Research into the hybridization of the PRoPHET and ERP network routing algorithms George Mason University INFS 612 (Spring 2013) Project Group 4: Richard.

Slides:



Advertisements
Similar presentations
CSE 413: Computer Networks
Advertisements

Robin Kravets Tarek Abdelzaher Department of Computer Science University of Illinois The Phoenix Project.
ROUTING IN INTERMITTENTLY CONNECTED MOBILE AD HOC NETWORKS AND DELAY TOLERANT NETWORKS: OVERVIEW AND CHALLENGES ZHENSHENG ZHANG.
Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
GRS: The Green, Reliability, and Security of Emerging Machine to Machine Communications Rongxing Lu, Xu Li, Xiaohui Liang, Xuemin (Sherman) Shen, and Xiaodong.
802.11a/b/g Networks Herbert Rubens Some slides taken from UIUC Wireless Networking Group.
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
On Using Probabilistic Forwarding to Improve HEC-based Data Forwarding in Opportunistic Networks Ling-Jyh Chen 1, Cheng-Long Tseng 2 and Cheng-Fu Chou.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
By Libo Song and David F. Kotz Computer Science,Dartmouth College.
DTNs Delay Tolerant Networks. Fall, Kevin. Intel Research, Berkeley. SIGCOMM 2003 Aug25, A Delay- Tolerant Network Architecture for Challenged Internets.
EE 4272Spring, 2003 Chapter 10 Packet Switching Packet Switching Principles  Switching Techniques  Packet Size  Comparison of Circuit Switching & Packet.
DTNLite: Reliable Data Delivery in Sensornets Rabin Patra and Sergiu Nedevschi UCB Nest Retreat 2004.
William Stallings Data and Computer Communications 7th Edition
A New Household Security Robot System Based on Wireless Sensor Network Reporter :Wei-Qin Du.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Chapter 10 Introduction to Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
Milano, 4-5 Ottobre 2004 IS-MANET The Virtual Routing Protocol for Ad Hoc Networks ISTI – CNR S. Chessa.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Routing Protocols II.
Mobile IP.
A Guide to major network components
IEEE Wireless LAN Standard
Switching Techniques Student: Blidaru Catalina Elena.
Introduction to Delay Tolerant Networks Tzu-Chieh Tsai Department of Computer Science, National Cheng Chi University.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
WSN Done By: 3bdulRa7man Al7arthi Mo7mad AlHudaib Moh7amad Ba7emed Wireless Sensors Network.
CH2 System models.
EITnotes.com For more notes and topics visit:
UCAN: A Unified Cellular and Ad Hoc Network Architecture Presenter: Tripp Parker Authors: Haiyun Luo Ramachandran Ramjee Prasun Sinha, Li Erran Li, Songwu.
1 Delay Tolerant Network Routing Sathya Narayanan, Ph.D. Computer Science and Information Technology Program California State University, Monterey Bay.
TELE202 Lecture 5 Packet switching in WAN 1 Lecturer Dr Z. Huang Overview ¥Last Lectures »C programming »Source: ¥This Lecture »Packet switching in Wide.
Sami Al-wakeel 1 Data Transmission and Computer Networks The Switching Networks.
Switching breaks up large collision domains into smaller ones Collision domain is a network segment with two or more devices sharing the same Introduction.
 Circuit Switching  Packet Switching  Message Switching WCB/McGraw-Hill  The McGraw-Hill Companies, Inc., 1998.
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
Computer Networks with Internet Technology William Stallings
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
CSCI 465 D ata Communications and Networks Lecture 14 Martin van Bommel CSCI 465 Data Communications & Networks 1.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
A Distributed Coordination Framework for Wireless Sensor and Actor Networks Tommaso Melodia, Dario Pompili, Vehbi C.Gungor, Ian F.Akyildiz (MobiHoc 2005)
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
PRoPHET+: An Adaptive PRoPHET- Based Routing Protocol for Opportunistic Network Ting-Kai Huang, Chia-Keng Lee and Ling-Jyh Chen.
A Message Ferrying Approach for Data Delivery in Sparse Mobile Ad Hoc Networks Reporter: Yanlin Peng Wenrui Zhao, Mostafa Ammar, College of Computing,
Packet switching network Data is divided into packets. Transfer of information as payload in data packets Packets undergo random delays & possible loss.
KAIS T High-throughput multicast routing metrics in wireless mesh networks Sabyasachi Roy, Dimitrios Koutsonikolas, Saumitra Das, and Y. Charlie Hu ICDCS.
UCLA ENGINEERING Computer Science RobustGeo: a Disruption-Tolerant Geo-routing Protocol Ruolin Fan, Yu-Ting Yu *, Mario Gerla UCLA, Los Angeles, CA, USA.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Unit III Bandwidth Utilization: Multiplexing and Spectrum Spreading In practical life the bandwidth available of links is limited. The proper utilization.
Joint Replication-Migration-based Routing in Delay Tolerant Networks Yunsheng Wang and Jie Wu Temple University Zhen Jiang Feng Li West Chester Unveristy.
Event Based Routing In Delay Tolerant Networks Rohit Mullangi And Lakshmish Ramaswamy DTN is fundamentally an opportunistic network environment, where.
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
© SITILabs, University Lusófona, Portugal1 Chapter 2: Social-aware Opportunistic Routing: the New Trend 1 Waldir Moreira, 1 Paulo Mendes 1 SITILabs, University.
1 M. H. Ahmed and Salama Ikki Memorial University Newfoundland, Canada Chapter 3 To Cooperate or Not to Cooperate? That Is the Question!
Dynamic Control of Coding for Progressive Packet Arrivals in DTNs.
Ben Miller.   A distributed algorithm is a type of parallel algorithm  They are designed to run on multiple interconnected processors  Separate parts.
SERENA: SchEduling RoutEr Nodes Activity in wireless ad hoc and sensor networks Pascale Minet and Saoucene Mahfoudh INRIA, Rocquencourt Le Chesnay.
Ad-hoc Storage Overlay System (ASOS): A Delay-Tolerant Approach in MANETs Guang Yang 1, Ling-Jyh Chen 2, Tony Sun 1, Biao Zhou 1, Mario Gerla 1 1 University.
Data Communication Networks Lec 13 and 14. Network Core- Packet Switching.
VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks Zhao, J.; Cao, G. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 鄭宇辰
Delay-Tolerant Networks (DTNs)
DELAY TOLERANT NETWORK
PROVEST: Provenance-based Trust Model for Delay Tolerant Networks
Packet Switching Datagram Approach Virtual Circuit Approach
ISO/OSI Model and Collision Domain
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Kevin Lee & Adam Piechowicz 10/10/2009
A survey in Delay Tolerant Networks Andrew Steinberg and Rafael Papa.
Switching Techniques.
Protocols & Packet Switching
Circuit Switched Network
Presentation transcript:

Research into the hybridization of the PRoPHET and ERP network routing algorithms George Mason University INFS 612 (Spring 2013) Project Group 4: Richard Joy, Miriam Joy, Serena Mei, and Suyog Parajuli

 Research Problem  Background on ERP and PRoPHET  Research Approach  Results  Demonstration  Conclusion and Questions

 Delay Tolerant Network (DTN) addresses challenges in disconnected, disrupted networks without end- to-end connection  Over time, DTN routing protocols have developed in two areas: forwarding-based and replication-based  Replication-based algorithms have higher message delivery rates, but are resource hungry  Problem: Is there a way to combine two replication- based algorithms which result in the same delivery rate with lower overhead?

 Mobile Sensor Networks  Sensors with wireless connectivity deployed over a geographic area  Periodically transmit their findings to a base station, perhaps for analysis or permanent storage.  These sensors may be small and have limited communication range, implying that they are not always able to establish a connected path (leveraging other sensors as routers) back to base stations.  Disaster Recovery/Military Deployment:  People, in addition to sensors, are deployed over an area with limited wireless coverage (i.e., few, if any, base stations).  Interplanetary/Spacecraft Communications

 ERP is a “greedy” replication algorithm  Nodes continuously replicate and transmit messages to newly discovered contacts who do not already possess a copy  Very effective at delivering messages  Extremely inefficient for resources

S C1C1 C2C2 D C3C3 C2C2 C3C3 DS C1C1 Time = t 1 Time = t 2 >t 1

 PRoPHET is a “utility-based” replication protocol  Not indiscriminate in its replication; uses an adaptive algorithm  Set of probabilities for successful delivery  Algorithm updates whenever a node is encountered.  Nodes that are encountered frequently have a high delivery predictability.  PRoPHET statistics are shared between each of the communicating nodes.

Orbit and probability of encounterMessage S B C D S B C D S B C D S B C D Message Source: SMessage Destination: D

DTN Listener DTN Connector Connection List Message Stats Message Manager DTNNode JBDC Connector Database In our environment, the nodes have particular orbits; connection probabilities are assigned to reflect this design 20 Nodes 4 connection partners per node with 25% probability 30 messages

 Ran a series of tests incrementing the threshold for switching to ERP (if it is the better solution)  Each test (each threshold) was 40 minutes long  Time-to-live for each message was 128 connections % PRoPHET 100% ERP 40 min

0 = 100% ProPHET 1 = 100% ERP

ERP first selected by node

 Routing Under Uncertainty  Is information on location of target node reliable or being distorted by environmental conditions? How do you adjust for this?  Resource Allocation  How do you properly elevate messages for priority handling?  Managing buffers and still maximizing delivery  Integrating a forwarding algorithm  Performance  Average latency in delivering messages;  Average amount of system storage and bandwith consumed;  Amount of energy consumed in transmission (particularly applicable to mobile devices serving as carriers for others)  Reliability  Sending back acknowledgements from message recipient  Security  New area of research into “reputation” protocol  How to track messages through the entire path  Encryption