CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.

Slides:



Advertisements
Similar presentations
What Is an Ad Hoc Network?
Advertisements

Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
BY PAYEL BANDYOPADYAY WHAT AM I GOING TO DEAL ABOUT? WHAT IS AN AD-HOC NETWORK? That doesn't depend on any infrastructure (eg. Access points, routers)
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
802.11a/b/g Networks Herbert Rubens Some slides taken from UIUC Wireless Networking Group.
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
A Novel Cluster-based Routing Protocol with Extending Lifetime for Wireless Sensor Networks Slides by Alex Papadimitriou.
A Mobile Infrastructure Based VANET Routing Protocol in the Urban Environment School of Electronics Engineering and Computer Science, PKU, Beijing, China.
1/14 Ad Hoc Networking, Eli M. Gafni and Dimitri P. Bertsekas Distributed Algorithm for Generating Loop-free Routes in Networks With Frequently.
Small-world Overlay P2P Network
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Effective Quorum Construction for Consistency Management in Mobile Ad Hoc Networks Takahiro HARA Osaka University, Japan.
An Analysis of the Optimum Node Density for Ad hoc Mobile Networks Elizabeth M. Royer, P. Michael Melliar-Smith and Louise E. Moser Presented by Aki Happonen.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
Routing and Routing Protocols
Update Log Dissemination in Mobile Ad Hoc Networks Hideki HAYASHI Hitachi, Ltd., Central Research Laboratory (Grad. School of Info. Science and Tech.,
Mobile Ad Hoc Network Security (MANET) Preethi Vishwanath San Jose State University Computer Science.
Delivery, Forwarding, and Routing
TORA : Temporally Ordered Routing Algorithm Invented by Vincent Park and M.Scott Corson from University of Maryland. TORA is an on-demand routing protocol.
Ad Hoc Mobility Management with Uniform Quorum Systems.
Power saving technique for multi-hop ad hoc wireless networks.
Geographic Routing Without Location Information A. Rao, C. Papadimitriou, S. Shenker, and I. Stoica In Proceedings of the 9th Annual international Conference.
Mobile IP Performance Issues in Practice. Introduction What is Mobile IP? –Mobile IP is a technology that allows a "mobile node" (MN) to change its point.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2007 (TPDS 2007)
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 Introducing Routing 1. Dynamic routing - information is learned from other routers, and routing protocols adjust routes automatically. 2. Static routing.
M.Menelaou CCNA2 ROUTING. M.Menelaou ROUTING Routing is the process that a router uses to forward packets toward the destination network. A router makes.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
1 1 Quantifying Impact of Mobility on Data Availability in Mobile Ad Hoc Networks Takahiro Hara IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 9, NO. 2, FEBRUARY.
KARTIK DABBIRU Roll # EE
+ Mayukha Bairy Disk Intersection graphs and CDS as a backbone in wireless ad hoc networks.
 Network Segments  NICs  Repeaters  Hubs  Bridges  Switches  Routers and Brouters  Gateways 2.
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
Fault-Tolerant Papers Broadband Network & Mobile Communication Lab Course: Computer Fault-Tolerant Speaker: 邱朝螢 Date: 2004/4/20.
1 A Distributed Architecture for Multimedia in Dynamic Wireless Networks By UCLA C.R. Lin and M. Gerla IEEE GLOBECOM'95.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
On Reducing Broadcast Redundancy in Wireless Ad Hoc Network Author: Wei Lou, Student Member, IEEE, and Jie Wu, Senior Member, IEEE From IEEE transactions.
Probabilistic Coverage in Wireless Sensor Networks Authors : Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha Presenter : Hyeon, Seung-Il.
Outline Introduction – Frequent patterns and the Rare Item Problem – Multiple Minimum Support Framework – Issues with Multiple Minimum Support Framework.
TOPOLOGY MANAGEMENT IN COGMESH: A CLUSTER-BASED COGNITIVE RADIO MESH NETWORK Tao Chen; Honggang Zhang; Maggio, G.M.; Chlamtac, I.; Communications, 2007.
MobiQuitous 2007 Towards Scalable and Robust Service Discovery in Ubiquitous Computing Environments via Multi-hop Clustering Wei Gao.
Efficient Content Sharing Taking Account of Updating Replicas in Hybrid Peer-to-Peer Networks Tatsuru Kato, Shinji Sugawara, Yutaka Ishibashi Nagoya Institute.
Multicast routing issues in ad hoc networks Katia Obraczka Gene Tsudik.
PRIN WOMEN PROJECT Research Unit: University of Naples Federico II G. Ferraiuolo
1 An Arc-Path Model for OSPF Weight Setting Problem Dr.Jeffery Kennington Anusha Madhavan.
Two Connected Dominating Set Algorithms for Wireless Sensor Networks Overview Najla Al-Nabhan* ♦ Bowu Zhang** ♦ Mznah Al-Rodhaan* ♦ Abdullah Al-Dhelaan*
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
Self-stabilizing energy-efficient multicast for MANETs.
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
PeerNet: Pushing Peer-to-Peer Down the Stack Jakob Eriksson, Michalis Faloutsos, Srikanth Krishnamurthy University of California, Riverside.
A Bandwidth Scheduling Algorithm Based on Minimum Interference Traffic in Mesh Mode Xu-Yajing, Li-ZhiTao, Zhong-XiuFang and Xu-HuiMin International Conference.
A Multicast Routing Algorithm Using Movement Prediction for Mobile Ad Hoc Networks Huei-Wen Ferng, Ph.D. Assistant Professor Department of Computer Science.
SERENA: SchEduling RoutEr Nodes Activity in wireless ad hoc and sensor networks Pascale Minet and Saoucene Mahfoudh INRIA, Rocquencourt Le Chesnay.
Single Area OSPF Module 2, Review How routing information is maintained Link-state routers apply the Dijkstra shortest path first algorithm against.
LA-MAC: A Load Adaptive MAC Protocol for MANETs IEEE Global Telecommunications Conference(GLOBECOM )2009. Presented by Qiang YE Smart Grid Subgroup Meeting.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks Zhao, J.; Cao, G. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 鄭宇辰
-1/16- Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks C.-K. Toh, Georgia Institute of Technology IEEE.
Asstt. Professor Adeel Akram. Other Novel Routing Approaches Link reversal Aimed for highly dynamic networks Goal: to identify some path, as opposed.
Routing and Routing Protocols CCNA 2 v3 – Module 6.
GeoTORA: A Protocol for Geocasting in Mobile Ad Hoc Networks
Author:Zarei.M.;Faez.K. ;Nya.J.M.
On the Effect of Group Mobility to Data Replication in Ad Hoc Networks
Internet Networking recitation #4
Routing: Distance Vector Algorithm
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Effective Replica Allocation
Balancing the Tradeoffs between Data Accessibility and Query Delay
Presentation transcript:

CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE Infocom 2001,pp )

CS401 presentation2 Contents  Why Data Replication  Related Work  System Model  Replica Allocation Methods  Simulation Model  Conclusion

CS401 presentation3 Why data Replication?  Ad hoc networks : temporarily constructed by only mobile hosts.  Mobile host plays the role of a router, even if source and destination are not in range, data packets are forwarded by relaying  Since hosts move freely, disconnections occur frequently, this causes frequent network division.

CS401 presentation4 Why data Replication? (contd...)  Example, if some link goes down and the network is split  Nodes on the right cannot access D2  Nodes on the left cannot access D1

CS401 presentation5 Why data Replication? (contd...)  A possible solution is by replicating data items at mobile hosts which are not the owners of the original data.

CS401 presentation6 Related Work  Ad hoc network routing protocol: Such as DSDV,AODV,DSR,ZRP,CBRP  can only improve the connectivity among MHs which are connected to each other,  but cannot do anything when the network is divided as in the case in Figure 1.  Distributed database systems  data Replication in database helps in reducing response time  since failures occur infrequently, a small number of replicas is sufficient  Mobile computing  mobile hosts access databases at sites in a fixed network, create replicas on mobile hosts  address issues of maintaining consistency with low communication costs  assume only one-hop wireless communication

CS401 presentation7 System Model  The system environment is assumed to be an Ad-hoc network where:  mobile hosts access data items held by other mobile hosts (single or multiple hops)  each mobile host creates replicas of the data and maintains the replicas in its memory  data item available if it is present locally or if it is available at one of the neighbors  Assumptions:  unique host identifier: M j (set of all mobile hosts M = {M 1, M 2,…, M m })  unique data identifier: D j (set of all data items D = {D 1, D 2,…, D m })  Assume all data items are of the same size  each host has a memory space of C data items for replicas (excluding the space for holding originals)  data remains the same and does not change (simplifying assumption)  access frequencies of data items from each mobile host is known and does not change

CS401 presentation8 Replica Allocation Methods  Approach:  replicas are relocated in a specific period (relocation period)  replica allocation is determined based on the access frequency and network topology

CS401 presentation9 Three replica allocation methods  Three replica allocation methods: differ in emphasis put on access frequency and network topology.  SAF : (Static Access Frequency) only the access frequency to each data item is taken into account.  DAFN : (Dynamic Access Frequency and Neighborhood) The access frequency to each data item and the neighborhood among mobile hosts are taken into account.  DCG : (Dynamic Connectivity based Grouping) The access frequency to each data item and the whole network topology are taken into account.

CS401 presentation10 SAF(static Access Frequency)  Each host creates replicas in descending order of access frequencies  Advantages:  No control information regarding replicas need to be exchanged  Once each host has its all necessary replicas, there is no more replica relocation.  Low overhead and low traffic  Disadvantages:  hosts with similar access characteristics have the same replicas, but a MH can access data items held by other connected MHs,and it is more effective to share many kinds of replicas among them.Thus it gives low data accessibility when many hosts have the same or similar access characteristics.

