- Paper By Yunfeng Lin, Baochun Li, Ben Liang. Outline Motivation Constraints in DTN Network coding Vs Replication Binary Spraying Vs Epidemic routing.

Slides:



Advertisements
Similar presentations
Transportation-aware Routing in Delay Tolerant Networks (DTNs) Asia Future Internet 2008 Taekyoung Kwon Seoul National University.
Advertisements

Enabling Inter-domain DTN Communications by Networked Static Gateways Ting He*, Nikoletta Sofra, Kang-Won Lee*, and Kin K Leung * IBM Imperial College.
ROUTING IN INTERMITTENTLY CONNECTED MOBILE AD HOC NETWORKS AND DELAY TOLERANT NETWORKS: OVERVIEW AND CHALLENGES ZHENSHENG ZHANG.
Switching Technology presented by Hussain Ahmad BA-Abdullah. Fawaz abdullah AL-Amri. prof : Adel Ali.
Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
Inter-session Network Coding in wireless network Long Hai 10/02/2012.
Multicast in Wireless Mesh Network Xuan (William) Zhang Xun Shi.
24-1 Chapter 24. Congestion Control and Quality of Service (part 1) 23.1 Data Traffic 23.2 Congestion 23.3 Congestion Control 23.4 Two Examples.
RelayCast: Scalable Multicast Routing in Delay Tolerant Networks
University of Waterloo & UOIT & INRIA Lille Presenter: Rongxing Lu
Dynamic Index Coding Broadcast Station N N Michael J. Neely, Arash Saber Tehrani, Zhen Zhang University of Southern California Paper available.
By Libo Song and David F. Kotz Computer Science,Dartmouth College.
Dynamic Index Coding User set N Packet set P Broadcast Station N N p p p Michael J. Neely, Arash Saber Tehrani, Zhen Zhang University.
An Analysis of the Optimum Node Density for Ad hoc Mobile Networks Elizabeth M. Royer, P. Michael Melliar-Smith and Louise E. Moser Presented by Aki Happonen.
What's inside a router? We have yet to consider the switching function of a router - the actual transfer of datagrams from a router's incoming links to.
1 Data Persistence in Large-scale Sensor Networks with Decentralized Fountain Codes Yunfeng Lin, Ben Liang, Baochun Li INFOCOM 2007.
© Manasa Resilience of Flooding Protocol – A Case Study EECS 801 Graduate Reading © 2008–Manasa K Aug Manasa K Department of Electrical Engineering.
Selection Metrics for Multi-hop Cooperative Relaying Jonghyun Kim and Stephan Bohacek Electrical and Computer Engineering University of Delaware.
1 How Many Packets Can We Encode? - An Analysis of Practical Wireless Network Coding Jerry Le, John C.S. Lui, Dah Ming Chiu Chinese University of Hong.
Cs/ee 143 Communication Networks Chapter 3 Ethernet Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech.
Mobile Ad hoc Networks COE 549 Delay and Capacity Tradeoffs II Tarek Sheltami KFUPM CCSE COE 8/6/20151.
Switching Techniques Student: Blidaru Catalina Elena.
Anya Apavatjrut, Katia Jaffres-Runser, Claire Goursaud and Jean-Marie Gorce Combining LT codes and XOR network coding for reliable and energy efficient.
Opersating Mode DCF: distributed coordination function
Fundamental Lower Bound for Node Buffer Size in Intermittently Connected Wireless Networks Yuanzhong Xu, Xinbing Wang Shanghai Jiao Tong University, China.
CS 712 | Fall 2007 Using Mobile Relays to Prolong the Lifetime of Wireless Sensor Networks Wei Wang, Vikram Srinivasan, Kee-Chaing Chua. National University.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Fault-Tolerant Design for Mobile IPv6 Networks Jenn-Wei Lin and Ming-Feng Yang Graduate Institute of Applied Science and Engineering Fu Jen Catholic University.
College of Engineering Non-uniform Grid- based Coordinated Routing Priyanka Kadiyala Major Advisor: Dr. Robert Akl Department of Computer Science and Engineering.
IEEE Globecom 2010 Tan Le Yong Liu Department of Electrical and Computer Engineering Polytechnic Institute of NYU Opportunistic Overlay Multicast in Wireless.
Wireless Sensor Networks COE 499 Energy Aware Routing
Prediction Assisted Single-copy Routing in Underwater Delay Tolerant Networks Zheng Guo, Bing Wang and Jun-Hong Cui Computer Science & Engineering Department,
Authors: Ioannis Komnios Sotirios Diamantopoulos Vassilis Tsaoussidis ComNet Group.
1 Mobility Increases the Capacity of Ad-hoc Wireless Networks Matthias Grossglauser, David Tse IEEE Infocom 2001 (Best paper award) Oct 21, 2004 Som C.
Switching breaks up large collision domains into smaller ones Collision domain is a network segment with two or more devices sharing the same Introduction.
User Cooperation via Rateless Coding Mahyar Shirvanimoghaddam, Yonghui Li, and Branka Vucetic The University of Sydney, Australia IEEE GLOBECOM 2012 &
