Mobility in Wireless Networks NSF Workshop Rutgers, July 31-Aug 1, 2007 Mario Gerla (UCLA) Dipankar Raychaudhuri (Winlab)

Slides:



Advertisements
Similar presentations
Robin Kravets Tarek Abdelzaher Department of Computer Science University of Illinois The Phoenix Project.
Advertisements

Supporting Cooperative Caching in Disruption Tolerant Networks
CodeTorrent: Content Distribution using Network Coding in VANET Uichin Lee, JoonSang Park, Joseph Yeh, Giovanni Pau, Mario Gerla Computer Science Dept,
Content Centric Networking in Tactical and Emergency MANETs Soon Y. Oh, Davide Lau, and Mario Gerla Computer Science Department University of California,
Group #1: Protocols for Wireless Mobile Environments.
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
Multicasting in Mobile Ad-Hoc Networks (MANET)
Jang, Donghyun 2011/4/4 1/21.
C - V e T Campus Vehicular Testbed E. Giordano, A. Ghosh, G. Marfia, S. Ho, J.S. Park, PhD System Design: Giovanni Pau, PhD Advisor: Mario Gerla, PhD.
Naming in Wireless Sensor Networks. 2 Sensor Naming  Exploiting application-specific naming and in- network processing for building efficient scalable.
Cross Layer Design in Wireless Networks Andrea Goldsmith Stanford University Crosslayer Design Panel ICC May 14, 2003.
Motion Pattern Characterization NSF Wireless Mobility Workshop Rutgers, July 31-Aug 1, 2007 Mario Gerla Computer Science Dept, UCLA
Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.
1 Security and Privacy in Sensor Networks: Research Challenges Radha Poovendran University of Washington
August 18-19, 2002 UCSC Baskin School of Engineering1 UCSC PERC COMPONENT: Protocols for Wireless Internetworks J.J. Garcia-Luna-Aceves Computer Communication.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
The Future of the Internet Jennifer Rexford ’91 Computer Science Department Princeton University
Wireless Mesh Networks
1 Energy Efficient Communication in Wireless Sensor Networks Yingyue Xu 8/14/2015.
Sensor Coordination using Role- based Programming Steven Cheung NSF NeTS NOSS Informational Meeting October 18, 2005.
SAP: STORAGE AWARE PROTOCOLS FOR HETEROGENEOUS NETWORKS Shweta Jain Assistant Professor Mathematics and Computer Science York College CUNY.
Ad Hoc Networking via Named Data Michael Meisel, Vasileios Pappas, and Lixia Zhang UCLA, IBM Research MobiArch’10, September 24, Shinhaeng.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
NSF Workshop on Bridging the Gap between Networking and Physical Layer Research Breakout Group #2 Reston, VA Aug 27-28, 2007.
Challenged Networking An Experimental Study of New Protocols and Architectures Erik Nordström.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
A Mobile-IP Based Mobility System for Wireless Metropolitan Area Networks Chung-Kuo Chang; Parallel Processing, ICPP 2005 Workshops. International.
Mobile Networking Challenges1 5.6 Mobile Ad Hoc Networks  Ad hoc network does not have any preexisting centralized server nodes to perform packet routing,
Wireless Networks Breakout Session Summary September 21, 2012.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Thrust 2 Layerless Dynamic Networks Lizhong Zheng, Todd Coleman.
1 Heterogeneity in Multi-Hop Wireless Networks Nitin H. Vaidya University of Illinois at Urbana-Champaign © 2003 Vaidya.
Content-Based Routing in Mobile Ad Hoc Networks Milenko Petrovic, Vinod Muthusamy, Hans-Arno Jacobsen University of Toronto July 18, 2005 MobiQuitous 2005.
Seung-Hoon Lee, Sewook Jung, Alexander Chang, Dea-Ki Cho, and Mario Gerla Network Research Lab Department of Computer Science University of California,
Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks” IEEE Communications.
1 Mobile ad hoc networking with a view of 4G wireless: Imperatives and challenges Myungchul Kim Tel:
BitTorrent enabled Ad Hoc Group 1  Garvit Singh( )  Nitin Sharma( )  Aashna Goyal( )  Radhika Medury( )
Cognitive Radio Networks
Overview of Research Activities Aylin Yener
A study of Intelligent Adaptive beaconing approaches on VANET Proposal Presentation Chayanin Thaina Advisor : Dr.Kultida Rojviboonchai.
Cooperative Wireless Networks Hamid Jafarkhani Director Center for Pervasive Communications and Computing
نیمسال اوّل افشین همّت یار دانشکده مهندسی کامپیوتر مخابرات سیّار (626-40) ارتباطات همکارانه.
Multicast ad hoc networks Multicast in ad hoc nets Multicast in ad hoc nets Review of Multicasting in wired networks Review of Multicasting in wired networks.
Main trends affecting research and innovation in the communications networks area Societal drivers: Urbanisation Smart cities Mobility Information availability.
1 BRUSSELS - 14 July 2003 Full Security Support in a heterogeneous mobile GRID testbed for wireless extensions to the.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Thrust 2 Overview: Layerless Dynamic Networks Lizhong Zheng.
Outline Introduction Existing solutions for ad hoc
Multiuser Receiver Aware Multicast in CDMA-based Multihop Wireless Ad-hoc Networks Parmesh Ramanathan Department of ECE University of Wisconsin-Madison.
Ad Hoc Network.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Smart Sensor Node Impact  GPS leveraged for geo-referenced identity, and low power communications synchronization. Up to 100x communications power reduction.
UCLA ENGINEERING Computer Science RobustGeo: a Disruption-Tolerant Geo-routing Protocol Ruolin Fan, Yu-Ting Yu *, Mario Gerla UCLA, Los Angeles, CA, USA.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Overview of Wireless Networks: Cellular Mobile Ad hoc Sensor.
Wireless Mesh Networks Myungchul Kim
Mobile NSF Workshop Rutgers, July 31-Aug 1, 2007 Discussion Themes.
MDDV: A Mobility-Centric Data Dissemination Algorithm for Vehicular Networks H. Wu, R. Fujimoto, R. Guensler and M. Hunter (gatech) VANET 2004: First ACM.
Group #3: Mobility Models and Mobile Testbeds. The Models Motion, Traffic, Network.
ICN based Architecture for IoT ICNRG/IETF 88, 2013 Yanyong Zhang, Dipankar Raychadhuri Rutgers University) Ravi Ravindran and Guo-Qiang Wang.
Mesh Networks and DTN Break Out Group  Common research challenges  A representative experiment  Issues for a one page writeup  what incentive for the.
A Security Framework for ROLL draft-tsao-roll-security-framework-00.txt T. Tsao R. Alexander M. Dohler V. Daza A. Lozano.
Session 1: Technology Development August 15 NSF Workshop.
Wireless sensor and actor networks: research challenges Ian. F. Akyildiz, Ismail H. Kasimoglu
Lecture 8: Wireless Sensor Networks By: Dr. Najla Al-Nabhan.
Medium Access Control. MAC layer covers three functional areas: reliable data delivery access control security.
Overview of Wireless Networks:
Introduction to Wireless Sensor Networks
Faloutsos: My Areas of Research
Presentation transcript:

Mobility in Wireless Networks NSF Workshop Rutgers, July 31-Aug 1, 2007 Mario Gerla (UCLA) Dipankar Raychaudhuri (Winlab)

2 The Mobile Internet New generation of powerful portable devices: –Can support most Internet needs Wireless speeds growing constantly: –4G expected to achieve 40Mbps –WiFi up to 100Mbps Opportunistic ad hoc networking facilitates P2P applications

3 The paradigm shift Traditional wireless mobility: –Last hop connectivity –Soft handoff (horizontal, vertical) –Most data and services still in the wired Internet –Advanced ad hoc networking only in tactical and emergency scenarios

4 The paradigm shift (cont) Emerging Wireless, Mobile Internet –The data is collected by portable devices, and may stay (and be searched) on the devices for a long time: Urban sensing (vehicle, people) Medical monitoring, etc –This creates new challenges Distributed index (ie, publish/subscribe) to find the data Data sharing among mobilers via opportunistic P2P networking –Infrastructure used if more efficient than pure wireless: “Reconfiguring the Infrastructure” Privacy, security, protection from attacks Intermittent operations (mobile nodes can become disconnected); delay tolerant applications; disruption tolerant networks

5 Examples Car Torrent Blue Torrent Medical monitoring CarTel EU Haggle project Diesel Net Etc…

6 Bluetooth: Content Sharing A A B C B C DD A D B C

7 Collection Center ZigBee Intra-PAN link ZigBee Enabled PDA ZigBee Medical Sensors ZigBee Inter-PAN link Patient Collaborative Health Monitoring: ZigBee as Health-Net

8 Nurses Cache-and-Forward Patient Data to Doctors

9 Objectives of the NSF Workshop How does “mobility” change traditional network architecture and design? –Applications –Protocols –Mobility models What new research is needed to make progress?

