Mobile Ad-hoc Pastry (MADPastry) Niloy Ganguly. Problem of normal DHT in MANET No co-relation between overlay logical hop and physical hop – Low bandwidth,

Slides:



Advertisements
Similar presentations
1 A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks By Lei Chen.
Advertisements

Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK
1 Mobile IPv6-Based Ad Hoc Networks: Its Development and Application Advisor: Dr. Kai-Wei Ke Speaker: Wei-Ying Huang.
Self-Organizing Hierarchical Routing for Scalable Ad Hoc Networking David B. Johnson Department of Computer Science Rice University Monarch.
Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
1 PASTRY Partially borrowed from Gabi Kliot ’ s presentation.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems Antony Bowstron & Peter Druschel Presented by: Long Zhang.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
Effects of Applying Mobility Localization on Source Routing Algorithms for Mobile Ad Hoc Network Hridesh Rajan presented by Metin Tekkalmaz.
Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems Antony Rowstron and Peter Druschel Proc. of the 18th IFIP/ACM.
Spring 2003CS 4611 Peer-to-Peer Networks Outline Survey Self-organizing overlay network File system on top of P2P network Contributions from Peter Druschel.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Secure routing for structured peer-to-peer overlay networks (by Castro et al.) Shariq Rizvi CS 294-4: Peer-to-Peer Systems.
A Routing Vector Method (RVM) for Routing Bluetooth Scatternets Pravin Bhagwat IBM.Thomas J. Watson Research Center,Yorktown Heights,NY.
Ad-hoc On-Demand Distance Vector Routing (AODV) Sirisha R. Medidi.
1 Peer-to-Peer Networks Outline Survey Self-organizing overlay network File system on top of P2P network Contributions from Peter Druschel.
Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing.
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems (Antony Rowstron and Peter Druschel) Shariq Rizvi First.
Ad Hoc Wireless Routing COS 461: Computer Networks
1 Virtual Direction Routing for Overlay Networks Bow-Nan Cheng Murat Yuksel Shivkumar Kalyanaraman.
The Zone Routing Protocol (ZRP)
1 PASTRY. 2 Pastry paper “ Pastry: Scalable, decentralized object location and routing for large- scale peer-to-peer systems ” by Antony Rowstron (Microsoft.
09/07/2004Peer-to-Peer Systems in Mobile Ad-hoc Networks 1 Lookup Service for Peer-to-Peer Systems in Mobile Ad-hoc Networks M. Tech Project Presentation.
CROSS-ROAD: CROSS-layer Ring Overlay for AD Hoc Networks Franca Delmastro IIT-CNR Pisa Cambridge, March 23 rd 2004.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Mobile Adhoc Network: Routing Protocol:AODV
Ad hoc On-demand Distance Vector (AODV) Routing Protocol ECE 695 Spring 2006.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
RFC 3561 AODV Routing Protocol Mobile Ad Hoc Networking Working Group Charles E. Perkins INTERNET DRAFT Nokia Research Center 19 June 2002 Elizabeth M.
Security Michael Foukarakis – 13/12/2004 A Survey of Peer-to-Peer Security Issues Dan S. Wallach Rice University,
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Scalable Ad Hoc Routing the Case for Dynamic Addressing.
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
Ad Hoc Routing: The AODV and DSR Protocols Speaker : Wilson Lai “Performance Comparison of Two On-Demand Routing Protocols for Ad Hoc Networks”, C. Perkins.
1 Ad Hoc On-Demand Distance Vector Routing (AODV) Dr. R. B. Patel.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
#1 EETS 8316/NTU CC725-N/TC/ Routing - Circuit Switching  Telephone switching was hierarchical with only one route possible —Added redundant routes.
AODV: Introduction Reference: C. E. Perkins, E. M. Royer, and S. R. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing,” Internet Draft, draft-ietf-manet-aodv-08.txt,
Peer to Peer A Survey and comparison of peer-to-peer overlay network schemes And so on… Chulhyun Park
A Scalable Routing Protocol for Ad Hoc Networks Eric Arnaud Id:
Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems Antony Rowstron and Peter Druschel, Middleware 2001.
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
Pastry Antony Rowstron and Peter Druschel Presented By David Deschenes.
Ad-hoc On Demand Distance Vector Protocol Hassan Gobjuka.
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Improving Fault Tolerance in AODV Matthew J. Miller Jungmin So.
Doc.: IEEE /0174r1 Submission Hang Liu, et al. March 2005 Slide 1 A Routing Protocol for WLAN Mesh Hang Liu, Jun Li, Saurabh Mathur {hang.liu,
Peer-to-Peer Networks 05 Pastry Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg.
Fabián E. Bustamante, Fall 2005 A brief introduction to Pastry Based on: A. Rowstron and P. Druschel, Pastry: Scalable, decentralized object location and.
ROUTING.
The Ad Hoc On-Demand Distance-Vector Protocol (AODV)
Pastry Scalable, decentralized object locations and routing for large p2p systems.
COS 461: Computer Networks
CBRP: A Cluster-based Routing Protocol for Mobile Ad hoc Networks
Self-Organizing Hierarchical Routing for Scalable Ad Hoc Networking
Self-Organizing Hierarchical Routing for Scalable Ad Hoc Networking
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
PASTRY.
Mobile and Wireless Networking
COS 461: Computer Networks
Vinay Singh Graduate school of Software Dongseo University
A Routing Protocol for WLAN Mesh
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
Presentation transcript:

Mobile Ad-hoc Pastry (MADPastry) Niloy Ganguly

Problem of normal DHT in MANET No co-relation between overlay logical hop and physical hop – Low bandwidth, power collision, transmission error Mobility of node – Ad hoc routing protocols have to (re-) establish routes frequently. In order to guarantee routing convergence and consistency, DHTs have to periodically maintain their routing tables.

