M. Faloutsos1 DART: Scalable Ad hoc Routing DART: Dynamic Address RouTing Michalis Faloutsos Joint work with: Jakob Eriksson Srikanth Krishnamurthy.

Slides:



Advertisements
Similar presentations
ECE /24/2005 A Survey on Position-Based Routing in Mobile Ad-Hoc Networks Alok Sabherwal.
Advertisements

Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Peer to Peer and Distributed Hash Tables
Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
1 Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces Dmitri Krioukov CAIDA/UCSD Joint work with F. Papadopoulos, M.
COMPUTER Science & Engineering Scalable Fault-Tolerant Networking: Re-evaluating The Network Layer Michalis Faloutsos Srikanth Krishnamurthy C.V. Ravishankar.
M. Faloutsos1 DART: Scalable Ad hoc Routing DART: Dynamic Address RouTing Jakob Eriksson Michalis Faloutsos Srikanth Krishnamurthy.
Lecture 5 - Routing On the Flat Labels M.Sc Ilya Nikolaevskiy Helsinki Institute for Information Technology (HIIT)
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
MPAC 2004Rae Harbird 1 RUBI Adaptive Resource Discovery for Ubiquitous Computing Rae Harbird Stephen Hailes
Self-Organizing Hierarchical Routing for Scalable Ad Hoc Networking David B. Johnson Department of Computer Science Rice University Monarch.
Common approach 1. Define space: assign random ID (160-bit) to each node and key 2. Define a metric topology in this space,  that is, the space of keys.
Progress Report Wireless Routing By Edward Mulimba.
Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems Antony Rowstron and Peter Druschel Proc. of the 18th IFIP/ACM.
Topics in Reliable Distributed Systems Lecture 2, Fall Dr. Idit Keidar.
Internet Indirection Infrastructure Ion Stoica UC Berkeley.
GeoLANMAR Routing: Asymptotic Analysis in Large and Dense Networks Broadnets 2005 Boston, Oct 5, 2005 Mario Gerla, Biao Zhou (UCLA) F. de Rango, S. Marano.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Ad Hoc Networks Routing
1 Introduction to Wireless Ad-Hoc Networks Routing Michalis Faloutsos Some slides borrowed From Guor-Huar Lu.
Landmark Routing for Large Ad Hoc Wireless Networks Globecom 2000 San Francisco, Nov 30, 2000 Mario Gerla, Xiaoyan Hong and Gary Pei Computer Science Department.
Scalable Ad Hoc Routing: The Case for Dynamic Addressing INFOCOM 2004 Jakob Eriksson, Michalis Faloutsos, Srikanth Krishnamurthy University of California,
CS 672 Paper Presentation Presented By Saif Iqbal “CarNet: A Scalable Ad Hoc Wireless Network System” Robert Morris, John Jannotti, Frans Kaashoek, Jinyang.
Anonymous Gossip: Improving Multicast Reliability in Mobile Ad-Hoc Networks Ranveer Chandra (joint work with Venugopalan Ramasubramanian and Ken Birman)
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
1 Paper: IMPORTANT by Bai Sadagopan et al. Michalis Faloutsos.
Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets.
File Sharing : Hash/Lookup Yossi Shasho (HW in last slide) Based on Chord: A Scalable Peer-to-peer Lookup Service for Internet ApplicationsChord: A Scalable.
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
Ad Hoc Wireless Routing COS 461: Computer Networks
Mobile Ad-hoc Pastry (MADPastry) Niloy Ganguly. Problem of normal DHT in MANET No co-relation between overlay logical hop and physical hop – Low bandwidth,
ENHANCING AND EVALUATION OF AD-HOC ROUTING PROTOCOLS IN VANET.
Ad Hoc Networking via Named Data Michael Meisel, Vasileios Pappas, and Lixia Zhang UCLA, IBM Research MobiArch’10, September 24, Shinhaeng.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
09/07/2004Peer-to-Peer Systems in Mobile Ad-hoc Networks 1 Lookup Service for Peer-to-Peer Systems in Mobile Ad-hoc Networks M. Tech Project Presentation.
CROSS-ROAD: CROSS-layer Ring Overlay for AD Hoc Networks Franca Delmastro IIT-CNR Pisa Cambridge, March 23 rd 2004.
Scalable Routing Protocols for Mobile Ad Hoc Networks Xiaoyan Hong, Kaixin Xu, and Mario Gerla at UCLA.
IDRM: Inter-Domain Routing Protocol for Mobile Ad Hoc Networks C.-K. Chau, J. Crowcroft, K.-W. Lee, S. H.Y. Wong.
Using the Small-World Model to Improve Freenet Performance Hui Zhang Ashish Goel Ramesh Govindan USC.
Network and Communications Ju Wang Chapter 5 Routing Algorithm Adopted from Choi’s notes Virginia Commonwealth University.
Scalable Ad Hoc Routing the Case for Dynamic Addressing.
DART Dynamic Address RouTing A network layer routing protocol, Jakob Eriksson, Michalis Faloutsos and Srikanth Krishnamurthy Department of Computer Science.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
The Performance of Query Control Schemes for the Zone Routing Protocol Zygmunt J. Haas Marc R. Pearlman.
CarNet/Grid: Scalable Ad-Hoc Geographic Routing Robert Morris MIT / LCS
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
A Scalable Routing Protocol for Ad Hoc Networks Eric Arnaud Id:
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
PRIN WOMEN PROJECT Research Unit: University of Naples Federico II G. Ferraiuolo
Peer to Peer Network Design Discovery and Routing algorithms
November 4, 2003Applied Research Laboratory, Washington University in St. Louis APOC 2003 Wuhan, China Cost Efficient Routing in Ad Hoc Mobile Wireless.
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
Middleware issues: From P2P systems to Ad Hoc Networks
PeerNet: Pushing Peer-to-Peer Down the Stack Jakob Eriksson, Michalis Faloutsos, Srikanth Krishnamurthy University of California, Riverside.
Improving Fault Tolerance in AODV Matthew J. Miller Jungmin So.
Incrementally Improving Lookup Latency in Distributed Hash Table Systems Hui Zhang 1, Ashish Goel 2, Ramesh Govindan 1 1 University of Southern California.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
A Location-Based Routing Method for Mobile Ad Hoc Networks
AODV-OLSR Scalable Ad hoc Routing
A comparison of Ad-Hoc Routing Protocols
Sensor Network Routing
CSE 4340/5349 Mobile Systems Engineering
Self-Organizing Hierarchical Routing for Scalable Ad Hoc Networking
Self-Organizing Hierarchical Routing for Scalable Ad Hoc Networking
Faloutsos: My Areas of Research
A Probabilistic Routing Protocol for Mobile Ad Hoc Networks
Routing in Mobile Ad-hoc Networks
A Semantic Peer-to-Peer Overlay for Web Services Discovery
Presentation transcript:

M. Faloutsos1 DART: Scalable Ad hoc Routing DART: Dynamic Address RouTing Michalis Faloutsos Joint work with: Jakob Eriksson Srikanth Krishnamurthy

M. Faloutsos 2 The Future of Ad Hoc Networks Meganode ad hoc networking Pockets of wireless connectivity Consumer owned networks Large scale sensor networks Commercial interest: Starbucks, cell phone companies Interoperate and exploit wires where available Plug-n-play operation, zero-configuration.

M. Faloutsos 3 Why on Earth...? Rural networks Consumer owned networking Theater-wide military networks Internet 2.0? Civil disobedience Protecting civil liberties Free speech Ubiquitous and free connectivity? Networked society Who knew what Internet would become? Who knew what Internet would become? DIY networking Circumventing copyrights? Overthrowing governments? Because we can! Developing countries

M. Faloutsos 4 Question: Are We Ready For This? Current Ad Hoc networks do not scale! Only to a few hundred nodes! Reactive (AODV/DSR): Routing relies on flooding! Proactive (DSDV): Keeping track of all nodes: O(N) Even wireline networks have problems: Internet was not designed for mobility!

M. Faloutsos 5 DART Could Be It! Our approach replaces node address with two numbers: Node identifier - static. Routing address - dynamic. Address indicates current network location Distributed lookup table maps identifier to current routing address.

M. Faloutsos 6 DART: a Novel Networking Approach The basic idea: separate node identity from address Address indicates location in the network topology Not an overlay: an alternative routing layer application transport network link physical application transport network link physical Paper appeared at IPTPS 2003 Different name there: PeerNet Poster at ICNP 2003 Paper to appear at INFOCOM 2004 (P2P networking, Chord, Pastry etc) (DART)

M. Faloutsos 7 Roadmap DART Address allocation Routing Node Lookup Simulation Results Related work Conclusion

M. Faloutsos 8 The Status Quo: Proactive Routing Proactive routing: do routing before you need it In Internet: scaling thru address aggregation With mobility: you can’t aggregate addresses Keep state per node O(N), and updates for all x x x.x x.x 10.x.x.x