Emerging Mobile Applications

11 A New Generation of Mobile Applications Distributed Integrating heterogeneous infrastructure (e.g., WiFi, cellular, satellite) and ad-hoc networking Location-aware –Opportunistic, predict, control Exploit mobility –Homogenous or heterogeneous mobility –Individual or swarm mobility User behavior-aware Location privacy sensitive Self-configurable, self-tunable, remotely manageable Energy-aware

12 Mobile Application Examples Vehicular applications –Safety, traffic information, route planning Content-sharing applications –Entertainment (video, audio), games Mobile external sensing –Urban pollution sensing, accident reporting Mobile ad-hoc services –Relaying to near-field users Emergency applications –Disaster recovery Mobile network management Mobile social networking –Mobile Facebook

13 Research Challenges Mobile application design –Location-aware, exploit mobility, gathering feedback and traces Performance and QoS –Delay tolerance, channel variations Cross-layer communication design –Exploit mobile application context information Security issues –Location validation, Location privacy, Trust management Social aspects –Event-driven and event-generated mobility

14 Research Challenges (cont’d) Mobile data management Fault tolerance –In the presence of mobility Remote maintainability –Deployment, configuration, upgrade, debugging Application and service-oriented protocols –Over mobile networks

Robust, Motion Resistant Protocols

16 Main Message Changing the view on mobility: –Mobility has become an integral attribute of the Internet and we need to design for it. –Without mobility support, the Internet cannot be invisible. There is a big gap between the opportunities that mobility enables and the practical protocols that can take advantage of it. Design for mobility requires a clean-slate approach to communication protocols in wireless networks and the Internet Design for mobility has direct implications on the Internet design, in-network storage and localization information being key factors Standards are needed for benchmarks.

17 Why Is Mobility Important? (1) Mobility impacts: –the conditions in which protocols must operate, –the state and context that nodes can use to communicate, and –the problems that protocols must solve. Examples: –The state of links is a function of mobility (e.g., link lifetime, fading, multipath effects, direction of a link, etc.) –The neighborhood of a node changes with mobility, which impacts reliable exchanges, channel division (space, time, code, frequency) among neighbors, and forms of cooperation between senders and receivers (e.g., virtual MIMO, network coding) –End-to-end paths change with mobility, which impacts path characteristics (in-order delivery, delay, throughput, lifetime of paths, etc.) and the allocation of resources over paths to satisfy application requirements.

18 Why Is Mobility Important? (2) Examples: –Supporting security is more difficult with mobility: Identities of trusted nodes must change –Privacy can be compromised with mobility: Example: Node can be tracked by the perceived location of its transmissions –Layering of protocols is hard(er) with mobility –Policy-based dissemination of information is more difficult with mobility (dynamic routing with multiple constraints) –Feedback to control data rate is not as useful if paths change (bottleneck state is stale) –Some form of dissemination is enabled or simplified with mobility.

19 Designing for Mobility Some protocols benefit from mobility: group mobility, etc. –Use mobility as a mechanism for information dissemination Controlled mobility: –nodes move around to improve topology, deliver data, store-carry-forward, –trajectory planning and changing what routes Interest-driven “physical” dissemination: –How should opportunistic data mules handle data? Content-driven routing

20 Designing for Mobility: A Clean Slate Exploit broadcast nature of links & in-network storage OSI/TCP architecture is no longer “the best”…What is the new slate? –MAC issues: MAC should work on broadcast and directional transmissions; support many-to-many rather than one-to-one communication –Network issues: Naming (no need for addresses?), attribute- based queries, geo-location is important, resource discovery (no DNS) –“Beyond routing”: resource discovery replaces route discovery; need for binding of resources/services on the basis of names;

