Update Log Dissemination in Mobile Ad Hoc Networks Hideki HAYASHI Hitachi, Ltd., Central Research Laboratory (Grad. School of Info. Science and Tech.,

Slides:



Advertisements
Similar presentations
ROUTING IN INTERMITTENTLY CONNECTED MOBILE AD HOC NETWORKS AND DELAY TOLERANT NETWORKS: OVERVIEW AND CHALLENGES ZHENSHENG ZHANG.
Advertisements

MSS S i Half Reply Other MSSs ACCEPT OR REJECT MH H i NEWTKT REQUESTACK ACKs ART Start ART End AWT Start AWT End.
CSLI 5350G - Pervasive and Mobile Computing Week 3 - Paper Presentation “RPB-MD: Providing robust message dissemination for vehicular ad hoc networks”
1 Location-Aided Routing (LAR) in Mobile Ad Hoc Networks Young-Bae Ko and Nitin H. Vaidya Yu-Ta Chen 2006 Advanced Wireless Network.
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
A Mobile Infrastructure Based VANET Routing Protocol in the Urban Environment School of Electronics Engineering and Computer Science, PKU, Beijing, China.
Receiver-driven Layered Multicast S. McCanne, V. Jacobsen and M. Vetterli SIGCOMM 1996.
Small-world Overlay P2P Network
Effective Quorum Construction for Consistency Management in Mobile Ad Hoc Networks Takahiro HARA Osaka University, Japan.
An Analysis of the Optimum Node Density for Ad hoc Mobile Networks Elizabeth M. Royer, P. Michael Melliar-Smith and Louise E. Moser Presented by Aki Happonen.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Placement of Continuous Media in Wireless Peer-to-Peer Network Shahramram Ghandeharizadeh, Bhaskar Krishnamachari, and Shanshan Song IEEE Transactions.
ICNP'061 Benefit-based Data Caching in Ad Hoc Networks Bin Tang, Himanshu Gupta and Samir Das Computer Science Department Stony Brook University.
ICNP'061 Benefit-based Data Caching in Ad Hoc Networks Bin Tang, Himanshu Gupta and Samir Das Department of Computer Science Stony Brook University.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Hands-On Microsoft Windows Server 2003 Networking Chapter 7 Windows Internet Naming Service.
A Distance Routing Effect Algorithm for Mobility (DREAM)* Stefano Basagni Irnrich Chlamtac Violet R. Syrotiuk Barry A. Woodward.
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
Performance Evaluation and Improvement of an Ad Hoc Wireless Network Takayuki Yamamoto Graduate School of Engineering Science, Osaka University, Japan.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
1 Chapter Overview Routing Principles Building Routing Tables.
Gathering Data in Wireless Sensor Networks Madhu K. Jayaprakash.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
1 1 Quantifying Impact of Mobility on Data Availability in Mobile Ad Hoc Networks Takahiro Hara IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 9, NO. 2, FEBRUARY.
College of Engineering Non-uniform Grid- based Coordinated Routing Priyanka Kadiyala Major Advisor: Dr. Robert Akl Department of Computer Science and Engineering.
CSE 6590 Fall 2010 Routing Metrics for Wireless Mesh Networks 1 4 October, 2015.
1 BitHoc: BitTorrent for wireless ad hoc networks Jointly with: Chadi Barakat Jayeoung Choi Anwar Al Hamra Thierry Turletti EPI PLANETE 28/02/2008 MAESTRO/PLANETE.
Higashino Lab. Maximizing User Gain in Multi-flow Multicast Streaming on Overlay Networks Y.Nakamura, H.Yamaguchi and T.Higashino Graduate School of Information.
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
Review of the literature : DMND:Collecting Data from Mobiles Using Named Data Takashima Daiki Park Lab, Waseda University, Japan 1/15.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
1 Data Naming in Vehicle-to-Vehicle Communications HU Yao Goto Lab
A Fuzzy Content Centric Network Architecture for Real-time Communications in MANETs Niaz Morshed Chowdhury Dr. Lewis M. Mackenzie School of Computing Science.
PRoPHET+: An Adaptive PRoPHET- Based Routing Protocol for Opportunistic Network Ting-Kai Huang, Chia-Keng Lee and Ling-Jyh Chen.
IM NTU Distributed Information Systems 2004 Replication Management -- 1 Replication Management Yih-Kuen Tsay Dept. of Information Management National Taiwan.
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
K-Anycast Routing Schemes for Mobile Ad Hoc Networks 指導老師 : 黃鈴玲 教授 學生 : 李京釜.
Efficient Content Sharing Taking Account of Updating Replicas in Hybrid Peer-to-Peer Networks Tatsuru Kato, Shinji Sugawara, Yutaka Ishibashi Nagoya Institute.
November 4, 2003Applied Research Laboratory, Washington University in St. Louis APOC 2003 Wuhan, China Cost Efficient Routing in Ad Hoc Mobile Wireless.
1 CMP-MSI.07 CARES/SNU A Reusability-Aware Cache Memory Sharing Technique for High Performance CMPs with Private Caches Sungjune Youn, Hyunhee Kim and.
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
An Adaptive TDMA Slot Assignment Protocol in Ad Hoc Sensor Networks Akimitsu Kanzaki, Takahiro Hara and Shojiro Nishio ACM Symposium on Applied Computing,
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Antidio Viguria Ann Krueger A Nonblocking Quorum Consensus Protocol for Replicated Data Divyakant Agrawal and Arthur J. Bernstein Paper Presentation: Dependable.
2005/12/14 1 Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross-Layer Information Awareness Xin Yu Department of Computer Science.
IHP Im Technologiepark Frankfurt (Oder) Germany IHP Im Technologiepark Frankfurt (Oder) Germany ©
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks Zhao, J.; Cao, G. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 鄭宇辰
HoWL: An Efficient Route Discovery Scheme Using Routing History in Mobile Ad Hoc Networks Faculty of Environmental Information Mika Minematsu
Some Bluetooth Background
Anirban Mondal (IIS, University of Tokyo, JAPAN)
Routing Metrics for Wireless Mesh Networks
Analysis the performance of vehicles ad hoc network simulation based
Delay-Tolerant Networks (DTNs)
On the Effect of Group Mobility to Data Replication in Ad Hoc Networks
Ad-hoc Networks.
By Ioannis Chatzigiannakis, Elena Kaltsa, Sotiris Nikoletseas
Internet Networking recitation #4
Routing Metrics for Wireless Mesh Networks
Effective Replica Allocation
Balancing the Tradeoffs between Data Accessibility and Query Delay
Header Store & Haul Improving Mobile Ad-Hoc Network Connectivity through Repeated Controlled Flooding Thesis Presentation Robert Tyson Thedinger Department.
Data Dissemination and Management (3)
Presentation transcript:

Update Log Dissemination in Mobile Ad Hoc Networks Hideki HAYASHI Hitachi, Ltd., Central Research Laboratory (Grad. School of Info. Science and Tech., Osaka University) Takahiro HARA Shojiro NISHIO Grad. School of Info. Science and Tech., Osaka University

Abstract Replication to improve data accessibility is important. MH cannot verify whether own replica is same version as original due to network partitions. –Tentatively accesses replicas –Verifies access validity from update logs. Our methods improve data accessibility and reduce time for verifying access validity. Update log dissemination methods Mobile host (MH) can efficiently verify the validity of tentative accesses to replicas.

Contents Background and motivation Update log dissemination methods Performance evaluation Conclusions

Background Recent advances in radio communication and computer technologies –Development of mobile computing environments Mobile ad hoc networks –Every MH plays a role of a router and communicates with each other. 1 Data Access Request 1

Data sharing applications Collaborative works (Ex. Rescue activity) –Mobile users share their work information for efficient work. Inter-vehicle communication –Vehicles share traffic information for safe driving.

Motivation Network partition frequently occurs due to host mobility. –Data accessibility becomes lower. 1 1 Replica Replication improves data accessibility. Disconnection Original

Research issue (1/2) Replica allocation in ad hoc networks [Hara01] –Assume that data items are not updated. –Consider access frequencies and network topology. Real environment: data items are updated. –MH cannot verify whether own replica is same version as original due to network partitions. Tentatively accesses replica. Verifies access validity from update logs when connecting to original holder (MH holding original).

Research issue (2/2) MHs cannot necessarily connect to original holders. –Cannot verify the access validity. Low data accessibility. –Verify after long time even if connecting. Long time for verifying access validity. [Goal] –MHs efficiently verify the validity of tentative accesses to replicas. [Approach] –Manage access logs and update logs. –Send update logs to other hosts as needed.

Assumptions (1/2) Data item is updated by original holder. –After data item is updated, its replicas become invalid. MH queries data item with flooding when requesting. –Original: Request immediately succeeds. –Replica: MH tentatively accesses. 1 Original Query Request 1 2 Replica Reply Access Data request host

Assumptions (1/2) 1 Query Reply Tentative Access Request 2 2 Original Replica Data request host Data item is updated by original holder. –After data item is updated, its replicas become invalid. MH queries data item with flooding when requesting. –Original: Request immediately succeeds. –Replica: MH tentatively accesses.

Assumptions (2/2) After tentative accesses, MH refers to update logs and verifies access validity. –Tentative access is valid (successful): MH accessed replica with same version as original at time MH accessed the replica. –MHs time out tentative accesses if it cannot verify within certain period. Valid Current 145 Time Update (80) Update (120) Access (95, 80) Access (130, 80) Invalid ( TS: Time stamp ) ( Access time, TS ) Valid Access (110, 80)

Update log dissemination methods Management of access logs and update logs. –Access log: when & which version MH accesses. –Update log: when MH updates data item. Dissemination by original holder  ULD-DA (Update Log Dissemination on Data Access) Original holder sends update logs to data request host.  ULD-DA+ Data request host sends update logs to nearby hosts. Dissemination by other hosts  ULD-C (ULD on Connection) When newly connected, MHs send update logs to originally connected MHs.