Copyright: S.Krishnamurthy, UCR Power Controlled Medium Access Control in Wireless Networks – The story continues.
Outline Paper Information Motivation Problem Statement Results Main Contribution Strengths, Weakness and limitations Future Works 2Paper Summary- WINC-
Ahmed Osama. What is Delay Tolerant Network?What is Delay Tolerant Network? DTN- WINC- Nile University2 IntroductionChallengesSummary S S D D No continuous.
Salah A. Aly,Moustafa Youssef, Hager S. Darwish,Mahmoud Zidan Distributed Flooding-based Storage Algorithms for Large-Scale Wireless Sensor Networks Communications,
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
An optimal power-saving class II for VoIP traffic and its performance evaluations in IEEE e JungRyun Lee School of Electrical and Electronics Eng,Chung-Ang.
PRoPHET+: An Adaptive PRoPHET- Based Routing Protocol for Opportunistic Network Ting-Kai Huang, Chia-Keng Lee and Ling-Jyh Chen.
Power Control in Wireless Ad Hoc Networks Background An ad hoc network is a group of self configuring wireless nodes that lack infrastructure. Motivation—Power.
Research into the hybridization of the PRoPHET and ERP network routing algorithms George Mason University INFS 612 (Spring 2013) Project Group 4: Richard.
Capacity Enhancement with Relay Station Placement in Wireless Cooperative Networks Bin Lin1, Mehri Mehrjoo, Pin-Han Ho, Liang-Liang Xie and Xuemin (Sherman)
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
NTU IM Page 1 of 35 Modelling Data-Centric Routing in Wireless Sensor Networks IEEE INFOCOM Author: Bhaskar Krishnamachari Deborah Estrin Stephen.
5/28/03--chowConcast1 Concast and Convergent Connection: Many-to-One Network Service C. Edward chow.
Sanjay K. Dhurandher, Mohammad S. Obaidat, Fellow of IEEE and Fellow of SCS, Siddharth Goel and Abhishek Gupta CAITFS, Division of Information Technology,
Joint Replication-Migration-based Routing in Delay Tolerant Networks Yunsheng Wang and Jie Wu Temple University Zhen Jiang Feng Li West Chester Unveristy.
On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay-Tolerant Networks 1 Wei Gao Guohong Cao Tom La Porta Jiawei Han Presented.
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
Dynamic Control of Coding for Progressive Packet Arrivals in DTNs.
Routing in Delay Tolerant Network Qing Ye EDIFY Group of Lehigh University.
1 Using Network Coding for Dependent Data Broadcasting in a Mobile Environment Chung-Hua Chu, De-Nian Yang and Ming-Syan Chen IEEE GLOBECOM 2007 Reporter.
Chien-Shiu Lin, Wei-Shyh Chang, Ling-Jyh Chen, Cheng-Fu Chou, and Ting-Kai Huang.
Courtesy Piggybacking: Supporting Differentiated Services in Multihop Mobile Ad Hoc Networks Wei LiuXiang Chen Yuguang Fang WING Dept. of ECE University.
A Low Interference Channel Assignment Algorithm for Wireless Mesh Networks Can Que 1,2, Xinming Zhang 1, and Shifang Dai 1 1.Department of Computer Science.
VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks Zhao, J.; Cao, G. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 鄭宇辰
ATCN: Delay Tolerant Networks (II) (24/11/08) Thrasyvoulos Spyropoulos (Akis)
-1/16- Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks C.-K. Toh, Georgia Institute of Technology IEEE.
2010 IEEE Global Telecommunications Conference, GLOBECOM 2010 Zheng Guo; Bing Wang; Jun-Hong Cui Prediction Assisted Single-copy Routing in Underwater.
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Multi-Hop Broadcast from Theory to Reality:
Switching Techniques.
Changing the paradigm in forwarding : How transform daemons to angels?
Presentation transcript:

- Paper By Yunfeng Lin, Baochun Li, Ben Liang

Outline Motivation Constraints in DTN Network coding Vs Replication Binary Spraying Vs Epidemic routing Protocol Principle Assumptions Description Example Performance Average transmission / relay Transmission delay Relay buffer size Optimal Maximal Spray count Vs Identical Maximal spray count

Motivation – Constraints in DTN Opportunistic connections between nodes Nodes have limited transmission capabilities Buffer space limitations Battery power limited Nodes might be mobile Delay in packet delivery will be large Node density is sparse

Motivation – NC Vs Replication Replication – Transmitting copies of a packet. Network coding – combining packets and transmitting the resultant packet Example: K = 3, K – Number of source packets, namely, A, B and C. Number of encoded packets, K’ = 3 Buffer Space of each relay, BS = 2 Number of nodes = 4, which includes one source, one destination. Number of relays is two.

