Enabling Inter-domain DTN Communications by Networked Static Gateways Ting He*, Nikoletta Sofra, Kang-Won Lee*, and Kin K Leung * IBM Imperial College.

Slides:



Advertisements
Similar presentations
Architecture and Algorithms for an IEEE 802
Advertisements

Mobility Entropy and Message Routing in Community-Structured Delay Tolerant Networks Hideya Ochiai Hiroshi Esaki The University of Tokyo / NICT Asia Future.
Security Issues In Mobile IP
Transportation-aware Routing in Delay Tolerant Networks (DTNs) Asia Future Internet 2008 Taekyoung Kwon Seoul National University.
Performance Evaluation Methodology & Key Technologies of New Generation Broadband Wireless Access Networking Zhiwei Gao Broadband Wireless Communication.
Page 1 Approximately Maximum Bandwidth Routing for Slotted Wireless Ad Hoc Networks Approximately Maximum Bandwidth Routing for Slotted Wireless Ad Hoc.
1 A Static-Node Assisted Adaptive Routing Protocol in Vehicular Networks Yong Ding, Chen Wang, Li Xiao {dingyong, wangchen, Department.
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science R3: Robust Replication Routing in Wireless Networks with Diverse Connectivity Characteristics.
and 6.855J Cycle Canceling Algorithm. 2 A minimum cost flow problem , $4 20, $1 20, $2 25, $2 25, $5 20, $6 30, $
Wireless Networks Should Spread Spectrum On Demand Ramki Gummadi (MIT) Joint work with Hari Balakrishnan.
Scalable Routing In Delay Tolerant Networks
0 - 0.
Addition Facts
VARUN GUPTA Carnegie Mellon University 1 Partly based on joint work with: Anshul Gandhi Mor Harchol-Balter Mike Kozuch (CMU) (CMU) (Intel Research)
Xia Zhou*, Stratis Ioannidis ♯, and Laurent Massoulié + * University of California, Santa Barbara ♯ Technicolor Research Lab, Palo Alto + Technicolor Research.
Evaluating Window Joins over Unbounded Streams Author: Jaewoo Kang, Jeffrey F. Naughton, Stratis D. Viglas University of Wisconsin-Madison CS Dept. Presenter:
Dynamic Replica Placement for Scalable Content Delivery Yan Chen, Randy H. Katz, John D. Kubiatowicz {yanchen, randy, EECS Department.
T IME SERIES MODELING OF TEMPORAL NETWORK Sandipan Sikdar CNeRG Retreat 14 1.
Energy Efficient Data Collection In Distributed Sensor Environments Qi Han, Sharad Mehrotra, Nalini Venkatasubramanian {qhan, sharad,
Peer-to-Peer and Social Networks An overview of Gnutella.
高度情報化社会を支えるネットワーキング技術 (大阪大学 工学部説明会資料)
1 Mobility-Based Predictive Call Admission Control and Bandwidth Reservation in Wireless Cellular Networks Fei Yu and Victor C.M. Leung INFOCOM 2001.
Supporting Cooperative Caching in Disruption Tolerant Networks
1 Capacity analysis of mesh networks with omni or directional antennas Jun Zhang and Xiaohua Jia City University of Hong Kong.
Enhancing DTN capacity with Throwboxes (work-in-progress)
1 On the Capacity of Ad Hoc Wireless Networks Under General Node Mobility Michele Garetto – Università di Torino Paolo Giaccone - Politecnico di Torino.
The Capacity of Wireless Networks
1 COPYRIGHT © 2011 ALCATEL-LUCENT. ALL RIGHTS RESERVED. On the Capacity of Wireless CSMA/CA Multihop Networks Rafael Laufer and Leonard Kleinrock Bell.
Capacity of wireless ad-hoc networks By Kumar Manvendra October 31,2002.
Mobility Increase the Capacity of Ad-hoc Wireless Network Matthias Gossglauser / David Tse Infocom 2001.
1 Capacity Scaling in Delay Tolerant Networks with Heterogeneous Mobile Nodes Michele Garetto – Università di Torino Paolo Giaccone - Politecnico di Torino.
Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 EN0129 PC AND NETWORK TECHNOLOGY I NETWORK LAYER AND IP Derived From CCNA Network Fundamentals.
Addition 1’s to 20.
Test B, 100 Subtraction Facts
Detecting Spam Zombies by Monitoring Outgoing Messages Zhenhai Duan Department of Computer Science Florida State University.
Week 1.
