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
Message Ferrying Approach for Data Delivery in Sparse Mobile Ad Hoc Networks Wenrui Zhao, Mostafa Ammar, and Ellen Zegura (2004) Presented by Justin Yackoski.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
By Libo Song and David F. Kotz Computer Science,Dartmouth College.
An Analysis of the Optimum Node Density for Ad hoc Mobile Networks Elizabeth M. Royer, P. Michael Melliar-Smith and Louise E. Moser Presented by Aki Happonen.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
EE 4272Spring, 2003 Chapter 10 Packet Switching Packet Switching Principles  Switching Techniques  Packet Size  Comparison of Circuit Switching & Packet.
Mesh Networks A.k.a “ad-hoc”. Definition A local area network that employs either a full mesh topology or partial mesh topology Full mesh topology- each.
© nCode 2000 Title of Presentation goes here - go to Master Slide to edit - Slide 1 Reliable Communication for Highly Mobile Agents ECE 7995: Term Paper.
Anonymous Gossip: Improving Multicast Reliability in Mobile Ad-Hoc Networks Ranveer Chandra (joint work with Venugopalan Ramasubramanian and Ken Birman)
Sociological Influences on Mobile Wireless Networks Chunming Qiao, Ph.D., Professor University at Buffalo (SUNY) Director, Laboratory for Advanced Network.
Delivery, Forwarding, and Routing
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
Ad Hoc Wireless Routing COS 461: Computer Networks
ROUTING ON THE INTERNET COSC Aug-15. Routing Protocols  routers receive and forward packets  make decisions based on knowledge of topology.
NETWORK LAYER (2) T.Najah AlSubaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
Anya Apavatjrut, Katia Jaffres-Runser, Claire Goursaud and Jean-Marie Gorce Combining LT codes and XOR network coding for reliable and energy efficient.
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Multicast routing.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking BGP, Flooding, Multicast routing.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Mobile Routing protocols MANET
Mobile Adhoc Network: Routing Protocol:AODV
CSC 600 Internetworking with TCP/IP Unit 8: IP Multicasting (Ch. 17) Dr. Cheer-Sun Yang Spring 2001.
Wireless Sensor Networks COE 499 Energy Aware Routing
Authors: Ioannis Komnios Sotirios Diamantopoulos Vassilis Tsaoussidis ComNet Group.
User Cooperation via Rateless Coding Mahyar Shirvanimoghaddam, Yonghui Li, and Branka Vucetic The University of Sydney, Australia IEEE GLOBECOM 2012 &
ODMRP (On-Demand Multicast Routing Protocol in Multihop Wireless Mobile Networks ) Sung-Ju Lee William Su Mario Gerla Presented By: Meenakshi Bangad.
The Destination Sequenced Distance Vector (DSDV) protocol
Group 3 Sandeep Chinni Arif Khan Venkat Rajiv. Delay Tolerant Networks Path from source to destination is not present at any single point in time. Combining.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
PRoPHET+: An Adaptive PRoPHET- Based Routing Protocol for Opportunistic Network Ting-Kai Huang, Chia-Keng Lee and Ling-Jyh Chen.
A Message Ferrying Approach for Data Delivery in Sparse Mobile Ad Hoc Networks Reporter: Yanlin Peng Wenrui Zhao, Mostafa Ammar, College of Computing,
AODV: Introduction Reference: C. E. Perkins, E. M. Royer, and S. R. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing,” Internet Draft, draft-ietf-manet-aodv-08.txt,
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
K-Anycast Routing Schemes for Mobile Ad Hoc Networks 指導老師 : 黃鈴玲 教授 學生 : 李京釜.
1 Computer Communication & Networks Lecture 21 Network Layer: Delivery, Forwarding, Routing Waleed.
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
A Receiver-Initiated Approach for Channel-Adaptive On-Demand Routing in Ad Hoc Mobile Computing Networks Xiao-Hui Lin, Yu-Kwong Kwok, and Vincent K. N.
Optimization Problems in Wireless Coding Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
A Multicast Routing Algorithm Using Movement Prediction for Mobile Ad Hoc Networks Huei-Wen Ferng, Ph.D. Assistant Professor Department of Computer Science.
Trading Structure for Randomness in Wireless Opportunistic Routing Szymon Chachulski, Michael Jennings, Sachin Katti and Dina Katabi MIT CSAIL SIGCOMM.
Routing in Delay Tolerant Network Qing Ye EDIFY Group of Lehigh University.
Fundamentals of Computer Networks ECE 478/578
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks Zhao, J.; Cao, G. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 鄭宇辰
ROUTING ON THE INTERNET COSC Jun-16. Routing Protocols  routers receive and forward packets  make decisions based on knowledge of topology.
Delay-Tolerant Networks (DTNs)
DELAY TOLERANT NETWORK
Internet Networking recitation #4
A comparison of Ad-Hoc Routing Protocols
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
ECE 544 Protocol Design Project 2016
A Probabilistic Routing Protocol for Mobile Ad Hoc Networks
Kevin Lee & Adam Piechowicz 10/10/2009
A Probabilistic Routing Protocol for Mobile Ad Hoc Networks
DSDV Destination-Sequenced Distance-Vector Routing Protocol
Presentation transcript:

ROUTING IN INTERMITTENTLY CONNECTED MOBILE AD HOC NETWORKS AND DELAY TOLERANT NETWORKS: OVERVIEW AND CHALLENGES ZHENSHENG ZHANG

MANET differences Nodes can directly communicate with each other if they enter each others’ communication range. A node can terminate packets or forward packets (serve as a relay). Nodes are moving: How to find a destination, how to route to that destination, and how to insure robust communication in the face of constant topology change.

MANET challenges Intermittent connectivity: (1) When nodes are in motion, links can be obstructed by intervening objects. (2) When nodes must conserve power, links are shut down periodically. Network partition : When no path exists between source and destination, it is perfectly possible that two nodes may never be part of the same connected portion of the network.

Routing in DTNs In DTNs, end-to-end communication using the TCP/IP protocol may not work . Based on different types of DTNs, deterministic or stochastic, different routing protocols are required.

Routing in DTNs Deterministic -- If all the future topology of the network (as a time-evolving graph) is deterministic and known, or at least predictable. Stochastic -- The future topology of network is totally unknown, or just could be estimated.

Routing in DTNs Deterministic case –Space time routing –Tree approach –Modified shortest path approaches • Stochastic case –Epidemic/random spray –History or predication-based approach –Per contact routing based on one-hop information –Per contact routing based on end-to-end information –Model-based –Control movement –Coding-based approaches

DETERMINISTIC ROUTING --Tree Approach Assumes that global knowledge of the characteristic profiles with respect to space and time are completely known by all the hosts. A tree is built from the source host by adding children nodes and the time associated with nodes. Each node records all the previous nodes the message has to travel and the earliest time to reach it. A final path can be selected from the tree by choosing the earliest time (or minimum hop) to reach the desired destination.

DETERMINISTIC ROUTING --Tree Approach It assumes that characteristic profiles are initially unknown to hosts. Hosts gain this information through learning the future by letting neighbor hosts exchange the characteristic profiles available between them. Paths are selected based on this partial knowledge.

DETERMINISTIC ROUTING --knowledge oracles Contacts Summary Oracle: information about aggregate statistics of the contacts (time-invariant information) Contacts Oracle : information about contacts between two nodes at any point in time. (the time-varying networks) Queuing Oracle: information about instantaneous buffer occupancies (queuing) at any node at any time Traffic Demand Oracle: information about the present or future traffic demand

DETERMINISTIC ROUTING --knowledge oracles If all the oracles are known, linear programming is formulated to find the best route. If only the Contacts Summary Oracle is available, Dijkstra with time invariant edge costs based on average waiting time is used to find the best route. If only the Contact Oracle is available, modified Dijkstra with time-varying cost function based on waiting time is used to find the route.

EPIDEMIC ROUTING --Flooding When a message arrives at an intermediate node, the node floods the message to all its neighbors. S E F B C M L J A G H D K I N

EPIDEMIC ROUTING --Flooding Represents a node that receives packet P for the first time Represents transmission of packet P S E F B C M L J A G H D K I N

EPIDEMIC ROUTING --Flooding Node H receives packet P from two neighbors: potential for collision S E F B C M L J A G H D K I N

EPIDEMIC ROUTING -- 2-hop forwarding A node S gives a message addressed to node T to another randomly chosen node R one hop away. When R happens to be within the range of the destination node T, the receiver sends the message to the destination. M L S R K T

EPIDEMIC ROUTING -- Mobile Relay Protocol (MRP) If a route to a destination is unavailable, a node performs a controlled local broadcast (a relay) to its immediate neighbors. All nodes that receive this packet store it and enter the relaying mode. In the relaying mode, the MRP first checks with the (traditional) routing protocols to see if a route of less than d hops exists to forward the packet. If so, it forwards the packet and the packet is delivered. If no valid route exists for the packet, it enters the storage phase, until it has a route to the destination.

