CROSS-ROAD: CROSS-layer Ring Overlay for AD Hoc Networks Franca Delmastro IIT-CNR Pisa Cambridge, March 23 rd 2004.

Slides:



Advertisements
Similar presentations
Peer to Peer and Distributed Hash Tables
Advertisements

Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
Scalable Content-Addressable Network Lintao Liu
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
1 PASTRY Partially borrowed from Gabi Kliot ’ s presentation.
Common approach 1. Define space: assign random ID (160-bit) to each node and key 2. Define a metric topology in this space,  that is, the space of keys.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Multicasting in Mobile Ad-Hoc Networks (MANET)
Topics in Reliable Distributed Systems Lecture 2, Fall Dr. Idit Keidar.
Overlay Networks EECS 122: Lecture 18 Department of Electrical Engineering and Computer Sciences University of California Berkeley.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
1 Computer Networks Routing Algorithms. 2 IP Packet Delivery Two Processes are required to accomplish IP packet delivery: –Routing discovering and selecting.
1 Peer-to-Peer Networks Outline Survey Self-organizing overlay network File system on top of P2P network Contributions from Peter Druschel.
Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Ad Hoc Wireless Routing COS 461: Computer Networks
Mobile Ad-hoc Pastry (MADPastry) Niloy Ganguly. Problem of normal DHT in MANET No co-relation between overlay logical hop and physical hop – Low bandwidth,
Mobile IP Performance Issues in Practice. Introduction What is Mobile IP? –Mobile IP is a technology that allows a "mobile node" (MN) to change its point.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Lecture Week 10 Link-State Routing Protocols. Objectives Describe the basic features & concepts of link-state routing protocols. List the benefits and.
1 PASTRY. 2 Pastry paper “ Pastry: Scalable, decentralized object location and routing for large- scale peer-to-peer systems ” by Antony Rowstron (Microsoft.
09/07/2004Peer-to-Peer Systems in Mobile Ad-hoc Networks 1 Lookup Service for Peer-to-Peer Systems in Mobile Ad-hoc Networks M. Tech Project Presentation.
Packet-Switching Networks Routing in Packet Networks.
Chord & CFS Presenter: Gang ZhouNov. 11th, University of Virginia.
1 Routing. 2 Routing is the act of deciding how each individual datagram finds its way through the multiple different paths to its destination. Routing.
Mobile Adhoc Network: Routing Protocol:AODV
1 BitHoc: BitTorrent for wireless ad hoc networks Jointly with: Chadi Barakat Jayeoung Choi Anwar Al Hamra Thierry Turletti EPI PLANETE 28/02/2008 MAESTRO/PLANETE.
IDRM: Inter-Domain Routing Protocol for Mobile Ad Hoc Networks C.-K. Chau, J. Crowcroft, K.-W. Lee, S. H.Y. Wong.
Using the Small-World Model to Improve Freenet Performance Hui Zhang Ashish Goel Ramesh Govindan USC.
A Routing Underlay for Overlay Networks Akihiro Nakao Larry Peterson Andy Bavier SIGCOMM’03 Reviewer: Jing lu.
MobileMAN Integration and Experimentation of Legacy Mobile Multihop Ad Hoc Networks Eleonora Borgia, Marco Conti, and Franca Delmastro Institute for Informatics.
H AZY S IGHTED L INK S TATE R OUTING P ROTOCOL Eleonora Borgia Pervasive Computing & Networking Lab. PerLab IIT – CNR MobileMAN.
AODV: Introduction Reference: C. E. Perkins, E. M. Royer, and S. R. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing,” Internet Draft, draft-ietf-manet-aodv-08.txt,
Scalable Content- Addressable Networks Prepared by Kuhan Paramsothy March 5, 2007.
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
CCNA 2 Week 6 Routing Protocols. Copyright © 2005 University of Bolton Topics Static Routing Dynamic Routing Routing Protocols Overview.
Routing & Middleware: Experiments Eleonora Borgia, Franca Delmastro, and Luciana Pelusi Pervasive Computing & Networking Lab. (PerLab) IIT-CNR Pisa.
1 Computer Communication & Networks Lecture 21 Network Layer: Delivery, Forwarding, Routing Waleed.
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
1 Distributed Hash Table CS780-3 Lecture Notes In courtesy of Heng Yin.
Idit Keidar, Principles of Reliable Distributed Systems, Technion EE, Spring Principles of Reliable Distributed Systems Lecture 2: Distributed Hash.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 Version 3.1 Module 6 Routed & Routing Protocols.
PRIN WOMEN PROJECT Research Unit: University of Naples Federico II G. Ferraiuolo
Ad-hoc On Demand Distance Vector Protocol Hassan Gobjuka.
1 Presented by Jing Sun Computer Science and Engineering Department University of Conneticut.
Routing Algorithms and IP Addressing Routing Algorithms must be ▪ Correctness ▪ Simplicity ▪ Robustness ▪ Stability ▪ Fairness ▪ Optimality.
Middleware issues: From P2P systems to Ad Hoc Networks
Self-stabilizing energy-efficient multicast for MANETs.
Routing Protocols Brandon Wagner.
PeerNet: Pushing Peer-to-Peer Down the Stack Jakob Eriksson, Michalis Faloutsos, Srikanth Krishnamurthy University of California, Riverside.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
Spring 2000CS 4611 Routing Outline Algorithms Scalability.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Link-State Routing Protocols Routing Protocols and Concepts – Chapter 10.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
RIP Routing Protocol. 2 Routing Recall: There are two parts to routing IP packets: 1. How to pass a packet from an input interface to the output interface.
Doc.: IEEE /0174r1 Submission Hang Liu, et al. March 2005 Slide 1 A Routing Protocol for WLAN Mesh Hang Liu, Jun Li, Saurabh Mathur {hang.liu,
CS 6401 Intra-domain Routing Outline Introduction to Routing Distance Vector Algorithm.
Grid: Scalable Ad-Hoc Wireless Networking Douglas De Couto
Incrementally Improving Lookup Latency in Distributed Hash Table Systems Hui Zhang 1, Ashish Goel 2, Ramesh Govindan 1 1 University of Southern California.
Peer-to-Peer Networks 05 Pastry Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg.
1 Ad-hoc Transport Layer Protocol (ATCP) EECS 4215.
Fabián E. Bustamante, Fall 2005 A brief introduction to Pastry Based on: A. Rowstron and P. Druschel, Pastry: Scalable, decentralized object location and.
+ Dynamic Routing Protocols 2 nd semester
Link-State Routing Protocols
Mobile and Wireless Networking
Link-State Routing Protocols
Link-State Routing Protocols
Vinay Singh Graduate school of Software Dongseo University
Presentation transcript:

CROSS-ROAD: CROSS-layer Ring Overlay for AD Hoc Networks Franca Delmastro IIT-CNR Pisa Cambridge, March 23 rd 2004

Ring Overlay & Pastry Model The ring overlay is a circular address space where nodes and data are logically mapped. Pastry uses a DHT to convert nodes and data identifiers on logical addresses that are used to route messages through the network There is no correspondence between logical and physical distances It provides a subject-based data routing that often requires a multi-hop network routing to reach the destination.

Logical & Physical distances Pastry Ring

The Pastry Ring N1N1 X 1 = H(N 1 ) N2N2 X 2 = H(N 2 ) L1L1 X1X1 X2X2 L2L2 (K 2,V) L 2 = H(K 2 ) (K 1,V) L 1 = H(K 1 )

Pastry routing tables

Pastry Multi-hop Routing Route( ) bestMatch(RoutingTable[0], ) = Compare( , ) = 0

Joining the Ring X has to know a own physical neighbor already present in the ring (node A) A route a message with key equal to X Pastry Routing table of node X is initialized using routing tables of contacted nodes:  LS(X) = LS(Z)  NS(X) = NS(A)  RT(X) is a join of the routing tables of other nodes, according to the prefix shared metric A B1 B2 Bk Z X Join(X) Route(X) X

Disconnection from the ring Each node executes a polling procedure to discover “remote” nodes status (referred only to routing table knowledge). A “remote” node is considered disconnected from the Pastry network if it doesn’t answer to a polling message before a timeout expiration After a disconnection event, the sender of the polling message has to update its routing tables contacting other “remote” nodes to fill in entries related to that node.

