Distributed Token Circulation in Mobile Ad Hoc Networks Navneet Malpani, Intel Corp. Nitin Vaidya, Univ. Illinois Urbana-Champaign Jennifer Welch, Texas.

Slides:



Advertisements
Similar presentations
Ranveer Chandra Ramasubramanian Venugopalan Ken Birman
Advertisements

Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
An Adaptive Compulsory Protocol for Basic Communication in Ad-hoc Mobile Networks Ioannis Chatzigiannakis Sotiris Nikoletseas April 2002.
Multicast in Wireless Mesh Network Xuan (William) Zhang Xun Shi.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
1 Location-Aided Routing (LAR) in Mobile Ad Hoc Networks Young-Bae Ko and Nitin H. Vaidya Yu-Ta Chen 2006 Advanced Wireless Network.
“Location-Aided Routing (LAR) in Mobile Ad Hoc Network” by Young-bae ko Nitin H. Validya presented by Mark Miyashita.
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks ACM Wireless Networks Journal, 2002 BENJIE CHEN,
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
6/3/ Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross-Layer Information Awareness CS495 – Spring 2005 Northwestern University.
Multicasting in Mobile Ad-Hoc Networks (MANET)
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols By Josh Broch, David A. Maltz, David B. Johnson, Yih- Chun Hu, Jorjeta.
Ad-Hoc Networking Course Instructor: Carlos Pomalaza-Ráez D. D. Perkins, H. D. Hughes, and C. B. Owen: ”Factors Affecting the Performance of Ad Hoc Networks”,
Effects of Applying Mobility Localization on Source Routing Algorithms for Mobile Ad Hoc Network Hridesh Rajan presented by Metin Tekkalmaz.
1 Routing in Mobile Ad Hoc Networks most slides taken with permission from presentation of Nitin H. Vaidya University of Illinois at Urbana-Champaign.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
© nCode 2000 Title of Presentation goes here - go to Master Slide to edit - Slide 1 Reliable Communication for Highly Mobile Agents ECE 7995: Term Paper.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
QoS Constraint Routing Protocols for Mobile Ad Hoc
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Di Wu 03/03/2011 Geographic Routing in Clustered Multi-layer Vehicular Ad Hoc Networks for Load Balancing Purposes.
Anonymous Gossip: Improving Multicast Reliability in Mobile Ad-Hoc Networks Ranveer Chandra (joint work with Venugopalan Ramasubramanian and Ken Birman)
17/10/2003TCP performance over ad-hoc mobile networks. 1 LCCN – summer 2003 Uri Silbershtein Roi Dayagi Nir Hasson.
1 A Novel Mechanism for Flooding Based Route Discovery in Ad hoc Networks Jian Li and Prasant Mohapatra Networks Lab, UC Davis.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #5 Mobile Ad-Hoc Networks TBRPF.
SDSR – “Superior” DSR Jay Chen Siddharth Gidwani Christopher Yap.
Ad Hoc Wireless Routing COS 461: Computer Networks
ENHANCING AND EVALUATION OF AD-HOC ROUTING PROTOCOLS IN VANET.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Vikramaditya. What is a Sensor Network?  Sensor networks mainly constitute of inexpensive sensors densely deployed for data collection from the field.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
A Simple and Effective Cross Layer Networking System for Mobile Ad Hoc Networks Wing Ho Yuen, Heung-no Lee and Timothy Andersen.
A Cooperative Diversity- Based Robust MAC Protocol in wireless Ad Hoc Networks Sangman Moh, Chansu Yu Chosun University, Cleveland State University Korea,
DISTRIBUTED TOKEN CIRCULATION ON MOBILE AD HOC NETWORKS.
Mobile Routing protocols MANET
1 A Mutual Exclusion Algorithm for Ad Hoc Mobile networks Presentation by Sanjeev Verma For COEN th Nov, 2003 J. E. Walter, J. L. Welch and N. Vaidya.
Mobile Adhoc Network: Routing Protocol:AODV
Improving QoS Support in Mobile Ad Hoc Networks Agenda Motivations Proposed Framework Packet-level FEC Multipath Routing Simulation Results Conclusions.
ROUTING ALGORITHMS IN AD HOC NETWORKS
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
G-REMiT: An Algorithm for Building Energy Efficient Multicast Trees in Wireless Ad Hoc Networks Bin Wang and Sandeep K. S. Gupta NCA’03 speaker : Chi-Chih.
A Power Saving MAC Protocol for Wireless Networks Technical Report July 2002 Eun-Sun Jung Texas A&M University, College Station Nitin H. Vaidya University.
Dynamic Source Routing (DSR) Sandeep Gupta M.Tech - WCC.
Designing Routing Protocol For Mobile Ad Hoc Networks Navid NIKAEIN Christian BONNET EURECOM Institute Sophia-Antipolis France.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
KAIS T High-throughput multicast routing metrics in wireless mesh networks Sabyasachi Roy, Dimitrios Koutsonikolas, Saumitra Das, and Y. Charlie Hu ICDCS.
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
SHORT: Self-Healing and Optimizing Routing Techniques for Mobile Ad Hoc Networks Presenter: Sheng-Shih Wang October 30, 2003 Chao Gui and Prasant Mohapatra.
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
Self-stabilizing energy-efficient multicast for MANETs.
MDDV: A Mobility-Centric Data Dissemination Algorithm for Vehicular Networks H. Wu, R. Fujimoto, R. Guensler and M. Hunter (gatech) VANET 2004: First ACM.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Improving Fault Tolerance in AODV Matthew J. Miller Jungmin So.
Peter Pham and Sylvie Perreau, IEEE 2002 Mobile and Wireless Communications Network Multi-Path Routing Protocol with Load Balancing Policy in Mobile Ad.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
A Cluster-based Routing Protocol for Mobile Ad hoc Networks
Mesh-based Geocast Routing Protocols in an Ad Hoc Network
Mobicom ‘99 Per Johansson, Tony Larsson, Nicklas Hedman
A comparison of Ad-Hoc Routing Protocols
GeoTORA: A Protocol for Geocasting in Mobile Ad Hoc Networks
A Mutual Exclusion Algorithm for Ad Hoc Mobile Networks
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
ECE 544 Protocol Design Project 2016
A Probabilistic Routing Protocol for Mobile Ad Hoc Networks
A Probabilistic Routing Protocol for Mobile Ad Hoc Networks
Presentation transcript:

Distributed Token Circulation in Mobile Ad Hoc Networks Navneet Malpani, Intel Corp. Nitin Vaidya, Univ. Illinois Urbana-Champaign Jennifer Welch, Texas A&M Univ. Presented at Int’l Conf. on Network Protocols, Nov or pdf

Introduction Mobile Ad Hoc Networks (MANETs) –Formed by a collection of wireless mobile hosts, without making use of any existing infrastructure (such as base stations or telephone lines). –Pair of nodes communicate with each other either over a wireless link between the two nodes, or by traversing a sequence of wireless links over several other intermediate nodes.

Example Mobile Ad Hoc Network AB C DE C DE BA

Introduction continued Usefulness –Disaster recovery –Search and rescue in remote areas –Military operations Characteristics of Mobile Ad Hoc Networks –Highly dynamic topology –Highly variable message delays –Variable transmission error rates –Constraints on energy consumption –Constraints imposed by wireless interfaces

Token Circulation Definition Ensure that a token circulates throughout the network, visiting every node infinitely often. Round: Minimal length sequence of nodes visited to ensure that every node is visited at least once.

Token Circulation Example AB C DE T T T T TT A B C E D C A B C E D C A... Length of round 1: 5 Length of round 2: 6 Length of round 3: 6

Token Circulation Application Total order of message delivery in a group communication service Key features of a group communication service: –Maintaining information regarding group membership –Communication among nodes in the group in an ordered manner

Token Circulation Application Token carries a sequence number, which is always incremented. Sender multicasts message with sequence number; receiver delivers in order. OR Messages are stored in the token itself (large token). Additional mechanisms are needed to obtain desired level of reliability.

Token Circulation Algorithms Local Least Recently Visited (LR): forward token to neighbor visited least recently Local Least Frequently Visited (LF): forward to neighbor visited least frequently AB C DE LR: ACBCDE CACBCDE CACBCD E... LF: ACBCDE DECACB CDEDEDECACB C...

More TC Algorithms Choose next destination among all nodes. Global Least Recently (GR): forward to any node in network visited least recently Least Frequently (GF): forward to any node in network visited least frequently

Yet More TC Algorithms GRN: Global Least Recently + visit intermediate nodes on the path GFN: Global Least Frequently + visit intermediate nodes on the path (not studied) Iterative Search: try to find Hamiltonian Path using more history information (see paper for more details)

Performance Measures Round length: number of nodes visited by the token in a round Message overhead: number of bytes sent per round Time overhead: time required to complete a to complete a round

Simulation Results ns-2 simulator with CMU extensions System contains 20 nodes initially placed randomly in a 1000m x 300m box Random Waypoint mobility model Each algorithm runs as an application on top of TCP and DSR protocol Results for Static and Dynamic topologies

Static Topologies Plots of –number of nodes visited –number of bytes sent –amount of time taken during each round, averaged over 50 different scenarios

Discussion of Static Results LF diverges GR and GF trivially have best round length, but not so good on messages & time LR is quite good Iterative Search is best overall

Dynamic Topologies Varying speed (6, 12, 18 and 24 m/sec) with constant hello interval of 0.5 sec Varying hello interval (0.1, 0.3, 0.5 and 0.7 sec) with constant speed of 12 m/sec Hello Threshold: 3 Number of scenarios: 30 Duration of simulation was varied inversely with the speed

Discussion of Dynamic Results Random Nature of Results –Effect of uncertainty in the topology knowledge due to the hello protocol –Effect of the TCP timeout intervals when partitions occur –Chaotic nature of the algorithms themselves LR is the best! Close to optimal round length.

Conclusion Identified new problem for MANETs -- token circulation Proposed several distributed algorithms Compared them by simulation Overall best algorithm : –Iterative Search in the static case –LR algorithm in the dynamic case

Future Work Identify characteristics of graphs on which LR has good performance -- there are graphs on which it has exponential round length (cf. recent work by Yu Chen) Integrate token circulation with mechanisms for complete group communication service Make tolerant of token loss / partitions Find lower bounds on possible performance and find optimal algorithms