DTNLite: Reliable Data Delivery in Sensornets Rabin Patra and Sergiu Nedevschi UCB Nest Retreat 2004.

Slides:



Advertisements
Similar presentations
Presenter: Anika Aziz National Institute of Informatics (NII), The Graduate University for Advanced Studies, Tokyo, Japan.
Advertisements

A feedback–based scheme for improving TCP performance in Ad Hoc Wireless Networks Group : Manish Mehta Aditya Barve.
Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
UNIT-IV Computer Network Network Layer. Network Layer Prepared by - ROHIT KOSHTA In the seven-layer OSI model of computer networking, the network layer.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
Multicasting in Mobile Ad-Hoc Networks (MANET)
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols By Josh Broch, David A. Maltz, David B. Johnson, Yih- Chun Hu, Jorjeta.
DTNs Delay Tolerant Networks. Fall, Kevin. Intel Research, Berkeley. SIGCOMM 2003 Aug25, A Delay- Tolerant Network Architecture for Challenged Internets.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Transport Protocols.
Effects of Applying Mobility Localization on Source Routing Algorithms for Mobile Ad Hoc Network Hridesh Rajan presented by Metin Tekkalmaz.
Dissemination protocols for large sensor networks Fan Ye, Haiyun Luo, Songwu Lu and Lixia Zhang Department of Computer Science UCLA Chien Kang Wu.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Transport Protocols II.
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
Taming the Underlying Challenges of Reliable Multihop Routing in Sensor Networks.
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
Reliable Transport Layers in Wireless Networks Mark Perillo Electrical and Computer Engineering.
Transport Protocol in Wireless Sensor Networks. Motivation  What is expected out of a “transport” protocol for sensor networks ? Reliability, congestion.
Internetworking Fundamentals (Lecture #2) Andres Rengifo Copyright 2008.
FBRT: A Feedback-Based Reliable Transport Protocol for Wireless Sensor Networks Yangfan Zhou November, 2004 Supervisors: Dr. Michael Lyu and Dr. Jiangchuan.
Error Checking continued. Network Layers in Action Each layer in the OSI Model will add header information that pertains to that specific protocol. On.
Gursharan Singh Tatla Transport Layer 16-May
Ad Hoc Wireless Routing COS 461: Computer Networks
Distributed Quality-of-Service Routing of Best Constrained Shortest Paths. Abdelhamid MELLOUK, Said HOCEINI, Farid BAGUENINE, Mustapha CHEURFA Computers.
CIS 725 Wireless networks. Low bandwidth High error rates.
Performance Evaluation and Improvement of an Ad Hoc Wireless Network Takayuki Yamamoto Graduate School of Engineering Science, Osaka University, Japan.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Qian Zhang Department of Computer Science HKUST Advanced Topics in Next- Generation Wireless Networks Transport Protocols in Ad hoc Networks.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
An End-to-end Approach to Increase TCP Throughput Over Ad-hoc Networks Sarah Sharafkandi and Naceur Malouch.
Mobile Communications: Mobile Transport Layer Mobile Communications Chapter 10: Mobile Transport Layer  Motivation  TCP-mechanisms  Indirect TCP  Snooping.