M. Faloutsos 9 The Status Quo: Reactive Reactive routing: search when you need a path Do nothing ahead of time Route discovery: flood the whole network Optimizations can’t help:Incremental flooding, caching of routes

M. Faloutsos 10 DART: The Overview Basic idea: permanent nodeID =/= transient address The address reflects network location It is a proactive routing scheme, distance vector Consequences: Routing is simplified: address tells me where you are Nodes with similar addresses are “near” each other Challenges: Address allocation: When I move, change the address ID to Address mapping: Given an ID, find the address

M. Faloutsos 11 Overview: How DART Works A new node finds a legitimate address: Through overhearing periodic routing updates. If the node moves, it gets a new address. Nodes exchange routing tables periodically DART provides lookup: (nodeID, address) Not similar to typical Distr. Hash Tables! Each node registers and updates its entry

M. Faloutsos 12 Address Space as Binary Tree Addresses as leaves in a virtual binary tree Prefix Tree: a prefix: 00x, 0xx etc Prefix Subgraph: subgraph induced by prefix Prefix Tree

M. Faloutsos 13 DART Address Invariant All nodes within any given subtree are able to communicate using only nodes in that subtree.

M. Faloutsos 14 Managing Dynamic Addresses Maintain a unique address for every node. Ensure that all prefix subgraphs are connected (Address Invariant) Minimize communication overhead Require no centralized sources infrastructure. Minimize required address size (in bits) Keep prefixes small

M. Faloutsos 15 Basic Operation Joining node picks an address with a prefix common with one of its neighbors. The routing table is consulted to ensure that the address invariant is met Efficient use of address space: shorter prefixes Maximize connectivity within prefix graph Robustness, reduction of overhead

M. Faloutsos 16 Address Allocation Example When a node joins, it picks an address that shares a prefix one of its neighbors.

M. Faloutsos 17 Several Subtleties Exist When nodes move, who is in charge Left most node in address tree Id of this node “characterizes” subtree or network Should we try to balance the tree proactively? We tried, made things complicated Per-need balancing seems to work well Merging of networks Network with “lowest” id wins Clever assignment of ids to “stable” static nodes will help things

M. Faloutsos 18 Routing with DART

M. Faloutsos 19 Routing is simplified If you know the address, life is sweet Proactive operation Distance vector style Nodes keep track of prefixes Best hop neighbor per prefix Routing table has O(logN) entries! See next slide

M. Faloutsos 20 How Routing Works in DART Scalability through information abstraction Check destination address one bit a time Route packet to the appropriate prefix subtree Routing state: O(log N) for a well balanced tree

M. Faloutsos 21 An example Routing table of node with address 100 0xx : node at x: null 101: node at 101 Compare packet address with each row and forwarded accordingly

M. Faloutsos 22 Node Look Up What if we don’t know the address?

M. Faloutsos 23 Node Lookup Table Maps node identity -> current routing address. Uses existing routing layer state only. Upon connection establishment, current routing address of destination is looked up in table. Hierarchy of tables, local -> global, ensures scalability.

M. Faloutsos 24 Look Up Preliminaries Node is associated with three values Id of node, say A Current address of node addr(A) Hashed address of node A Hash(A) Id spaceaddress space A Hash(A)

M. Faloutsos 25 How The Look-Up Works Node with Address Hash(A) responsible for node with ID A Node(A) updates his entry To whoever is at Hash(A) Look up = routing to Hash(A) For B to talk to node id A Compute Hash(A) Query node at Hash(A) ID: A Addr: X ID: - Addr: Hash(A) ID: B Hash(A): ID space -> Address space

M. Faloutsos 26 Subtle Issues of Look Up What if no node has address Hash(A)? the node whose address is closer to this address is responsible for the mapping The system is push based: Each node wants to keep its mapping accurate Trade off: freq of update: accuracy vs overhead Many ideas for improving accuracy: Add locality: nodes far away need to have the significant bits right Nodes can cache information

M. Faloutsos 27 Other Characteristics of DART Efficient scalable support for multicasting and anycasting Exploit the virtual address tree to “establish” a multicast tree Loop-free routing Efficient loop-avoidance (log N bits per entry)

M. Faloutsos 28 Performance Evaluation Scalability needs REALLY large simulations N nodes : 10<N<4000: uniformly distributed, node density above 6. Mobility: random way point model: Move - pause - pick new destination - move, moving in straight lines

M. Faloutsos 29 Performed using two simulators: Home-grown for speed and scalability. ns-2 for comparisons and accuracy. Wireless nodes, with omnidirectional antennae. Simulations

M. Faloutsos 30 Extremely small average routing table size < 2*log N. About 15 routing entries for 4000 nodes! Routing Table Size Scales Superbly! Routing Table Network Size log N 2 log N Yes, 10,000

M. Faloutsos 31 The average path stretch is LOW, 30-35%. Recall that 25% stretch is common in Internet Does DART Increase Path Lengths?

