First Year Results and Lessons, and Project Directions for the Second Year Marco Conti Computer Networks Dept., IIT CNR

Slides:



Advertisements
Similar presentations
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 9 Fundamentals.
Advertisements

Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
Low-Power Interoperability for the IPv6 Internet of Things Presenter - Bob Kinicki Low-Power Interoperability for the IPv6 Internet of Things Adam Dunkels,
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Decentralized Reactive Clustering in Sensor Networks Yingyue Xu April 26, 2015.
Group #1: Protocols for Wireless Mobile Environments.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Priority Queuing Achieving Flow ‘Fairness’ in Wireless Networks Thomas Shen Prof. K.C. Wang SURE 2005.
6/3/ Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross-Layer Information Awareness CS495 – Spring 2005 Northwestern University.
IEEE OpComm 2006, Berlin, Germany 18. September 2006 A Study of On-Off Attack Models for Wireless Ad Hoc Networks L. Felipe Perrone Dept. of Computer Science.
NCKU CSIE CIAL1 Principles and Protocols for Power Control in Wireless Ad Hoc Networks Authors: Vikas Kawadia and P. R. Kumar Publisher: IEEE JOURNAL ON.
Cross Layer Design in Wireless Networks Andrea Goldsmith Stanford University Crosslayer Design Panel ICC May 14, 2003.
August 18-19, 2002 UCSC Baskin School of Engineering1 UCSC PERC COMPONENT: Protocols for Wireless Internetworks J.J. Garcia-Luna-Aceves Computer Communication.
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
A Better Choice for Sensor Sleeping Ou Yang and Wendi Heinzelman
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
A Cross Layer Approach for Power Heterogeneous Ad hoc Networks Vasudev Shah and Srikanth Krishnamurthy ICDCS 2005.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
Lecture 15 Summary Wireless Networks and Mobile Systems.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
Profiles and Multi-Topology Routing in Highly Heterogeneous Ad Hoc Networks Audun Fosselie Hansen Tarik Cicic Paal Engelstad Audun Fosselie Hansen – Poster,
1 National Research Council - Pisa - Italy Marco Conti Italian National Research Council (CNR) IIT Institute MobileMAN Architecture and Protocols 2nd MobileMAN.
A Simple and Effective Cross Layer Networking System for Mobile Ad Hoc Networks Wing Ho Yuen, Heung-no Lee and Timothy Andersen.
A Cooperative Diversity- Based Robust MAC Protocol in wireless Ad Hoc Networks Sangman Moh, Chansu Yu Chosun University, Cleveland State University Korea,
Analysis of the Impact and Interactions of Protocol and Environmental Parameters on Overall MANET Performance Michael W. Totaro and Dmitri D. Perkins Center.
1 National Research Council - Pisa - Italy Marco Conti Italian National Research Council (CNR) IIT Institute Executive board meeting 2nd MobileMAN Workshop.
Cross Layer Design (CLD) for Wireless Networks. Future Wireless Systems Nth Generation Cellular Wireless Internet Access Wireless Video/Music Wireless.
1 Heterogeneity in Multi-Hop Wireless Networks Nitin H. Vaidya University of Illinois at Urbana-Champaign © 2003 Vaidya.
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
Computer Networks. Introduction Computer Network2 A History Lesson of Networking 1969 – ARPANET, first packet switched network consist of UCLA, Stanford,
1 Mobile ad hoc networking with a view of 4G wireless: Imperatives and challenges Myungchul Kim Tel:
BitTorrent enabled Ad Hoc Group 1  Garvit Singh( )  Nitin Sharma( )  Aashna Goyal( )  Radhika Medury( )