Motivation – Replication Example A B C A B A B R1 R2 DESTINATION

Motivation – Replication Example R1 R2 A B C A C Replaces B A Here also C replaces B DESTINATION ONLY A AND C ARE RETRIEVED. FOR, B MORE DELAY IS INCURRED

Motivation – NC Example A + B + C A + 2B + 3C 2A + 2B + C A + B + C A + 2B + 3C A + B + C A + 2B + 3C R1 R2 DESTINATION

Motivation – NC Example R1 R2 A + B + C A + 2B + 3C 2A + 2B + C 3A +3B +2C, x = 1 3A + 4B + 4C, x = 1 5A + 5B + 3C, x = 2 5A + 6B + 5C, x = 2 DESTINATION ANY THREE PACKETS CAN HELP RETRIEVE A, B AND C

Motivation – Binary Spraying Vs ER S, K = 2 R1 R2 R3 R4 D Epidemic routing Binary spraying S, K = 2, L = 2 R1, L = 1 R2, L = 1 R3 D R4 R5

Protocol - Principle This protocol called the E-NCR, is a combination of Network coding and Binary spraying. NCERBinary Spraying E-NCR ER NCER – Network Coding based Epidemic routing ER – Epidemic Routing E-NCR - Efficient Network coding based routing

Protocol - Assumptions There is once source with ‘K’ packets to be transmitted, ‘n’ relay nodes and a destination For every opportunistic contact, only one packet can be transmitted. The source ‘S’ and the Destination ‘D’ have enough buffer space to hold all ‘K’ packets. But relay nodes have buffer space B, defined as 1 <= B <= K While a packet transmission is made, no other back-ground traffic exists. A packet in the buffer in an node is purged as soon as a ACK is received from ‘D’ or Time-to-live field is zero.

Protocol - Description SOURCE-RELAY: K' = K + some more encoded packets L = c * log k, where c is some constant i = 0; S = K'; do { if(detect any node and not already there with that node) { send an encoded packet i++; } }while(S != i);

Protocol - Description RELAY-RELAY, SENDER SIDE: do { if(detect any node X) { get spray list of X; //list element is a tuple,where i is index of packet, ‘l’ is the //remaining spray count do { compare this->spraylist with x->spraylist; if(any this->spraylist-> such that l >=0 and i does not exist in x->spraylist) { send encoded packet to node x; update tuple to ; } }while(end of x->spraylist); } }while(true);

Protocol - Description DESTINATION: do { if(got a packet) { add to packet list try to decode list of packets; if(decode possible) { exit loop; } }while(true); RELAY-RELAY, RECEIVER SIDE: if(packet received) { if(buffer size == max_buffer_size) { encode incoming packet with all packets in list; } else { place packet in free slot; } add of incoming packet to spray list; }

Protocol - Example In the following example, There are 7 nodes. One Source, One destination and 5 relays The buffer space is 1 for the relay nodes and 3 for the source and destination Number of packets to be transmitted from source is k = 3 L, the maximal spray count is set to log 2 (k) which is approximately 2 and the threshold is T = 1. In the first level, l, the spray count reduces to L/2 which is 1. Since, this is the threshold, all future transmissions are one per packet.

Protocol - Example E1, E2, E3 E2, L = 2 E2 E3 E1, L = 2 E1 E1 + (X) E2 L = 1 E3 + (Y) E1 L = 1 E1 + (X) E2E3 + (Y) E1 E3 + (Z) E2 E3, L = 2

Performance - Avg transmission per relay

Performance - Transmission delay

Performance - Relay buffer size

Performance – Optimal Vs Identical Maximal spray count

Some Limitations Destination has to wait till minimum of ‘K’ encoded packets have to be received Some packets which have linear dependence could arise during encoding at relays.

Acknowledgements My Audience for your comments, time and patience. Prof. Chan Mun Choon Dr. A. V. Babu Manjunath Chen Bin Bin The Authors of the paper