M. Faloutsos 32 Ns-2 doesn’t scale to large wireless simulations. Simulated 400-node networks. Vary Connection Establishment Frequency: CEF Arguably, CEF increases in larger networks. Also, CEF depends on traffic patterns. Simulating Large Networks

M. Faloutsos 33 Overhead vs. CEF DART overhead is not significantly affected by CEF. Reactive protocols suffer when CEF increases. DART DSR AODV

M. Faloutsos 34 Throughput vs. CEF DART outperforms AODV/DSR when connection establishment frequency > 3. CEF = 3 means one connection/node every 2 mins.

M. Faloutsos 35 Hierarchical routing (Kleinrock, Kamoun ‘77) Clustering based routing: Landmark, LANMAR, Clusterhead, Hierarchical State Routing, MMWN, etc. Georouting: LAR, DREAM, Grid, etc. Distributed Hashtables: Chord, Plaxton routing (overlays) Routing in unstable networks, K. Fall, Intel, sigcomm’03 Regions as a new paradigm, Sollins, MIT, FDNA’03 FARA from ISI/MIT, Clark, Braden,Falk,Pingali,Faber Safari from Rice, Johnson, Riedi et al Virtual Ring Routing, Caesar et al Sigcomm 06 Related Work

M. Faloutsos 36 Conclusions DART is a scalable alternative to current ad hoc routing approaches. Time to re-evaluate our network architecture Future networks: beyond the Internet Our approach: a new network layer Address =/= identity Proactive routing Simulations of DART are very promising.

M. Faloutsos 37 Future Work Improve on all aspects of the protocol. Port simulation code to Linux kernel For real-world testing with Linksys basestations Add security and policy considerations.

M. Faloutsos 38 My Areas of Research Data Mining the Internet (Karagiannis, Siganos) Topology: models and patterns [ToN 03] [Netw/ing05] Traffic: model and predict behavior [GI 01] [Infocom 04] BLINC: traffic classification in the dark: [IMC 04] [SIGCOMM 05] Modeling and Improving BGP (G. Siganos, Y. He) NEMECIS: safeguarding BGP graph[Infocom 04] [GI 01] DART: A radical network layer for ad hoc [IPTPS 03] [Infocom 04] [TON 06] Ad hoc network protocols (Law) Multicasting and power efficient broadcast [ICNP 03] [Netw/ing05] Modeling mobility and cellular networks (Jobin) [Infocom 04] Cooperative Diversity (Jakllari) work in progress

M. Faloutsos 39 Late Breaking News: Poisson Returns Poisson distributions appear at the backbone High speed and large aggregation of sources seem to change the behavior! [Karagiannis et al Infocom ‘04] Distr. Of interarrival times of packets In an OC48 backbone line from CAIDA

M. Faloutsos 40 Thank you More details than you will ever need:

M. Faloutsos 41 NEMECIS: Validating BGP Policy A tool to analyze and validate BGP policy Motivation: robust BGP = healthy Internet Delivers: advice/alert in configuring and troubleshooting BGP policy and routing Key idea: use all inputs IRR dbases, Routeviews, routing updates For more: [Siganos et al. Infocom’04]

M. Faloutsos 42 Human Administrator Intended Policy NEMECIS -Detecting misconfigurations -Detecting illegitimate routing Configuration Information Declared Policy (in RPSL- Database) Misconfiguration Alert Illegal routing Alert Actual BGP Routing Routing Tables - Routes Updates NEMECIS: Two Loops of Functionality Loop 1: Configuration - Loop 2: Routing

M. Faloutsos 43

M. Faloutsos 44 Routing address - a fixed length binary string. Address Prefix, aka Prefix - a sequence of bits taken from the most significant end of a binary address string. Prefix Subgraph - The graph induced from the current network graph by the set of nodes that have a given prefix. Some Terminology

M. Faloutsos 45 Thanks to the invariant, routing is scalable. Each node keeps log N routing entries. The Routing Table