SAC Workshop, Zurich 7th March 2007 Haggle: An Innovative Paradigm for Autonomic Opportunistic Communication.

Slides:



Advertisements
Similar presentations
CSE 413: Computer Networks
Advertisements

Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 9 Fundamentals.
Advanced satellite infrastructures in future global Grid computing: network solutions to compensate delivery delay Blasco Bonito, Alberto Gotta and Raffaello.
Jaringan Komputer Lanjut Packet Switching Network.
William Stallings Data and Computer Communications 7 th Edition Chapter 13 Congestion in Data Networks.
CSLI 5350G - Pervasive and Mobile Computing Week 3 - Paper Presentation “RPB-MD: Providing robust message dissemination for vehicular ad hoc networks”
DSR The Dynamic Source Routing Protocol Students: Mirko Gilioli Mohammed El Allali.
CS 408 Computer Networks Congestion Control (from Chapter 05)
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Data Dissemination for Spot Applications in Ad-Hoc Networks Alaeddine EL-FAWAL Thesis director : Jean-Yves Le Boudec Private Defense, 3 April 2009, EPFL.
1 Self Limiting Epidemic Forwarding and Fluid Approximations of Continuous Time Markov Chains Jean-Yves Le Boudec
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Cooperative protocols for wireless vehicular communication
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Transport Protocols.
Dissemination protocols for large sensor networks Fan Ye, Haiyun Luo, Songwu Lu and Lixia Zhang Department of Computer Science UCLA Chien Kang Wu.
Ncue-csie1 A QoS Guaranteed Multipolling Scheme for Voice Traffic in IEEE Wireless LANs Der-Jiunn Deng 、 Chong-Shuo Fan 、 Chao-Yang Lin Speaker:
Low Delay Marking for TCP in Wireless Ad Hoc Networks Choong-Soo Lee, Mingzhe Li Emmanuel Agu, Mark Claypool, Robert Kinicki Worcester Polytechnic Institute.
Denial of Service Resilience in Ad Hoc Networks Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly Designed by Yao Zhao.
Chapter 10 Introduction to Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
CS 672 Paper Presentation Presented By Saif Iqbal “CarNet: A Scalable Ad Hoc Wireless Network System” Robert Morris, John Jannotti, Frans Kaashoek, Jinyang.
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 Modeling and Simulating Networking Systems with Markov Processes Tools and Methods of Wide Applicability ? Jean-Yves Le Boudec
Switching Techniques Student: Blidaru Catalina Elena.
Data Communications and Networking
Distributed Quality-of-Service Routing of Best Constrained Shortest Paths. Abdelhamid MELLOUK, Said HOCEINI, Farid BAGUENINE, Mustapha CHEURFA Computers.
A Distributed Scheduling Algorithm for Real-time (D-SAR) Industrial Wireless Sensor and Actuator Networks By Kiana Karimpour.
Challenged Networking An Experimental Study of New Protocols and Architectures Erik Nordström.
“Intra-Network Routing Scheme using Mobile Agents” by Ajay L. Thakur.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
Security for the Optimized Link- State Routing Protocol for Wireless Ad Hoc Networks Stephen Asherson Computer Science MSc Student DNA Lab 1.
Power Save Mechanisms for Multi-Hop Wireless Networks Matthew J. Miller and Nitin H. Vaidya University of Illinois at Urbana-Champaign BROADNETS October.
Wireless Sensor Networks COE 499 Energy Aware Routing
1 Delay Tolerant Network Routing Sathya Narayanan, Ph.D. Computer Science and Information Technology Program California State University, Monterey Bay.
Switching breaks up large collision domains into smaller ones Collision domain is a network segment with two or more devices sharing the same Introduction.
Data and Computer Communications Circuit Switching and Packet Switching.
How Small Labels create Big Improvements April Chan-Myung Kim
Review of the literature : DMND:Collecting Data from Mobiles Using Named Data Takashima Daiki Park Lab, Waseda University, Japan 1/15.
A study of Intelligent Adaptive beaconing approaches on VANET Proposal Presentation Chayanin Thaina Advisor : Dr.Kultida Rojviboonchai.
Communication Paradigm for Sensor Networks Sensor Networks Sensor Networks Directed Diffusion Directed Diffusion SPIN SPIN Ishan Banerjee
PRoPHET+: An Adaptive PRoPHET- Based Routing Protocol for Opportunistic Network Ting-Kai Huang, Chia-Keng Lee and Ling-Jyh Chen.
1 Performance Analysis of the Distributed Coordination Function under Sporadic Traffic joint work with C.-F. Chiasserini (Politecnico di Torino)
Design, Implementation and Tracing of Dynamic Backpressure Routing for ns-3 José Núñez-Martínez Research Engineer Centre Tecnològic de Telecomunicacions.
Intradomain Traffic Engineering By Behzad Akbari These slides are based in part upon slides of J. Rexford (Princeton university)
End-to-End Efficiency (E 3 ) Integrating Project of the EC 7 th Framework Programme General View of the E3 Prototyping Environment for Cognitive and Self-x.
National Research Council - Pisa - Italy Marco Conti Italian National Research Council (CNR) IIT Institute MobileMAN MobileMAN: II year expected results.
An Energy Efficient MAC Protocol for Wireless LANs, E.-S. Jung and N.H. Vaidya, INFOCOM 2002, June 2002 吳豐州.
Social-Aware Stateless Forwarding in Pocket Switched Networks Soo-Jin SHIN
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Introducing a New Concept in Networking Fluid Networking S. Wood Nov Copyright 2006 Modern Systems Research.
Joint Replication-Migration-based Routing in Delay Tolerant Networks Yunsheng Wang and Jie Wu Temple University Zhen Jiang Feng Li West Chester Unveristy.
IEEE C /87. Status of Evaluation Criteria IEEE Evaluation Criteria CG IEEE Interim Meeting September 15-19, 2003.
Providing QoS in IP Networks
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
Mean Field Methods for Computer and Communication Systems Jean-Yves Le Boudec EPFL Network Science Workshop Hong Kong July
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
Network Layer COMPUTER NETWORKS Networking Standards (Network LAYER)
DELAY TOLERANT NETWORK
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Multi-Hop Broadcast from Theory to Reality:
Kevin Lee & Adam Piechowicz 10/10/2009
A survey in Delay Tolerant Networks Andrew Steinberg and Rafael Papa.
Congestion Control (from Chapter 05)
Switching Techniques.
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
Changing the paradigm in forwarding : How transform daemons to angels?
Presentation transcript:

SAC Workshop, Zurich 7th March 2007 Haggle: An Innovative Paradigm for Autonomic Opportunistic Communication

SAC Workshop, Zurich 7th March 2007 Type of project:FET Integrated Project 8 Partners: Thomson, CAMCL, Uppsala, EPFL, SUPSI, CNR, Eurecom, Martel Start date:January 1st 2006 Duration:48 Months (end of December 2009) Key Data

SAC Workshop, Zurich 7th March 2007 Infrastructure based services But mobile phones and PDAs are still working…. No infrastructure Every terminal is also a router Mobility change topology

SAC Workshop, Zurich 7th March 2007 No alternative to infrastructure services Today Tomorrow OR … Internet Phone Internet Phone

SAC Workshop, Zurich 7th March 2007 How does it work? SUBMIT Internet GSM

SAC Workshop, Zurich 7th March 2007 Achievements The 1st version of (INFANT) Haggle Node Managers, compatible with the following global architecture: Available on sourceforge client and chatting application Opportunistic forwarding paradigms with context information Or by flooding (today’s talk)

SAC Workshop, Zurich 7th March 2007 Achievements (continued) An analysis of the security implications of being able to take forwarding decisions without inspecting the contents of packets. Collection of ´connectivity traces from two communities: IEEE Infocom 2006 conference in Barcelona. (100 Bluetooth iMotes) Hong Kong students Discovery of some software errors and Bluetooth limitations Mobility modelling testbed (APE) established in order to replicate the experiments

8 Control of Spread in Epidemic Forwarding Jean-Yves Le Boudec joint work with Alaeddine El Fawal and Kave Salamatian EPFL/I&C/ISC-LCA-2

9 Contents 1.Self Limiting Epidemic Forwarding 2.Control of Spread / TTL 3.Performance Evaluation 4.Methodology: deriving fluid model

10 Self-Limiting Broadcast  Broadcast is used in Haggle as one mechanism for opportunistic forwarding Initial phase Last resort

11 Performance Issues with Broadcast  Known to quickly deteriorate performance “cost of flooding” Many enhancements proposed (e.g. probabilistic forwarding) Enhancements work if magical parameters are set well  However there are cases where broadcast is desirable to support specific apps based on limited broadcast Chat on a jammed highway, urban area Coupon application  No assumption about connectivity From intermittent to very rich

12 Example of Large Scale Use [ELS-2006] A. El Fawal, J.-Y. Le Boudec, K. Salamatian. Performance Analysis of Self-Limiting Epidemic Forwarding. Technical report LCA-REPORT

13 Mental Model of Epidemic Forwarding App N=2 M= 3 Stored TTL = From xxx Text=“…..” N=6 M= 1 Stored TTL = From xxx Text=“…..” N=4 M= 1 Stored TTL = From xxx Text=“…..” Epidemic Buffer MAC Layer N=0 M= 0 Stored TTL = From self Text=“…..” Scheduler N=5 M= 3 Stored TTL = From xxx Text=“…..” One node N=2 M= 1 Stored TTL = From xxx Text=“…..” TTL = 34 IP source= ….. Transmitted packet stored packet

14 Control / performance issues  A Possible classification: 1.Control of forwarding factor How many times a message is repeated The classical issue addressed in the literature 2.Control source injection rates 3.Scheduling 4.Control of spread How many nodes are reached by a message Our focus today

