Using Redundancy to Cope with Failures in a Delay Tolerant Network Sushant Jain, Michael Demmer, Rabin Patra, Kevin Fall Source: www.cs.utexas.edu/~lili/

Slides:



Advertisements
Similar presentations
Mobility Entropy and Message Routing in Community-Structured Delay Tolerant Networks Hideya Ochiai Hiroshi Esaki The University of Tokyo / NICT Asia Future.
Advertisements

ROUTING IN INTERMITTENTLY CONNECTED MOBILE AD HOC NETWORKS AND DELAY TOLERANT NETWORKS: OVERVIEW AND CHALLENGES ZHENSHENG ZHANG.
Capacity of wireless ad-hoc networks By Kumar Manvendra October 31,2002.
Mobility Increase the Capacity of Ad-hoc Wireless Network Matthias Gossglauser / David Tse Infocom 2001.
Min Song 1, Yanxiao Zhao 1, Jun Wang 1, E. K. Park 2 1 Old Dominion University, USA 2 University of Missouri at Kansas City, USA IEEE ICC 2009 A High Throughput.
Routing Protocols for Sensor Networks Presented by Siva Desaraju Computer Science WMU An Application Specific Protocol Architecture for Wireless Microsensor.
Rumor Routing Algorithm For sensor Networks David Braginsky, Computer Science Department, UCLA Presented By: Yaohua Zhu CS691 Spring 2003.
On Using Probabilistic Forwarding to Improve HEC-based Data Forwarding in Opportunistic Networks Ling-Jyh Chen 1, Cheng-Long Tseng 2 and Cheng-Fu Chou.
June 3, A New Multipath Routing Protocol for Ad Hoc Wireless Networks Amit Gupta and Amit Vyas.
By Libo Song and David F. Kotz Computer Science,Dartmouth College.
Compressive Oversampling for Robust Data Transmission in Sensor Networks Infocom 2010.
Importance Sampling. What is Importance Sampling ? A simulation technique Used when we are interested in rare events Examples: Bit Error Rate on a channel,
A Quality-Driven Decision Engine for Live Video Transmission under Service-Oriented Architecture DALEI WU, SONG CI, HAIYAN LUO, UNIVERSITY OF NEBRASKA-LINCOLN.
1 Data Persistence in Large-scale Sensor Networks with Decentralized Fountain Codes Yunfeng Lin, Ben Liang, Baochun Li INFOCOM 2007.
A Layered Hybrid ARQ Scheme for Scalable Video Multicast over Wireless Networks Zhengye Liu, Joint work with Zhenyu Wu.
Peer-to-Peer Based Multimedia Distribution Service Zhe Xiang, Qian Zhang, Wenwu Zhu, Zhensheng Zhang IEEE Transactions on Multimedia, Vol. 6, No. 2, April.
Multiple Sender Distributed Video Streaming Thinh Nguyen, Avideh Zakhor appears on “IEEE Transactions On Multimedia, vol. 6, no. 2, April, 2004”
End-to-End Analysis of Distributed Video-on-Demand Systems P. Mundur, R. Simon, and A. K. Sood IEEE Transactions on Multimedia, Vol. 6, No. 1, Feb 2004.
Denial of Service Resilience in Ad Hoc Networks Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly Designed by Yao Zhao.
Processing Along the Way: Forwarding vs. Coding Christina Fragouli Joint work with Emina Soljanin and Daniela Tuninetti.
DNA Research Group 1 Growth Codes: Maximizing Sensor Network Data Persistence Vishal Misra Joint work with Abhinav Kamra, Jon Feldman (Google) and Dan.
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
How to Turn on The Coding in MANETs Chris Ng, Minkyu Kim, Muriel Medard, Wonsik Kim, Una-May O’Reilly, Varun Aggarwal, Chang Wook Ahn, Michelle Effros.
1 Sensor Placement and Lifetime of Wireless Sensor Networks: Theory and Performance Analysis Ekta Jain and Qilian Liang, Department of Electrical Engineering,
Multiple Sender Distributed Video Streaming Nguyen, Zakhor IEEE Transactions on Multimedia April 2004.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
Network Coding vs. Erasure Coding: Reliable Multicast in MANETs Atsushi Fujimura*, Soon Y. Oh, and Mario Gerla *NEC Corporation University of California,
Network Coding for Distributed Storage Systems IEEE TRANSACTIONS ON INFORMATION THEORY, SEPTEMBER 2010 Alexandros G. Dimakis Brighten Godfrey Yunnan Wu.
International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences 1 Cooperative Wireless.
IPDPS 2007 Making Peer-to-Peer Anonymous Routing Resilient to Failures Yingwu Zhu Seattle University
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
A Simple and Effective Cross Layer Networking System for Mobile Ad Hoc Networks Wing Ho Yuen, Heung-no Lee and Timothy Andersen.
Gathering Data in Wireless Sensor Networks Madhu K. Jayaprakash.