MobileMAN Integration and Experimentation of Legacy Mobile Multihop Ad Hoc Networks Eleonora Borgia, Marco Conti, and Franca Delmastro Institute for Informatics.
1 IST - FET Initiative National Research Council - Pisa - Italy Marco Conti Italian National Research Council (CNR) IIT Institute Mobile Metropolitan Ad.
1 Mobile ad hoc networking: imperatives and challenges Imrich Chlamtac, Marco Conti, Jennifer J.N. Liu MMLAB, Seongil Han
Computer Security Workshops Networking 101. Reasons To Know Networking In Regard to Computer Security To understand the flow of information on the Internet.
RF network in SoC1 SoC Test Architecture with RF/Wireless Connectivity 1. D. Zhao, S. Upadhyaya, M. Margala, “A new SoC test architecture with RF/wireless.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
Reconsidering Internet Mobility Alex C. Snoeren, Hari Balakrishnan, M. Frans Kaashoek MIT Laboratory for Computer Science.
H AZY S IGHTED L INK S TATE R OUTING P ROTOCOL Eleonora Borgia Pervasive Computing & Networking Lab. PerLab IIT – CNR MobileMAN.
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
William Stallings Data and Computer Communications
D EPT. OF I NFO. & C OMM., GIST On Accurate and Asymmetry-aware Measurement of Link Quality in Wireless Mesh Networks Author : Kyun-Han Kim Conference.
MobileMAN Meeting Helsinki (8 June 2004) Marco Conti Computer Networks Dept., IIT CNR
National Research Council - Pisa - Italy Marco Conti Italian National Research Council (CNR) IIT Institute MobileMAN MobileMAN: II year expected results.
IEEE Ad Hoc Mode: Measurement studies Marco Conti Computer Networks Dept., IIT CNR
Speaker: Yi-Lei Chang Advisor: Dr. Kai-Wei Ke 2012/05/15 IPv6-based wireless sensor network 1.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Slide 1 National Research Council - Pisa - Italy Marco Conti Italian National Research Council (CNR) IIT Institute Measurements of IEEE in Ad Hoc.
November 4, 2003Applied Research Laboratory, Washington University in St. Louis APOC 2003 Wuhan, China Cost Efficient Routing in Ad Hoc Mobile Wireless.
Middleware issues: From P2P systems to Ad Hoc Networks
Self-stabilizing energy-efficient multicast for MANETs.
Heterogeneous Wireless Access in Large Mesh Networks Haiping Liu, Xin Liu, Chen-Nee Chuah, Prasant Mohapatra University of California, Davis IEEE MASS.
Strawman Recharter Nov 12, Basic Problem “The purpose of this working group is to standardize IP routing protocol functionality suitable for wireless.
Building Wireless Efficient Sensor Networks with Low-Level Naming J. Heihmann, F.Silva, C. Intanagonwiwat, R.Govindan, D. Estrin, D. Ganesan Presentation.
Linda Briesemeister, José Joaquin Garcia-Lunes- Aceves, Hamid R. Sadjadpour, José Meseguer, Mark-Oliver Stehr, Carolyn Talcott DARPA PI Meeting August.
LA-MAC: A Load Adaptive MAC Protocol for MANETs IEEE Global Telecommunications Conference(GLOBECOM )2009. Presented by Qiang YE Smart Grid Subgroup Meeting.
David B. Johnson Rice University Department of Computer Science DSR Draft Status Monarch Project 57th IETF.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
Wireless Sensor Networks: A Survey I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci.
Low-Power Interoperability for the IPv6 Internet of Things Presenter - Bob Kinicki Low-Power Interoperability for the IPv6 Internet of Things Adam Dunkels,
Speaker Dr. Saloua CHETTIBI Lecturer at University of Jijel
Computer Networks.
Lecture 28 Mobile Ad hoc Network Dr. Ghalib A. Shah
MobileMAN Workshop 2 Cambridge 2 –
Model-Driven Analysis Frameworks for Embedded Systems
Mobile and Wireless Networking
10th International Conference on Telecommunication, ICT’2003,
Presentation transcript:

First Year Results and Lessons, and Project Directions for the Second Year Marco Conti Computer Networks Dept., IIT CNR

MobileMAN IAB meeting (Helsinki, 7 Jun 2004) 2200 papers (citeseer), but no mainstream products More than 10 years of research but this area is far from being consolidated Three Areas where Ad Hoc lacks “Realism” (*): 1.Integration (lack of) 2.Implementations/Testbeds (lack of) 3.Experimentation (lack of) (*) Christian Tschudin, Henrik Lundgren, Erik Nordström, “Embedding MANETs in the Real World“, Personal Wireless Communications”, Proceedings of the 8th IFIP-TC6 Conference, Venice, Italy, September 2003, Lecture Notes in Computer Science LNCS Methodology

MobileMAN IAB meeting (Helsinki, 7 Jun 2004) 1. Integration (lack of) Focus was mostly on revising routing Internet Draft. Current ID revision numbers: v13 (AODV, now an RFC), v9 (DSR), v11 (OLSR), v10 (TBRPF) Main other areas have been analyzed (and new areas are continuously added), see (*): -Most works focus on a single layer/issue (MAC, Routing, TCP, middleware, etc.); or -Studies of the interation among few layers (TCP and MAC, TCP and routing, energy and topology control, …) Lack of an overall view of MANET architecture and protocols (*) I. Chlamtac, M.Conti, J. Liu, “Mobile Ad hoc Networking: Imperatives and Challenges”, Ad Hoc Networks Journal, Vol.1 N.1, State of the Art: open issues

MobileMAN IAB meeting (Helsinki, 7 Jun 2004) 2.Implementations/Testbeds (lack of) Only limited hands-on experience available (typically 4 to 10 nodes, up to 37 at Uppsala) 3.Experimentation (lack of) Internet Drafts production cycle mainly driven by simulation work: “implementations can come later, simulations tell the truth” Few attempts to validate/calibrate simulative studies with measurements Can we trust the protocols inside the simulators? State of the Art: open issues

MobileMAN IAB meeting (Helsinki, 7 Jun 2004) Scenario An IEEE network with 50 nodes moving according to the Random Waypoint mobility model in a 1500m x 300m closed rectangular area. The nodes maximum speed is equal to 1 m/sec. In the considered scenario there are 3 FTP sessions (1460 bytes per packet), and ten CBR sessions (512 bytes per packet). Results Figures show the sum of the 3 FTP- session throughput by varying the length of the pause in the Random Waypoint model Results are highly dependent on the simulation tool. Can we trust the protocols inside the simulators?

MobileMAN IAB meeting (Helsinki, 7 Jun 2004) 3.Not all aspects are modelled, e.g., most simulators assume the same Tx range for unicast and broadcast frames. real 2.No calibration of simulators with real measurements The Communication Gray Zones Problem Can we trust simulative results?

MobileMAN IAB meeting (Helsinki, 7 Jun 2004) Experimentation Use of real testbeds: to validate the developed solutions whenever possible or, (at least), to calibrate/validate the simulation models to be used for architecture and protocols desgin Implementations Whenever possible, hardware/software implementation of the MobileMAN solutions The integration of the developed solutions in a testbed. MobileMAN: Experimentation & Implementation

MobileMAN IAB meeting (Helsinki, 7 Jun 2004) The development, and validation, of effective integrated solutions for the relevant technical issues of self-organizing networks: routing and medium access control protocols, power management, security, and location. middleware transport and network layer protocols wireless ad-hoc technologies power management cooperation model application 1application 2application k MobileMAN: Integration

MobileMAN IAB meeting (Helsinki, 7 Jun 2004) Experimentation We will see some experimental results in the following presentations Implementation The main activity of the second year of the project Integration A preliminary integration will be performed in the last months of the II year. MobileMAN Status

MobileMAN IAB meeting (Helsinki, 7 Jun 2004) MANET IETF WG proposes a view of mobile ad hoc networks as an evolution of the Internet [1]: IP centric view (“solve mobile routing problems at the IP layer”), and use of a layered architecture Advantages: It guarantees that the TCP/IP protocol stack can efficiently operate on a large set of heterogeneous technologies. Drawbacks: layers independence makes difficult to fix some ad hoc networks, see for example TCP-MAC interaction problems. MANET Architecture

MobileMAN IAB meeting (Helsinki, 7 Jun 2004) MANET reference architecture Medium Access Control, Antennas, Power Control Transport and Network layer protocols TCP, IP routing, Forwarding, Addressing, Interconnection Middleware Service location, Group communication, DSM Application 1 Inter-layer tasks Security Cooperation Energy Saving Application 2Application n BluetoothHyper LAN Applications & Middleware Networking Enabling Technologies