15 Spread Control  Limiting the spread is implicitly assumed to be done by TTL But there are many options and issues We present the options then evaluate the performance

16 Contents 1.Self Limiting Epidemic Forwarding 2.Control of Spread / TTL 3.Performance Evaluation 4.Methodology: deriving fluid model

17 Classical TTL  Implicitly assumed in almost all existing works CD: “4 hops is enough”  When receiving a packet for the first time, decrement TTL (if >0) and store in epidemic buffer  When relaying the packet: send with stored TTL  If transmit multiple times, all with same stored TTL

18  Same as classical TTL but decrement stored TTL for every send event  Equivalent to the forwarding token counter used in “Spray and Focus” TTL = log 2 (token) Thrasyvoulos Spyropoulos, Konstantinos Psounis, and Cauligi Raghavendra, “Spray and Wait: An Efficient Routing Scheme for Intermittently Connected Mobile Networks,” in proceedings of ACM SIGCOMM workshop on Delay Tolerant Networking (WDTN-05), August 2005Spray and Wait: An Efficient Routing Scheme for Intermittently Connected Mobile Networks Stored TTL

19  Same as TTL but the stored TTL is decremented at receive events Selective aging: Decrement stored TTL of this packet when a duplicate is received Global aging: Decrement stored TTL of all packets when any packet is received by some (very) small amount  A fine granularity is obtained by allowing Stored TTL to be non integer Aging

20 Contents 1.Self Limiting Epidemic Forwarding 2.Control of Spread / TTL 3.Performance Evaluation 4.Methodology: deriving fluid model

21 Performance Evaluation  Method: Simulation JIST-SWANS + analytical model with fluid limit ODE of continuous time markov chain Performance metrics Spread: number of nodes that receive one message Spread factor: number of transmission events for one message Injection rate (for a flow controlled source) Buffer usage We looked for the applicability of a scheme to a large set of environments Mobile VANETs Infinite grid Infocom –like traces

22 Working Hypotheses  We used a virtual rate scheduler, serves packet no earlier than according to packet’s vrate, otherwise fair queuing per source  Control of forwarding factor done by vrate = a Nrcv Nsnd with a < 1  Self packet is removed when one duplicate is received  An issue is support for broadcast Naive (CTSless) broadcast does not work -> we use Pseudo-Broadcast whenever possible (crowded area), otherwise we revert to CTSless with indication of presence Our implementation of broadcast in Java is now available [2] and sourceforge

23 aging storedTTL Fluid highway jam Fluid highway jam Fluid highway jam Fluid highway jam

24 Findings  ClassicalTTL or StoredTTL need to adapt the max TTL to the environment Rich connectivity (traffic jam) requires a very small max TTL, not suitable in other environments  Worse, in very dense environments, ClassicalTTL and StoredTTL suffer from collapse  In contrast, aging is robust to all situations The performance in overall much better Higher spread and rate with smaller buffer sizes

25 Results, Infinite Line

26 Reducing TTL of stored packets based on receive activity is an effective congestion control  Apply Little’s formula and find the operational law:  N is maintained constant independent of congestion status Average number of packets in epidemic buffer Decrease per Receive event

27 Contents 1.Self Limiting Epidemic Forwarding 2.Control of Spread / TTL 3.Performance Evaluation 4.Methodology: deriving fluid model

28  We use a novel method to systematically derive a fluid model  Applicable to cases with “many small things”  Derived from chemistry and physics

29 The Microscopic model for Epidemic Forwarding  The model is complex, O(A N^2 ) states N: nb nodes A: a fixed integer  Can we use simple approximations ? What is the corresponding fluid model ?

30 We Use a Systematic Method for Derivation of Fluid Model 1.Define the state variables 2.Pick functions of interest of the state variable 3.Define the transitions jumps  r and rates h r (x) of microscopic model 4.Compute the generator and write the ODE 1.Define the state variables 2.Pick functions of interest of the state variable 3.Define the transitions jumps  r and rates h r (x) of microscopic model 4.Compute the generator and write the ODE  Implemented for models of the type below in the TSED tool at  Implemented for models of the type below in the TSED tool at

31 Application to Self-Limiting Epidemic Forwarding  There is description complexity, but no modelling complexity A: Age of packet sent by node in middle ODE simulation

32 References [1] A. El Fawal[1] A. El Fawal, J.-Y. Le Boudec and K. Salamatian Performance Analysis of Self Limiting Epidemic Forwarding EPFL Technical Report, 2006.J.-Y. Le BoudecK. Salamatian [2] MAC layer functions for SLEF / Keller, Lorenzo – 2006 [LCA-STUDENT ] Keller, Lorenzo

33 Conclusion  We have investigated a novel approach to TTL management, based on decrement on packet reception  We have shown that it improves the usability of epidemic forwarding to case where it otherwise would congest  It can enable new applications to share information locally