EE360 PRESENTATION On “Mobility Increases the Capacity of Ad-hoc Wireless Networks” By Matthias Grossglauser, David Tse IEEE INFOCOM 2001 Chris Lee 02/07/2014.
Resilient P2P Anonymous Routing by Using Redundancy Yingwu Zhu.
The Case for Addressing the Limiting Impact of Interference on Wireless Scheduling Xin Che, Xi Ju, Hongwei Zhang {chexin, xiju,
Computer Networks Performance Metrics. Performance Metrics Outline Generic Performance Metrics Network performance Measures Components of Hop and End-to-End.
A Hybrid Routing Approach for Opportunistic Networks Ling-Jyh Chen 1, Chen-Hung Yu 2, Tony Sun 3, Yung-Chih Chen 1, and Hao-hua Chu 2 1 Academia Sinica.
1 Network Coding and its Applications in Communication Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering.
User Cooperation via Rateless Coding Mahyar Shirvanimoghaddam, Yonghui Li, and Branka Vucetic The University of Sydney, Australia IEEE GLOBECOM 2012 &
RELAX : An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks Bashir Yahya, Jalel Ben-Othman University of Versailles, France ICC.
1/30 Energy-Efficient Forwarding Strategies for Geographic Routing in Lossy Wireless Sensor Networks Wireless and Sensor Network Seminar Dec 01, 2004.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
Lan F.Akyildiz,Weilian Su, Erdal Cayirci,and Yogesh sankarasubramaniam IEEE Communications Magazine 2002 Speaker:earl A Survey on Sensor Networks.
Group 3 Sandeep Chinni Arif Khan Venkat Rajiv. Delay Tolerant Networks Path from source to destination is not present at any single point in time. Combining.
Growth Codes: Maximizing Sensor Network Data Persistence abhinav Kamra, Vishal Misra, Jon Feldman, Dan Rubenstein Columbia University, Google Inc. (SIGSOMM’06)
Cross-Layer Optimization in Wireless Networks under Different Packet Delay Metrics Chris T. K. Ng, Muriel Medard, Asuman Ozdaglar Massachusetts Institute.
Multicast and Unicast Real-Time Video Streaming Over Wireless LANS April. 27 th, 2005 Presented by, Kang Eui Lee.
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
Novel network coding strategy for TDD Use of feedback (ACK) improves delay/energy/ throughput performance, especially for high latency- high errors scenarios.
Department of Computer Science Aruna Balasubramanian, Brian Neil Levine, Arun Venkataramani DTN Routing as a Resource Allocation Problem.
Delay Tolerant Networking Jeff Pang Abhijit Deshmukh (with slides borrowed from Kevin Fall, Sushant Jain, Yogita Mehta, and Yong Wang)
University of Houston Cullen College of Engineering Electrical & Computer Engineering Capacity Scaling in MIMO Wireless System Under Correlated Fading.
TCP-Cognizant Adaptive Forward Error Correction in Wireless Networks
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Dynamic Control of Coding for Progressive Packet Arrivals in DTNs.
Raptor Codes Amin Shokrollahi EPFL. BEC(p 1 ) BEC(p 2 ) BEC(p 3 ) BEC(p 4 ) BEC(p 5 ) BEC(p 6 ) Communication on Multiple Unknown Channels.
Data Consolidation: A Task Scheduling and Data Migration Technique for Grid Networks Author: P. Kokkinos, K. Christodoulopoulos, A. Kretsis, and E. Varvarigos.
Minimum Energy Reliable Paths Using Unreliable Wireless Links Qunfeng Dong, Suman Banerjee, Micah Adler, and Archan Misra Mobihoc 2005.
A Comparison of RaDiO and CoDiO over IEEE WLANs May 25 th Jeonghun Noh Deepesh Jain A Comparison of RaDiO and CoDiO over IEEE WLANs.
Efficient Geographic Routing in Multihop Wireless Networks Seungjoon Lee*, Bobby Bhattacharjee*, and Suman Banerjee** *Department of Computer Science University.
VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks Zhao, J.; Cao, G. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 鄭宇辰
1 Chapter 6 Reformulation-Linearization Technique and Applications.
PATH DIVERSITY WITH FORWARD ERROR CORRECTION SYSTEM FOR PACKET SWITCHED NETWORKS Thinh Nguyen and Avideh Zakhor IEEE INFOCOM 2003.
ProbeCast: MANET Admission Control via Probing Soon Y. Oh, Gustavo Marfia, and Mario Gerla Dept. of Computer Science, UCLA Los Angeles, CA 90095, USA {soonoh,
Pouya Ostovari and Jie Wu Computer & Information Sciences
Key Distribution in DTNs
Section 7 Erasure Coding Overview
A New Multipath Routing Protocol for Ad Hoc Wireless Networks
Yiannis Andreopoulos et al. IEEE JSAC’06 November 2006
Presentation transcript:

Using Redundancy to Cope with Failures in a Delay Tolerant Network Sushant Jain, Michael Demmer, Rabin Patra, Kevin Fall Source: classes/F05/slides/dtn-yogita.pptwww.cs.utexas.edu/~lili/ classes/F05/slides/dtn-yogita.ppt

Outline of Discussion Introduction Erasure Coding Formal Problem Statement Path Failure Models Evaluation Related Work Conclusion Future Development

Introduction Routing in Delay Tolerant Network (DTN) in presence of path failures is difficult Retransmissions cannot be used for reliable delivery  Timely feedback may not be possible How to achieve reliability in DTN?  Replication, Erasure coding

Erasure Coding N block message is encoded into large (>N) number of code blocks. Message can be decoded when fraction 1/r or more blocks are received. Replication factor = r Allocation of code blocks over different links not simple.

Family of allocation strategies is used for k th strategy Probability of success of k th strategy Bernoulli Path Failure, are identical and independent

Bernoulli Path Failure, are identical and independent contd.

Bernoulli Path Failure, are different Objective Function: Formulation of Mixed Integer Program (MIP)

Partial Path Failures Objective: Maximize Sharpe Ratio

Markowitz algorithm

Evaluation Three scenarios used for evaluation:  DTN routing over data MULEs Path independent, data loss Bernoulli  DTN routing over set of city buses Paths dependent, data loss Bernoulli  DTN routing large sensor network Partial path failures

Data MULE Scenario Simulation Setup: 1km x 1km planar area, source and destination at opposite corners. Message size 10KB, Contact bandwidth 100Kbps, Storage capacity of MULE 1MB Velocity of MULE 10m/s. Probability of success of ith path is D i is the delay in distribution by ith MULE, T is the message expiration time pi = Prob(Di ≤ T),

MULE Density

Forced Splitting

Different Success Probabilities

Tolerance to Probability Estimation Errors

Bus Network Scenario Simulation Setup  Radio bandwidth 400kbps, radio range 100m  20 messages of size 10kb, sent randomly every hour for 12 hours  bus storage 1Mb  Message expiration time 6 hours  Paths are multi-hop

Bus Network Scenario contd.

Sensor Network Scenario Simulation Setup  Nodes placed in 40x16 foot grid, grid size 8ft

Benefits of Erasure coding

Related Work Portfolio Theory  Theory used to optimize the Sharpe-ratio Waterfilling in Gaussian channels  Formulation uses convex optimization techniques FEC, Erasure Coding, Internet Routing  Choice of erasure code Combinatorial Optimization  Computes Prob(Y>c) for a given configuration

Summary Problem of reliable transmission in DTN Replication and erasure code for increasing reliability Formulate the optimal allocation problem Study of this problem for Bernoulli and partial path failures Evaluation of the analysis in three different scenarios

Strengths:  Use of erasure coding and replication in DTN  Performed extensive analysis of the optimal allocation problem  The idea presented in generic and can be applied in other fields too Weakness:  Computations involved are complex and may not feasible  The study is applicable for probabilities which remain constant over time  In partial path failure analysis, it is assumed that the path probabilities have comparable mean and variance. This might not be always true

Future Development Apply this analysis to other fields such as replication of objects in distributed system Develop an efficient method for allocation in Bernoulli path failures Theoretical analysis for choosing replication factor