Solution MADPastry integrates the reactive ad hoc routing protocol AODV and the application layer DHT Pastry to provide light-weight and scalable indirect routing functionality at the network layer.

Overlay Stretch: the ratio between the physical route length traveled during an overlay key lookup compared to the direct physical path from the source to the eventual target node Standard DHT can lead to a large overlay stretch

Overview of Pastry Each node in the Pastry peer-to-peer overlay network is assigned a 128-bit node identifier (nodeId). Pastry can route to the numerically closest node to a given key in less than [log 2 b N] when N is the total number of nodes in the network (b is typically 4, a network parameter)

Routing Each Pastry node maintains a routing table, a neighborhood set and a leaf set. The Pastry’s routing table consists of log 2 b N rows each of which has 2 b −1 entries nth row has entries whose nodeIds share the first n − 1 digits with the present node’s nodeId

The leaf set L is a set of nodes with the L/2 numerically closest larger nodeIds, and the L/2 nodes with numerically closest smaller nodeIds, relative to the present node’s nodeId. The neighborhood set M contains the nodeIds and IP addresses of the M nodes that are closest (according the proximity metric)

Cluster Physical Cluster: Community of nodes in proximity. They share a common prefix of overlay id. Cluster Formation: – divide the overlay id space into equal-sized segments – Randomly generate a landmark key for every segments – Node id closest to landmark key is selected as cluster head

Cont.. – Cluster head sends beacon at regular interval. – New node joins to a cluster adopting cluster head overlay id prefix from which it first gets beacon. – It changes cluster if it gets any closest cluster ( according to physical hop) by changing its overlay id.

To search a key, each node forwards the query to the node which has the nodeId sharing one more digit with the key based on the routing table. If there is no appropriate entry, the node forwards the query to the node in the neighbor or leaf set which has the nodeId sharing at least one more bit with the key.

MADPastry Routing Information Three items – Pastry routing table – Pastry leaf set – AODV routing table The standard Pastry routing table consists of [log 2 b N] rows with (2 b -1) entries each. The MADPastry routing table consists of [log 2 b K] rows with (2 b -1) entries each. This will reduce maintenance overhead and storage but increase bound on the number of overlay hops

Pastry Leaf Set. The standard Pastry leaf set contains L entries: the L/2 numerically closest (in terms of their overlay id) smaller nodes and the L/2 numerically closest larger nodes. MADPastry maintains only two nodes left and right.

AODV Routing Table. To carry out a concrete overlay hop, a MADPastry node also maintains a standard AODV routing table. It includes for specific physical destinations the next (physical) hop address as well as for each such route a sequence number.

Routing When a MADPastry node receives a request packet – The node could be the target (i.e. the physical destination) of an overlay hop. In this case, the node needs to determine the next overlay hop. For this purpose, it will consult its Pastry routing table to find a node that would increase the matching key prefix by one or its leaf set to find a node that is numerically closer to the key than the current node is. This corresponds to standard Pastry routing.

– The node could be an intermediate node on the physical path of an overlay hop that is being carried out. Now, the node would behave like a regular AODV node. It would consult its AODV routing table to determine the next physical hop on the route toward the destination of this overlay hop and then forward the packet on.

To minimize the routing traffic, any such intermediate node on the physical path of an overlay hop inspects the destination of the overlay hop. If the intermediate node's own overlay id already happens to be numerically closer to the packet's key than that of the overlay hop's actual destination, it will "intercept" the packet.

An interesting question arises when the physical route to carry out an overlay hop is unknown A node selects the next overlay destination from its Pastry routing table or leaf set, but there is no (valid) route information in its AODV routing table for that destination. An intermediate node on the physical path of a current overlay hop might not have a (valid) next hop entry in its AODV routing table to forward the packet.

Solution To avoid network-wide broadcasts whenever possible, MADPastry tries to leverage its cluster locality in such cases. If the node that has no (valid) information on how to continue the path of an overlay hop is already in the target cluster (i.e. shares a common prefix with the packet's destination), it will not issue an AODV-style route discovery for the destination. Instead, it will broadcast the overlay packet itself within the confines of its cluster. Due to the physical locality in MADPastry clusters, that broadcast is very likely to stay in a limited region of the network. Otherwise, if the node is not in the target cluster, it will queue the packet and start a regular AODV expanding ring broadcast to discover a route to the packet's destination.

Reference MADPastry: A DHT Substrate for Practicably Sized MANETs: Proc. of ASWN, 2005