Introduction to Ad-hoc & Sensor Networks Security In The Name of God ISC Student Branch in KNTU 4 th Workshop Ad-hoc & Sensor Networks.
1/22 Worst and Best-Case Coverage in Sensor Networks Seapahn Meguerdichian, Farinaz Koushanfar, Miodrag Potkonjak, and Mani Srivastava IEEE TRANSACTIONS.
A Measurement Study of Available Bandwidth Estimation Tools MIT - CSAIL with Jacob Strauss & Frans Kaashoek Dina Katabi.
Delay Analysis and Optimality of Scheduling Policies for Multihop Wireless Networks Gagan Raj Gupta Post-Doctoral Research Associate with the Parallel.
New Opportunities for Load Balancing in Network-Wide Intrusion Detection Systems Victor Heorhiadi, Michael K. Reiter, Vyas Sekar UNC Chapel Hill UNC Chapel.
Delay bounded Routing in Vehicular Ad-hoc Networks Antonios Skordylis Niki Trigoni MobiHoc 2008 Slides by Alex Papadimitriou.
Forwarding Redundancy in Opportunistic Mobile Networks: Investigation and Elimination Wei Gao 1, Qinghua Li 2 and Guohong Cao 3 1 The University of Tennessee,
By Libo Song and David F. Kotz Computer Science,Dartmouth College.
Wireless Capacity. A lot of hype Self-organizing sensor networks reporting on everything everywhere Bluetooth personal networks connecting devices City.
Using Redundancy to Cope with Failures in a Delay Tolerant Network Sushant Jain, Michael Demmer, Rabin Patra, Kevin Fall Source:
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
Probability Grid: A Location Estimation Scheme for Wireless Sensor Networks Presented by cychen Date : 3/7 In Secon (Sensor and Ad Hoc Communications and.
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
Roadmap-Based End-to-End Traffic Engineering for Multi-hop Wireless Networks Mustafa O. Kilavuz Ahmet Soran Murat Yuksel University of Nevada Reno.
Distributed Quality-of-Service Routing of Best Constrained Shortest Paths. Abdelhamid MELLOUK, Said HOCEINI, Farid BAGUENINE, Mustapha CHEURFA Computers.
CS 712 | Fall 2007 Using Mobile Relays to Prolong the Lifetime of Wireless Sensor Networks Wei Wang, Vikram Srinivasan, Kee-Chaing Chua. National University.
2008/2/191 Customizing a Geographical Routing Protocol for Wireless Sensor Networks Proceedings of the th International Conference on Information.
Hierarchical Power Management in DTN with Traffic-Aware Optimization Hyewon Jun, etc ACM SIGCOMM, 2006.
Switch-and-Navigate: Controlling Data Ferry Mobility for Delay-Bounded Messages Liang Ma*, Ting He +, Ananthram Swami §, Kang-won Lee + and Kin K. Leung*
A novel approach of gateway selection and placement in cellular Wi-Fi system Presented By Rajesh Prasad.
Geographic Hash Table S. Ratnasamy, B. Karp, S. Shenker, D. Estrin, R. Govindan, L. Yin and F. Yu.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
PRoPHET+: An Adaptive PRoPHET- Based Routing Protocol for Opportunistic Network Ting-Kai Huang, Chia-Keng Lee and Ling-Jyh Chen.
Department of Computer Science Aruna Balasubramanian, Brian Neil Levine, Arun Venkataramani DTN Routing as a Resource Allocation Problem.
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
MMAC: A Mobility- Adaptive, Collision-Free MAC Protocol for Wireless Sensor Networks Muneeb Ali, Tashfeen Suleman, and Zartash Afzal Uzmi IEEE Performance,
Joint Replication-Migration-based Routing in Delay Tolerant Networks Yunsheng Wang and Jie Wu Temple University Zhen Jiang Feng Li West Chester Unveristy.
On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay-Tolerant Networks 1 Wei Gao Guohong Cao Tom La Porta Jiawei Han Presented.
Routing in Delay Tolerant Network Qing Ye EDIFY Group of Lehigh University.
Courtesy Piggybacking: Supporting Differentiated Services in Multihop Mobile Ad Hoc Networks Wei LiuXiang Chen Yuguang Fang WING Dept. of ECE University.
Context-aware Adaptive Routing for Delay Tolerant Networking
Delay-Tolerant Networks (DTNs)
Kevin Lee & Adam Piechowicz 10/10/2009
Presentation transcript:

Enabling Inter-domain DTN Communications by Networked Static Gateways Ting He*, Nikoletta Sofra, Kang-Won Lee*, and Kin K Leung * IBM Imperial College Sept. 2009

2 Introduction Different DTN domains call for different technology –E.g., coalition operations, MESSAGE project s d (a) Coalition networks : candidate gateway location (b) Heterogeneous sensor networks

3 Introduction Gateway deployment influences performance s d s d (a) (b) : gateway Q: How to deploy them?

4 Domain Heterogeneity What factors to consider: –Inter-domain factors: Traffic demands Inter-domain routing scheme Policy –Intra-domain factors: Mobility, channel, radio tech/range contact patterns Node population/density Routing scheme: –Replication strategy: forwarding, limited/unlimited replication –Queue discipline –Resource assumption: unlimited/limited bandwidth/buffer –Others: data ferries, network coding, etc.

5 Outline Unified Gateway Deployment Framework (UGDF) –Utility computation –Gateway placement Context-aware utility computation Performance evaluation

6 Unified Gateway Deployment Framework (UGDF) Utility computation: Decomposition + domain-specific calculation –Utility decomposition: U global = Σ domain i.j λ ij [ Σ ρ p ( Σ hop k U k )] λ ij : inter-domain traffic demand; ρ p : load factor (for inter-domain routing) –Per-hop utility calculation: domain-specific –Note: Utilities in different domains should be independent (guaranteed by networked gateways) Utility computation Gateway placement Domain knowledge, Performance criteria U(L) L* = argmax L U(L) s.t. cost(L) C Budget C

7 Unified Gateway Deployment Framework (UGDF) Gateway placement: max U(L) Σ L U(l i )! (harder than knapsack problem) s.t. Σ li L cost(l i ) C Optimal alg: unequal cost – NP-hard, equal cost – O(L g ) Greedy alg: While cost less than C l (j) = argmax L\L [U(l i U L)-U(L)]/c i L L U l (j) Backward greedy alg: While cost greater than C l (j) = argmin L [U(L)-U(L \ {l i })]/c i L L \ {l (j) } Utility computation Gateway placement Domain knowledge, Performance criteria U(L) L* = argmax L U(L) s.t. cost(L) C Budget C

8 Unified Gateway Deployment Framework (UGDF) 8 Gateway placement (contd): max U(L) s.t. Σ li L cost(l i ) C Performance guarantee: Under equal cost: Greedy/backward greedy solns are ε-close to the optimal if [U(l U L)- U(L)]s are ε -close ( for all l ), i.e. [U(l U L 1 )-U(L 1 )] (1- ε) [U(l U L 2 )-U(L 2 )] for |L 1 |=|L 2 |. Utility computation Gateway placement Domain knowledge, Performance criteria U(L) L* = argmax L U(L) s.t. cost(L) C Budget C