CS401 presentation11 SAF example

CS401 presentation12 DAFN ( Dynamic Access Frequency and Neighborhood )  The algorithm of this method is as follows:  1) At a relocation period, each mobile host broadcasts its host identifier and information on access frequencies to data items. After all mobile hosts complete the broadcasts, from the received host identifiers, every host shall know its connected mobile hosts.  2) Each mobile host preliminary determines the allocation of replicas based on the SAF method.  3) In each set of mobile hosts which are connected to each other, the following procedure is repeated in the order of the breadth first search from the mobile host with the lowest suffix (i) of host identifier (Mi). When there is duplication of a data item (original/replica) between two neighboring mobile hosts, and if one of them is the original, the host which holds the replica changes it to another replica. If both of them are replicas, the host whose access frequency value to the data item is lower than the other one changes the replica to another replica. When changing the replica, among data items whose replicas are not allocated at either of the two hosts, a new data item replicated is selected where the access frequency value to this item is the highest among the possible items.

CS401 presentation13 DAFN ( Dynamic Access Frequency and Neighborhood )  Eliminates replica duplication among neighboring hosts  The above procedure is executed every relocation period  Overhead and traffic is much higher than SAF  Does not completely eliminate replica duplication  If network topology changes during the execution of this method, replica relocation cannot completed

CS401 presentation14 DAFN example

CS401 presentation15 DCG ( Dynamic Connectivity based Grouping )  Biconnected component: A maximum partial subgraph which is still connected if one of the vertices is removed (high stability!)  The algorithm is as follows: 1) At a relocation period, each mobile host broadcasts its host identifier and information on access frequencies to data items. After all mobile hosts complete the broadcasts, from the received host identifiers, every host knows the connected mobile hosts. 2) In each set of mobile hosts which are connected to each other, from the mobile host with the lowest suffix (i) of host identifier (Mi), an algorithm to find biconnected components is executed. Then, each biconnected component is put to a group. If a mobile host belongs to more than one biconnected component, i.e., the host is an articulation point, it belongs to only one group in which the corresponding biconnected component is first found in executing the algorithm. 3) In each group, an access frequency of the group to each data item is calculated as a summation of access frequencies of mobile hosts in the group to the item. The calculation is done by the mobile host with the lowest suffix (i) of host identifier (Mi) in the group.

CS401 presentation16 DCG ( Dynamic Connectivity based Grouping ) 4) In the order of the access frequencies of the group, replicas of data items are allocated until memory space of all mobile hosts in the group becomes full. Here, replicas of data items which are held as originals by mobile hosts in the group are not allocated. Each replica is allocated at a mobile host whose access frequency to the data item is the highest among hosts that have free memory space to create it. 5) After allocating replicas of all kinds of data items, if there is still free memory space at mobile hosts in the group, replicas are allocated in the order of access frequency until the memory space is full. Each replica is allocated at a mobile host whose frequency to the data item is the highest among hosts that have free memory space to create it and do not hold the replica or its original. If there is no such mobile host, the replica is not allocated.

CS401 presentation17 DCG ( Dynamic Connectivity based Grouping )  Data accessibility is expected to be higher since replicas are shared among a group of hosts  Overhead and traffic higher than the other two methods since it consists more steps and needs to take the largest time among the three methods to relocate replicas in a wide range.  the probability is higher that the network topology changes during executing this method, and in this case, the replica relocation cannot be done at mobile hosts over disconnected links

CS401 presentation18 DCG example

CS401 presentation19 Simulation Model  50  50 flatland  Each host randomly moves in all directions  Movement speed is randomly determined between 0 to d  Radio communication range is a circle of radius R (1-19) fixed to 7  Number of hosts = Number of data items = 40  Each host has creates up to C replicas (1-39) fixed to 10  Access frequency of each host to D i is p i given by one of the three cases:  Case 1: p i = 0.5( i)  Each host has same access characteristics, access frequencies vary in a Small range  Case 2: p i = 0.025i  Each host has same access characteristics, access frequencies vary in a Wide range  Case 3: p i is determined as a positive value based on N ( 0.5(1+0.01i), σ )  larger the value of σ, higher the difference in the access characteristics of the hosts  Relocation period = T (1-8192) fixed to 256  Simulated for 59,000 time units and traffic measured (traffic = number of hops used for relocating data)

CS401 presentation20 Conclusion  Introduced replica allocation in ad-hoc networks as a mechanism of improving data accessibility  Proposed 3 replica allocation methods that use access patterns and the network topology  Simulation results show that DCG gives the highest accessibility at the cost of increased traffic and SAF has the least traffic with low data accessibility  The replica allocation method depends on the system configuration and access patterns

CS401 presentation21 Any Questions? Thank you!