Management of access logs MH records access log when tentatively accessing replica. Data IDAccess log (access time, TS, # of update times) 1 110, 90, 3137, 90, 3185, 90, 3 … 2 95, 80, 2123, 80, 2130, 80, 2 … …… Access history table

Dissemination by original holders MH records update log when updating original. Data IDUpdate log (TS, # of update times) 1 35, 170, 290, 3128, 4169, 5 … …… Original holder sends to data request host. –Data request host requests to original holder when detecting connection to original holder by flooding.  ULD-DA (Update Log Dissemination on Data Access) Original holder sends to data request host.  ULD-DA+ Data request hosts send to nearby MHs. Update history table

ULD-DA method Original holder sends to data request host. 1 Update history Access history Data IDUpdate log (TS, # of update times) A135, 170, 290, 3128, 4169, 5192, 6 Data ID Access log (access time, TS, # of update times ) E195, 90, 3131, 90, 3145, 90, 3183, 169, 5 ABCDEG Update log request Update log Data ID Access log (access time, TS, # of update times ) E195, 90, 3131, 90, 3145, 90, 3183, 169, 5 F MHs cannot verify if not requesting data item. Long time for verifying access validity. MHs cannot verify if not requesting data item. Long time for verifying access validity. Original

N DA =1 Data request host sends to MHs within N DA hops. ULD-DA+ method Data IDAccess log (access time, TS, # of update times) D1 E195, 90, 3131, 90, 3145, 90, 3183, 169, 5 F1104, 90, 3145, 90, 3190, 90, 3 G1150, 169, 5198, 169, 5 Data IDAccess log (access time, TS, # of update times) D1 E195, 90, 3131, 90, 3145, 90, 3183, 169, 5 F1104, 90, 3145, 90, 3190, 90, 3 G1150, 169, 5198, 169, 5 Data IDAccess log (access time, TS, # of update times) D1 E195, 90, 3131, 90, 3145, 90, 3183, 169, 5 F1104, 90, 3145, 90, 3190, 90, 3 G1150, 169, 5198, 169, 5 1 ABCDEFG Update log request Update log Update history Access history Data IDUpdate log (TS, # of update times) A135, 170, 290, 3128, 4169, 5192, 6 Shorter time for verification than ULD-DA Original

Dissemination by other hosts MH cannot necessarily connect to original holder. –In ULD-DA/DA+, not necessarily verify access validity. manages update logs of any data items.  ULD-C (Update Log Dissemination on Connection) –Newly connected MHs compare update history tables and insert update logs. Send inserted update logs to MHs within N C hops. –ULD-C is used together with ULD-DA/DA+.

N C =1 Data IDUpdate log (TS, # of update times) D135, 170, 2128, 4169, 5192, 6 E135, 170, 290, 3128, 4192, 6 Update history ULD-C method Newly connected MHs compare update history tables. –Send inserted update logs to MHs within N C hops. Update log {169, 5} {90, 3} Update history table ABCDEG Connection F Large traffic because of sending update history tables. Large traffic because of sending update history tables. Data IDUpdate log (TS, # of update times) D135, 170, 2128, 4169, 5192, 6 E135, 170, 290, 3128, 4169, 5192, 6 Data IDUpdate log (TS, # of update times) D135, 170, 290, 3128, 4169, 5192, 6 E135, 170, 290, 3128, 4169, 5192, 6

Traffic reduction in ULD-C method One of newly connected MHs sends sum of TSs (TS aggregation) in update logs for data item. The other host requests update history whose TS agg. is different from its calculated value. Data IDUpdate log (TS, # of update times)TS agg. D135, 170, 2128, 4169, 5192, 6594 E135, 170, 290, 3128, 4192, 6515 N C =1 TS agg. ABCDEG Connection F Update history request Update history

Performance evaluation (1/2) Simulation environments –Area size: 500[m] x 500[m] –Number of MHs: 40 Mobility model: random way point –Speed: 0~1[m/sec], Pause time: 0~1,000[sec] Radio communication range: 70[m] Enough memory space for all data items –Number of data items: 40 (Size: 1[MB]) –System parameters: N DA = 2, N C = 2

Performance evaluation (2/2) Performance metrics –Data accessibility Rate of number of successful accesses to number of all requests. –Average waiting time Average time for verifying access validity. –Traffic Product of total hop counts to send update logs and sizes.

Effects of average update period (1/3) Good ULD-DA: Only original holders ULD-DA+: Original holders + data request hosts ULD-C: Newly connected MHs

Effects of average update period (2/3) Good ULD-DA: Only original holders ULD-DA+: Original holders + data request hosts ULD-C: Newly connected MHs

Effects of average update period (3/3) Good ULD-DA: Only original holders ULD-DA+: Original holders + data request hosts ULD-C: Newly connected MHs

Considerations from results Combination of ULD-C and DA+ methods –High data accessibility. –Short time for verifying access validity. Suitable for improving work efficiency in collaborative work. ULD-DA / DA+ method –Small traffic Suitable for low battery capacity

Conclusions Update log dissemination methods Simulation experiment –Our methods improve data accessibility and reduce time for verifying access validity. [Future work] –Extend ULD-C method for reducing traffic