9 Unified Gateway Deployment Framework (UGDF) 9 Sketch of proof: (equal cost) -Decompose the total utility: (i: g for greedy, o for optimal) U(L i ) = U(l i 1 ) + U(l i 2 |l i 1 ) +…+ U(l i g |l i 1,…,l i g-1 ) -By definition of the greedy alg: U(l g j |l g 1,…,l g j-1 ) U(l o j |l g 1,…,l g j-1 ) -By the condition: U(l o j |l g 1,…,l g j-1 ) (1-ε) U(l o j |l o 1,…,l o j-1 ) Combining both gives U(L g ) (1- ε )U(L o ). Similarly, U(L total ) - U(L bg ) [U(L total ) - U(L o )] / (1- ε ). A similar result holds for unequal costs.

10 Outline Unified Gateway Deployment Framework (UGDF) Context-aware utility computation –Results & sketch of analysis Performance evaluation

Context-aware Utility Computation Assume Poisson contact processes. (node- node: λ n ; node-gateway: λ l ) Source-gateway hop: Single-copy routing/forwarding: Delay: 1/λ l # replicas: 1 Unlimited replication: Delay N\logN(1/ λ l +1/ λ n ) # replicas (1+N)/2 Limited replication: Delay F(N, λ l, λ n, r) # replicas N\(r+1)(N-r/2) Other hops: Intermediate domain: (same) Destination domain: (similar but λ lλ n ) 11

12 Context-aware Utility Computation Sketch of analysis: For unlimited replication: 1.Decompose: E[Delay] = j P{delivery between jth and (j+1)th replications}. E[Delay|] () E[# replicas] = j P{}. (j+1) Note: Period between jth and (j+1)th replications ~ Exp((j+1)(N-j-1)λ n ) Conditioned on, additional delay after jth replication ~ Exp((j+1)λ l ) 2. Bound: P{} = F 1 (N,j,λ n,λ l ) F 2 (N,j,λ n,λ l ) E[Delay|] F 3 (N,j,λ n,λ l ) 3. Approximate at large N (actually close even at N=5) Similar steps for limited replication.

13 Outline Unified Gateway Deployment Framework (UGDF) Context-aware utility computation Performance evaluation –Synthetic simulations –Trace-driven simulations

14 Performance Evaluation Synthetic simulations: Setup: –Two coalition networks with different bases (localized random walks) –Size, mobility, routing vary independently Calculated vs. simulated utilities: –Contact processes not Poisson –Still good approximation (scaling needed for direct delivery)

15 Performance Evaluation Synthetic simulations (contd): End-to-end performance: –6 strategies (3 optimization algs, 2 utility computation methods) –Greedy/backward greedy alg + calculated utility is near optimal –Results robust against routing schemes and utility measure Minimize delay Minimize # replicas (unlimited replication in domain 1, direct delivery in domain 2)

16 Performance Evaluation Trace-driven simulations: Setup: –Extracting traces from Dieselnet trace*: 4 sets of two-domain traces of mobile-to-mobile and mobile-to-AP contacts; 10 candidate gateway locations; 3 nodes per domain –Uniform traffic: 5 packets per hour per source node * Dieselnet Fall 2007http://traces.cs.umass.edu/ Mobile-mobile Mobile-AP

17 Performance Evaluation Trace-driven simulations (contd): Accuracy of utility calculation: Good approximation of the trend (under constant scaling). Avg. delay (direct delivery, unlimited replication) Avg. # replicas (unlimited replication)

18 Performance Evaluation Trace-driven simulations (contd): Performance of deployment: Near optimal (again) Much better (30%) than utility-agnostic deployment Minimize delay Minimize # replicas (both under unlimited replication)

19 Summary Gateway deployment for inter-domain DTN –UGDF: utility computation, gateway placement –Context-aware utility computation: decomposition & domain- specific analysis –Observations: Poisson contacts? Robust to mobility models (up to scaling) Suboptimal algs? Near-optimal performance (for scattered candidate locations) Gap with oracle? Good deployment relies on predictable mobility and representative training data