EPIDEMIC ROUTING -- Mobile Relay Protocol (MRP) To limit the amount of broadcasting to all its neighbors, the Spraying protocol restricts forwarding to a ray in the vicinity of the destination’s last known location. A sprayed packet is first unicast to a node close to the destination, and then multicast to multiple nodes around the destination. The magnitude of the spraying depends on the mobility; the higher the mobility, the larger the vicinity. Disadvantage: need a location manager.

EPIDEMIC ROUTING -- Mobile Relay Protocol (MRP) S E S E D B D C B C G G H K H K I I

ESTIMATION BASED APPROACH Instead of blindly forwarding packets to all or some neighbors, intermediate nodes estimate the chance, for each outgoing link, of eventually reaching the destination. Based on this estimation, the intermediate nodes decide whether to store the packet and wait for a better chance, or decide to which nodes (and the time) to forward.

Per Contact Routing Based on Next Hop Information Only PROPHET (Probabilistic Routing Protocol using History of Encounters and Transitivity) When two nodes meet, they exchange a delivery predictability vector containing the delivery predictability information for destinations known by the nodes. Also, they will update the probability between them.

Per Contact Routing Based on Average End-to-End Performance Metrics MV: meets and visits protocol MV learns the frequency of meetings between nodes and visits to certain regions. The past frequencies are used to rank each bundle according to the likelihood of delivering a bundle through a specified path.

Per Contact Routing Based on Average End-to-End Performance Metrics MEED: minimal estimated expected delay MEED computes the expected delay using the observed contact history, in which a node records the connection and disconnection time of each contact over a sliding history window. When local link-state information changes, updates must be propagated to all nodes in the network. Epidemic link-state protocol is used for linkstate exchange.

MODEL-BASED APPROACH --Model Based Routing Model Based Routing (MBR) uses world models of the mobile nodes for a better selection of relaying nodes and the determination of a receiver location without flooding the network. World models contain location information (e.g. road maps or building charts) and user profiles indicating the motion pattern of users.

NODE MOVEMENT CONTROL-BASED APPROACHES In contrast to letting the mobile host wait passively for reconnection, the mobile hosts actively modify their trajectories to minimize transmission delay of messages. Given an adhoc network of mobile computers where the trajectory of each node is known. Host A and host B forms a route by asking intermediate hosts to change their trajectories in order to complete a routing path between hosts A and B.

NODE MOVEMENT CONTROL-BASED APPROACHES Message Ferrying (MF) In theNode-Initiated MF (NIMF) scheme ferries move around the deployed area according to known specific routes and communicate with other nodes they meet. With knowledge of ferry routes, nodes periodically move close to a ferry and communicate with that ferry. In the Ferry-Initiated MF (FIMF) scheme, ferries move proactively to meet nodes. When a node wants to send packets to other nodes or receive packets, it generates a service request and transmits it to a chosen ferry using a longrange radio. Upon reception of a service request, the ferry will adjust its trajectory to meet up with the node and exchange packets using short-range radios. In both schemes, nodes can communicate with distant nodes that are out of range by using ferries as relays.

CODING BASED APPROACHES To cope with wireless channel loss, erasure coding and network coding techniques have recently been proposed for wireless ad hoc networks and DTNs.

Erasure Coding The basic idea of erasure coding is to encode an original message into a large number of coding blocks. Suppose the original message contains k blocks. Using erasure coding, the message is encoded into n (n > k) blocks such that if k or more of the n blocks are received, the original message can be successfully decoded.

Erasure Coding Given that the replication factor is r, they study the following allocation problem: to determine an optimal fraction xi, of the erasure code blocks that should be sent over path i, such that the probability of successful reception is maximized.

Network coding Instead of simply forwarding packets received, intermediate nodes can combine some of the packets received so far and send them out as a new packet. For example, suppose that there are three nodes, A, B, and C. Nodes A and C want to exchange information through the middle node B. Node A first transmits packet x to node B, and node C transmits packet y to node B. Node B broadcasts x XOR y (not x and y in sequence). Since node A has packet x, and node C has packet y, node A can decode y and node C can decode packet x. the number of transmissions is reduced when network coding is used.

y B C x A x XOR y x XOR y B C A