Pastry Pros & Cons Pros:  DHT allows an uniform distribution of IDs and workload on nodes taking part to the service  The subject-based routing defines a logarithmic lookup cost on the network dimension (O(log N))  A lot of application can adapt their contents to this routing strategy Cons:  Routing tables management based on remote connections can be a big overhead on ad hoc networks  Forcing the network routing with the subject-based policy can reduce network performances

NeSt Applications Middleware Transport Network MAC Using Cross-Layer to CROSS-ROAD In order to build an overlay network, the middleware can directly use the Network Routing table. Node ID = H(IPaddress) Since each ring is associated to a service, the routing protocol has to provide Service Location Using a proactive LINK- STATE routing protocol, each node knows the entire network Middleware routing can send messages directly to their FINAL destination.

Efficient proactive Link-State Proactive routing protocols are usually considered inefficient for ad hoc networks An optimization has been studied: “Hazy Sighted Link State”* (HSLS) Each node sends periodical LSU packets on the network with frequencies inversary proportional to the routing hops number. “Hazy” knowledge of distant nodes. Their status is not frequently updated as the 1-hop neighbors. Simulations showed that HSLS scales with the network size. (*) C. Santivanez, I. Stavrakakis et al., “Making Link-State Routing Scale for Ad Hoc Networks”, MobiHoc 2001 (*) C. Santivanez, I. Stavrakakis et al., “On the Scalability of Ad Hoc Routing Protocols”, INFOCOM 2002

Middleware level A B CROSS-ROAD overlay Nodes providing service S Ad Hoc Network nodes Network level Working hypothesis:  The Network level gives a graph representing the network topology to the Nest  Each node has to be characterized by at least: ( IPaddress, Services, 1hop-neighbors)  The middleware level can access to this graph and recover relevant information for itself A B

Interactions with NeSt NeSt Network Data Abstraction Middleware Data Abstraction Middleware Network Node A Middleware Network NeSt Network Data Abstraction Middleware Data Abstraction Node B Local Provided services LSU routing pkt containing services publications and topology updates Topology update and remote services Application messages

CROSS-ROAD Routing Tables Each node defines the ring autonomously CROSS-ROAD routing table contains only nodes taking part to the service (Leafset and Neighborset disappear) Middleware routing protocol is limited to a peer-to-peer connection Messages forwarding is realized by the network routing protocol Network Routing Table Destination IP address Next Hop IP add. CostServices CROSS-ROAD Routing Table Destination ID = H(IP address) Cost

Pastry vs CROSS-ROAD PASTRY:  Join operation requires many remote connections to recover routing tables contents CROSS-ROAD:  Join operation does not require remote connections: each node can build its ring autonomously HIGH COST at middleware level NO COST at middleware level

Pastry vs CROSS-ROAD PASTRY:  The detection of disconnection events requires polling cycles towards remote nodes CROSS-ROAD:  Disconnection events are detected by the netwrok routing protocol through LSU packets HIGH COST at middleware level NO COST at middleware level

Pastry vs CROSS-ROAD PASTRY:  Routing table fixed size involves a not complete knowledge of the network CROSS-ROAD:  Routing table size depends on the number of nodes taking part to the service HIGH COST for tables management due to remote connections following topology updates NO COST at middleware level: local interactions with NeSt are sufficient to update routing tables

Pastry vs CROSS-ROAD PASTRY:  Subject-based routing involves a multi-hop middleware routing CROSS-ROAD:  Subject-based routing involves a peer-to-peer connection O(log(N)) middleware lookup cost O(1) middleware lookup cost, the remaining is a routing task

CROSS-ROAD Software Architecture

Further optimizations: Cost Metrics Possible metrics to determine the best route from a source to a destination:  Number of routing hops  Path reliability based on nodes mobility Mobility index: number of times that a node changed its position in a specified time interval. It can be determined by the Network routing protocol consequently to LSU packets reception. It can be used by CROSS-ROAD to define the best nodes for replicas storage.