Changing the paradigm in forwarding : How transform daemons to angels?

Slides:



Advertisements
Similar presentations
ROUTING IN INTERMITTENTLY CONNECTED MOBILE AD HOC NETWORKS AND DELAY TOLERANT NETWORKS: OVERVIEW AND CHALLENGES ZHENSHENG ZHANG.
Advertisements

Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
Distributed Assignment of Encoded MAC Addresses in Sensor Networks By Curt Schcurgers Gautam Kulkarni Mani Srivastava Presented By Charuka Silva.
- Paper By Yunfeng Lin, Baochun Li, Ben Liang. Outline Motivation Constraints in DTN Network coding Vs Replication Binary Spraying Vs Epidemic routing.
Computer Networking A Top-Down Approach Chapter 4.7.
Group #1: Protocols for Wireless Mobile Environments.
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
Enhancing Source-Location Privacy in Sensor Network Routing P.Kamat, Y. Zhang, W. Trappe, C. Ozturk In Proceedings of the 25th IEEE International Conference.
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
June 4, 2015 On the Capacity of a Class of Cognitive Radios Sriram Sridharan in collaboration with Dr. Sriram Vishwanath Wireless Networking and Communications.
Lecture 1 - Introduction 1.  Introduction to Game Theory  Basic Game Theory Examples  Strategic Games  More Game Theory Examples  Equilibrium  Mixed.
Network Coding for Large Scale Content Distribution Christos Gkantsidis Georgia Institute of Technology Pablo Rodriguez Microsoft Research IEEE INFOCOM.
Di Wu 03/03/2011 Geographic Routing in Clustered Multi-layer Vehicular Ad Hoc Networks for Load Balancing Purposes.
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
Power saving technique for multi-hop ad hoc wireless networks.
CHINACOM 2006, Beijing, China26 Oct 2006 Osmosis in Pocket Switched Network Pan (Ben) Hui University of Cambridge Computer Laboratory
VADD: Vehicle-Assisted Data Delivery in Vehicular Ad-hoc Networks
WAN Technologies.
Pocket Switched Networks: Real-world Mobility and its Consequences for Opportunistic Forwarding Jon Crowcroft,Pan Hui (Ben) Augustin Chaintreau, James.
1 Optimal Power Allocation and AP Deployment in Green Wireless Cooperative Communications Xiaoxia Zhang Department of Electrical.
1 BitHoc: BitTorrent for wireless ad hoc networks Jointly with: Chadi Barakat Jayeoung Choi Anwar Al Hamra Thierry Turletti EPI PLANETE 28/02/2008 MAESTRO/PLANETE.
Ahmed Osama. What is Delay Tolerant Network?What is Delay Tolerant Network? DTN- WINC- Nile University2 IntroductionChallengesSummary S S D D No continuous.
Group 3 Sandeep Chinni Arif Khan Venkat Rajiv. Delay Tolerant Networks Path from source to destination is not present at any single point in time. Combining.
Thinking Architecturally An information theory and complex system viewpoint.
PRoPHET+: An Adaptive PRoPHET- Based Routing Protocol for Opportunistic Network Ting-Kai Huang, Chia-Keng Lee and Ling-Jyh Chen.
COP 5611 Operating Systems Spring 2010 Dan C. Marinescu Office: HEC 439 B Office hours: M-Wd 2:00-3:00 PM.
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
1 Utilizing Shared Vehicle Trajectories for Data Forwarding in Vehicular Networks IEEE INFOCOM MINI-CONFERENCE Fulong Xu, Shuo Gu, Jaehoon Jeong, Yu Gu,
An Adaptive Routing Protocol with Congestion Avoidance for Opportunistic Networks 王冉茵.
Throughput-Smoothness Trade-offs in Streaming Communication Gauri Joshi (MIT) Yuval Kochman (HUJI) Gregory Wornell (MIT) 1 13 th Oct 2015 Banff Workshop.
Dynamic Control of Coding for Progressive Packet Arrivals in DTNs.
Optimization Problems in Wireless Coding Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
Routing in Delay Tolerant Network Qing Ye EDIFY Group of Lehigh University.
March 18, 2005 Network Coding in Interference Networks Brian Smith and Sriram Vishwanath University of Texas at Austin March 18 th, 2005 Conference on.
WAN Technologies. 2 Large Spans and Wide Area Networks MAN networks: Have not been commercially successful.
2010 IEEE Global Telecommunications Conference, GLOBECOM 2010 Zheng Guo; Bing Wang; Jun-Hong Cui Prediction Assisted Single-copy Routing in Underwater.
TCP+Network Coding Li Shushi
Author:Zarei.M.;Faez.K. ;Nya.J.M.
Delay-Tolerant Networks (DTNs)
Key Distribution in DTNs
Feng Li, Jie Wu, Avinash Srinivasan
Day 10- The Need for Addressing
Introduction to Wireless Sensor Networks
Jon Crowcroft Pan Hui Computer Laboratory University of Cambridge
21-2 ICMP(Internet control message protocol)
Introduction to Wireless Sensor Networks
Lei Chen and Wendi B. Heinzelman , University of Rochester
18-WAN Technologies and Dynamic routing
Intra-Domain Routing Jacob Strauss September 14, 2006.
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Highway Vehicular Delay Tolerant Networks: Information Propagation Speed Properties Emmanuel Baccelli, Philippe Jacquet, Bernard Mans, and Georgios Rodolakis.
Wireless Epidemic The wireless epidemic (Nature 449, ; 2007) by Jon Kleinberg ‘Digital traffic flows not only over the wired backbone of the Internet,
Multi-Hop Broadcast from Theory to Reality:
INFOCOM 2013 – Torino, Italy Content-centric wireless networks with limited buffers: when mobility hurts Giusi Alfano, Politecnico di Torino, Italy Michele.
Distributed Channel Assignment in Multi-Radio Mesh Networks
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
ECE 544 Project3 Team member: BIAO LI, BO QU, XIAO ZHANG 1 1.
Dynamic Routing and OSPF
A survey in Delay Tolerant Networks Andrew Steinberg and Rafael Papa.
The Network Layer Network Layer Design Issues:
PRESENTATION COMPUTER NETWORKS
Viet Nguyen Jianqing Liu Yaqin Tang
A Probabilistic Routing Protocol for Mobile Ad Hoc Networks
Spectrum Sharing in Cognitive Radio Networks
Routing.
Congestion Control Reasons:
A Secure Ad-hoc Routing Approach using Localized Self-healing Communities MobiHoc, 2005 Presented by An Dong-hyeok CNLAB at KAIST.
Packet Switching Outline Store-and-Forward Switches
Efficient flooding with Passive clustering (PC) in Ad Hoc Networks
Presentation transcript:

Changing the paradigm in forwarding : How transform daemons to angels? Kavé Salamatian Lancaster University

Nowadays … Thank you but you are in the opposite direction! I can also carry for you! I have 100M bytes of data, who can carry for me? Give it to me, I have 1G bytes phone flash. Don’t give to me! I am running out of storage. Reach an access point. There is one in my pocket… Internet Search La Bonheme.mp3 for me Finally, it arrive… Search La Bonheme.mp3 for me Search La Bonheme.mp3 for me

Classical forwarding ?

DTN, pocket networks forwarding ?

Why to forward ? Let’s define for each packet a set of attributes Ai An ID, A Let’s define for each packet a set of attributes Ai Destination address D(Pi) Some Attributes are extracted from packet, some are coming from local context Let’s define a utility function U(Ai, D(Pi), ID, A) The utility of forwarding message i destinated to D(Pi) to node ID with context A The utility function capture the selfishness of the node Forwarding scheme : Calculate for each packet in buffer its utility Forward the largest utility

Utility functions Classical routing : Assign the utility function 1 if the node ID is on the path to destination D(Pi) null otherwise PROPHET: The delivery likelihood is the utility Self Limiting Epidemic forwarding: The utility is scaled down everytime a packet is received or forwarded. Community or content networking :Give a higher utility to some contents or community. What if the utility doesn’t depend on destination adress ? Results in epidemic forwarding Might construct utility function changing over time and adapting to information increase Spray and focus Move from opportunistic to infrastructure mode

Random utility Utility is hard to assess, we might do mistakes U(Ai, D(Pi), ID, A)=Û(Ai, D(Pi), ID, A)+noise Knowing a set of estimed utility {Ûi} what is the probability that choice j is the real best choice ? Noise should follow a Gumble distribution Forwarding scheme Choose packets to forward following above distibution

Forwarding for challenging environments Very mobile, very dynamic environments No prediction on future encounters No bias in the utility function based on destination address Results in epidemic forwarding Flooding is evil ! Generate lots of redundancy Reduce injection rate Going from point to point capacity bound to broadcast capacity bounds But …. Flooding is great Shortest path No need for global information Will work whenever communication is possible. Is it possible to male flooding less evil ? Controlling the redundancy Controlling the scope

Controlling the redundancy Let’s forward in place of a packet a linear combination of packets : Network coding ! Reduce the redundancy Use feedback to indicate received packets How to do this feedback ?

Issues Generation problem Incentives/punishment? How to ensure that the number of variables do not grow faster than the number of equation: congestion ! Congestion control needed How to ? Incentives/punishment? How to deal with selfish nodes Node that are just sending their packets and not forwarding others

Collaboration Incentives Nodes are selfish Send as most a possible their own messages Just forward message when there is a benefit They are pragmatic and rational They have a limited patience and resources

Limited resources A node do not want to use more than K buffer space for forwarding Out of these can k be undecoded and K-k are decoded A node piggyback its capacity List of packet decoded List of packet received List of packet non decoded is derived from the two above Neighbor should take care of this capacity in forwarding A neighbor have no incentive to go higher than the advertised capacity A node have no incentive to lie about its capacity

Enforcing collaboration Finite buffer space for forwarding Informs other about your capacity Neighbor take care of your constraint for their own sake Mixing packets help neighbors in solving their equations and freeing space for sending your packets Results in a Pareto-Optimal cooperation mechanism Being social becomes helpful Entangling your transmission with others is a way of enforcing collaboration Totally antagonistic with QoS Cooperation by punishment not by incentives

Performances

Infocom 2006 scenario

Infocom Scenario