Asstt. Professor Adeel Akram.  Motivation  TCP mechanisms  Indirect TCP  Snooping TCP  Mobile TCP  Fast retransmit/recovery  Transmission freezing.
TCP PERFORMANCE OVER AD HOC NETWORKS Presented by Vishwanee Raghoonundun Assisted by Maheshwarnath Behary MSc Computer Networks Middlesex University.
Content-Based Routing in Mobile Ad Hoc Networks Milenko Petrovic, Vinod Muthusamy, Hans-Arno Jacobsen University of Toronto July 18, 2005 MobiQuitous 2005.
A Delay-Tolerant Network Architecture for Challenged Internets Author: Kevin Fall Paper Presentation: Vinay Goel.
Wireless TCP Prasun Dewan Department of Computer Science University of North Carolina
Data and Computer Communications Chapter 10 – Circuit Switching and Packet Switching (Wide Area Networks)
 Circuit Switching  Packet Switching  Message Switching WCB/McGraw-Hill  The McGraw-Hill Companies, Inc., 1998.
On the Cost/Delay Tradeoff of Wireless Delay Tolerant Geographic Routing Argyrios Tasiopoulos MSc, student, AUEB Master Thesis presentation.
 SNU INC Lab MOBICOM 2002 Directed Diffusion for Wireless Sensor Networking C. Intanagonwiwat, R. Govindan, D. Estrin, John Heidemann, and Fabio Silva.
Enhanced Disruption Tolerant Bundle Delivery (EDIFY) System Discussion.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
A Remote Code Update Mechanism for Wireless Sensor Networks Thanos Stathopoulos, John Heidemann and Deborah Estrin CEG 790 Presentation By: Trevor Smith.
PRoPHET+: An Adaptive PRoPHET- Based Routing Protocol for Opportunistic Network Ting-Kai Huang, Chia-Keng Lee and Ling-Jyh Chen.
COP 5611 Operating Systems Spring 2010 Dan C. Marinescu Office: HEC 439 B Office hours: M-Wd 2:00-3:00 PM.
Networking Fundamentals. Basics Network – collection of nodes and links that cooperate for communication Nodes – computer systems –Internal (routers,
KAIS T High-throughput multicast routing metrics in wireless mesh networks Sabyasachi Roy, Dimitrios Koutsonikolas, Saumitra Das, and Y. Charlie Hu ICDCS.
UCLA ENGINEERING Computer Science RobustGeo: a Disruption-Tolerant Geo-routing Protocol Ruolin Fan, Yu-Ting Yu *, Mario Gerla UCLA, Los Angeles, CA, USA.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
TCP OVER ADHOC NETWORK. TCP Basics TCP (Transmission Control Protocol) was designed to provide reliable end-to-end delivery of data over unreliable networks.
Ασύρματες και Κινητές Επικοινωνίες Ενότητα # 11: Mobile Transport Layer Διδάσκων: Βασίλειος Σύρης Τμήμα: Πληροφορικής.
Chapter 11.4 END-TO-END ISSUES. Optical Internet Optical technology Protocol translates availability of gigabit bandwidth in user-perceived QoS.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Peer-to-Peer Networks 13 Internet – The Underlay Network
1 Ad-hoc Transport Layer Protocol (ATCP) EECS 4215.
-1/16- Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks C.-K. Toh, Georgia Institute of Technology IEEE.
MAC Protocols for Sensor Networks
Transport layer.
Packet Switching Datagram Approach Virtual Circuit Approach
ECE 544 Protocol Design Project 2016
Ad-hoc Transport Layer Protocol (ATCP)
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
ECE 544 Protocol Design Project 2016
Tarun Banka Department of Computer Science Colorado State University
Viet Nguyen Jianqing Liu Yaqin Tang
TCP for Wireless Networks
Presentation transcript:

DTNLite: Reliable Data Delivery in Sensornets Rabin Patra and Sergiu Nedevschi UCB Nest Retreat 2004

Why Reliable Data Delivery? Reliable Data Delivery – not much attention yet –Monitoring, directed diffusion, object tracking allow occasional data loss Interesting in perspective –Network reprogramming –Reliable and timely delivery of emergency event notifications –For large data units – reliable delivery of all packets –As sensornets become ubiquitous, reliability may be desired

ICT4B Information and communication technology for billions Issues –Cheap handheld devices –Cheap networking solutions –Proposed solution: tiered architecture Reliable storage & communication Relaying/caching, permanent storage Unreliable storage/comm

DTN Communications between data centers and proxies – intermittent Communication mechanisms: DTN Delay tolerant networking: –Route messages efficiently and reliably in networks facing the following challenges: Disconnection High roundtrip delay Fast evolving topologies High error rates Links between proxies and handhelds? –DTNLite

Reliable Delivery Design Space Instruments for achieving reliability: acknowledgement and retransmission Who performs retransmission? –Source only Unsuitable for high error rates, lots of retransmissions –Some nodes –Every node Too many acks What is acknowledged? –Every packet Too many acks –Selective acks (nacks) Large delays due to reassembly at intermediary nodes

Existing Approaches RMST: Reliable MultiSegment Transport –Some nodes perform reassembly –In-network caching, selective nacks PSFQ: Pump Slow Fetch Quickly –Every node performs a special form of reassembly: packets forwarded immediately if in-order, buffered otherwise In-network caching, repair requests when out-of order packets received –Achieves small delay (~ forwarding) and small number of retransmissions (~ store-and-forward)

Stand-up to Challenges? Problems due to end-to-end acks: –If high-roundtrip delays, storage overflow at source –If no end-to-end acks: unreliable due to flaky nodes Problems due to storage in RAM: –If disconnections: buffer overflow –If large message sizes: impossible reassembly at intermediaries

Proposed Mechanisms Store-and-forward using stable storage: –Prevents buffer overflows due to large roundtrip delays and disconnections Custody transfer as an alternative to end-to- end reliability: –Custody transfer: the acknowledged delivery of a message from one hop to another and the corresponding passing of reliable delivery responsibility. –Storage at source freed earlier –Smaller end-to-end paths

Design Decisions Support custody transfer Assume underlying tree-based multi-hop routing Use Application Data Units or “bundles” for custody transfers –reliable in-order packet delivery within a bundle Layered architecture : –separation between custody transfer mechanism and underlying multi-hop transmission mechanism Using Matchbox file-system for persistent storage Next custody hop discovery using custody query mechanism

DTNLite Architecture

Custody Transfer Custodians form an overlay Reliable message transfer between 2 custody hops: –Any of the reliable delivery protocols discussed –Handshaking for custody exchange Not fate sharing, end-to-end argument violation? –Content more important than node individuality –All nodes equally likely to fail

Issues with Custody Transfer Duplicate management –Wasted storage –Problems with aggregation, in-network processing Duplicate-sensitive operations: avg Duplicate-insensitive operations: max –Possible solution: broadcasting deletion packets with lists of already delivered ids? Custody transfer and congestion –Drop possible only at source –Care when accepting messages for transfer Choosing next custody hop

Choosing the Next Hop Simple metrics maintained locally: –Energy level remaining –Average delivery time –Average energy consumption for message delivery Maintaining metrics – 2 approaches –Distance-vector like –Maintained by basestation

Custody Query Mechanism Send query towards destination: –Unicast –Flood –Limited flood, followed by unicast Candidates answer with query responses Current custodian chooses best candidate, initiates custody transfer to candidate, using source routing

Example Custody Query

Evaluating Custody Transfer Policies Setup: –Discrete event based simulator developed for simulating routing algorithms for networks with scheduled disconnections Adapted for unscheduled disconnections and collisions –Connectivity model: radius of connectivity –Link go up at exponentially separated intervals –Time link stays up: determined by link length –Simplified collision model: can only happen if packets destined for same node –Flooding level: 3 Evaluated policies: farthest, nearest, max energy level, min average delivery time, min average energy consumption

Average Latency Per Message

Hops Per Message

Average Node Energy

Standard Deviation

Conclusions & Future Work DTNLite implementation for TinyOS (to be delivered this month) Evaluations: –possible to optimize for a particular objective (energy, delay) using purely local information. –different selection policies able to exploit network asymmetries in connectivity and resources Future work: –comparative evaluation of our architecture with other reliable transfer protocols that have been proposed –perform extensive testing of the DTNLite implementation for TinyOS, to measure the overhead and performance of the custody transfer mechanism. –address other issues in reliable custody transfer (routing, duplicate detection, data aggregation) –Better metrics for custody hop selection