21 Designing for Mobility: A Clean Slate (cont) –Route binding: “Opportunistic use of resources” cooperative x-mit schemes (take advantage of gains at PHY) incentive mechanisms (battery life, use of spectrum), cooperation using memory, virtual MIMO Use mobility of nodes to cooperate as data mules; need for coordination to decide which nodes move where Peer-to-peer opportunistic transmissions: how to cache, how to route, post box (beyond foreign agent). Trade storage for retransmissions –State information vs opportunism: Use of CSI induced by mobility to help cooperation vs opportunistically forwarding w/o CSI. –Tolerance to various forms of disruption (e.g., no connections)

22 Changing The Internet Design Use of storage and location information must be considered in the global routing design. Use of location information: IPv6 can be used but we must find anonymous location information in addressing…use of proxies and in-net storage. Easier approaches are above IP. Privacy and security implications There are localized protocols that can (should be) used (e.g., a DHCP-like approach) Mobility creates a stronger focus on security: –We do not know the local neighborhood. Opportunistic mobile routing infrastructures will become important Mobility changes the expectations for services (anywhere, anytime), but maintaining performance with seamless mobility is difficult.

23 Role of Standards What should be standardized? –Benchmarking different protocols (modeling and otherwise) –Understand dynamics of system to understand what to standardize –Need for a reference model capturing connectivity structures/motion patterns and spanning different scenarios and protocols. –Parameters that should be of interest are open –Look at the “connectivity structure” of a network (dense or sparse, guidelines)

24 Multicast Coupled with mobility, maintaining routing structure is hard Using m-cast to satisfy localized services Potentially more overhead that unicast In-network storage can help, but the consistency of data is an issue Need to study one-to-many-to-one (convergecast + multicast + anycast) Pull vs push with in-network storage

25 “Things to Things” Communication Location is key aspect of interaction Mobile sensors (e.g., health monitoring) with limited power need protocols Internet at the service of users and things that move.

Mobility Models and Mobile Testbeds

The Models Motion, Traffic, Network

28 Model Flexibility Multiple scale models –Micro and Macro levels, (e.g., from stop signs to cross town patterns Multi-faceted scenarios –Combines motion, data traffic, map, infrastructure –Interrelation between data/motion; data caching; aggregation, etc Trade off between accuracy and usability –Different applications may focus on different parameters

29 Traces to Models Traces: –Lack of cellular traces (owned by providers) –Lack of vehicular traces (not enough testbeds) –Lack of social network tracing experiments –Scarcity of urban traces Interplay/synergy of: –Measured traces –Synthetic models/traces –Theoretical motion/traffic models

30 Metrics and Parameters Motion Impact on Data Performance: –How are the metrics impacted by the particular motion patterns, –How do the motion patterns impact the traffic, Consider new “mobility” measures: –Inter-contact time, neighborhood change rate, partitioning, clustering, etc –Ideally, a few motion “primitives” that can cover most scenarios and allow cross comparison of test experiments

31 Performance Benchmarks Well defined benchmarks Knobs, ie, flexibility –Need to understand effect of knobs –Need knobs tunable to applications Sound design methodology –Ability to tradeoff accuracy, complexity etc –Verifiability

32 Evaluation Methodology Guidelines for community Model validation Model implementation verification Sound statistical analysis of results

Testbeds

34 Testbed Flexibility Multi-layer multi-user vs. single layer/user testbeds Heterogeneous (hardware, protocols, applications) Broad range of motion patterns: –From pre-scheduled to controlled and spontaneous Broad Range of devices: –From small scale testbeds (motes) to large scale testbeds (vehicles)

35 Testbed Scalability Testbed expansion with simulation and emulation Integration with real world networks and applications

36 Testbed Realism Need more than what simulation already gives us!! Need to understand: –Realistic user behavior in reaction to motion, data etc –Realistic channel behavior –Real implementation/HW constraints Uncover: –interactions between layers and inefficiencies –Incorrect common beliefs Appreciate: –HW, SW, Mgmt costs

37 Measurement Methodology Guidelines for the community Validation of the model (motion, traffic, etc) Verification of the implementation Repeatability Sensitivity analysis Sound statistical analysis

38 How can the Internet (and GENI) support mobile applications? Addressing and routing –Geo-routing –More generally, attribute based routing –Mobility support Interaction with the infrastructure –Off loading the wireless internet Wireless as emergency network –When the infrastructure is brought down Congestion control assistance Security, protection against attacks

39 Role of GENI Wireless Mobility testbeds Vehicular networks People to people networks Small scale - augmented by simulation (hybrid) Interoperation etc