MobileMAN IAB meeting (Helsinki, 7 Jun 2004) Efficient solutions for ad hoc networks require a more strict cooperation among protocols belonging to different layers [2]: for example, from the energy management standpoint, power control and multiple antennas at the link layer are coupled with scheduling at MAC layer, and with energy- constrained and delay-constrained routing at network layer The question is to what extent the pure layered approach needs to be modified? Extension of the layered architecture: layer triggers Layer triggers are pre-defined signals to notify some events to the higher layer, e.g., failure in data delivery. “Violation” of the layered architecture: full cross layering design Neglecting the layers separation principle by a joint design of the protocols [2] A.J. Goldsmith, S.B. Wicker, “Design Challenges for Energy-Constrained Ad Hoc Wireless Networks”, IEEE Wireless Communications, Volume 9, Number 4, August pp Cross layers’ Dependencies in MANET Design

MobileMAN IAB meeting (Helsinki, 7 Jun 2004) Cross Layer optimization for all network functions. Cross layering is a must for functions such as energy management, but provides benefits for all network functions. Both local and global adaptation can be performed to adapt the system to highly variable ad hoc network conditions, and to better control the system performance Full Context Awareness at all layers. At each layer, protocols can be designed to be aware of the network status, energy level, etc. Cross layering makes easy to achieve context awareness at the application layer. Reduced overhead for collecting the network status information avoiding data duplication at different layers. Cross Layering Pros

MobileMAN IAB meeting (Helsinki, 7 Jun 2004) Protocols re-design (?)  minimal re-design is desirable No Layers independence (?)  “spaghetti” style in protocols design must be avoided Vikas Kawadia, P.R. Kumar, "A Cautionary Perspective on Cross Layer Design", Technical reports Cross Layering Cons

MobileMAN IAB meeting (Helsinki, 7 Jun 2004) Applications Power Management Enhanced Wi-Fi cards Routing Users’ location Forwardin g (Simplified) Transport Protocol Socket API Middleware Network status Cooperation Performability Network Layer MobileMAN Cross Layer Architecture MobileMAN approach to cross layering tries to balance performance optimization with protocols’ stack adatability the kernel of the architecture is a shared memory (“Network Status” in the figure) that is a repository of all the network status information collected by the network protocols. All protocols can access this memory to write the collected information, and to read information produced/collected from the other protocols.

MobileMAN IAB meeting (Helsinki, 7 Jun 2004) Allows for a full compatibility with standards, as it does not touch the core functions of each layer. Is robust to upgrading, and protocols belonging to different layers can be added/removed from the protocol stack without modifying the operations at the other layers. For example, using the legacy TCP protocol as the transport protocol of the MobileMAN architecture only imply that cross-layer optimizations will not occur at this layer. It maintains all the advantages of a modular architecture. Layer separation is achieved by standardizing the access to the Network Status. MobileMAN Cross Layering Architecture

MobileMAN IAB meeting (Helsinki, 7 Jun 2004) 1.Continue along the construction of a MANET following the IETF approach to be used for experimental tests (internal and with users) 2.Refine the MobileMAN Architecture and Protocols to include the Cross Layering principle Directions for the Second Year

MobileMAN IAB meeting (Helsinki, 7 Jun 2004) Berkley Sockets (stream, datagram) Transport (TCP, UDP) IEEE (MAC + Physical) NeSt NeSt API Network (Link-State routing, IP forwarding) Middleware (Subject-Based Routing) Common API Cross-Layering Ring overlay for subject-based routing Socket-based networking MobileMAN protocol stack architecture with Cross Layering

MobileMAN IAB meeting (Helsinki, 7 Jun 2004) How should the network status information managed? How protocols belonging to different layer access to the common information? Make protocols cross-layer aware Protocols overheads cannot be evaluated in isolation but new cross- layer metrics need to be defined. MobileMAN Cross Layering Architecture: II Year Open Issues

MobileMAN IAB meeting (Helsinki, 7 Jun 2004) NeSt Hypothesis We have a language, that the NeSt and the protocols can use for: Describing data Writing functions to analyse/monitor data The NeSt manages abstractions of data and events, internally maintained by protocols Example: topology information collected at the routing layer is exported in a graph structure in the NeSt

MobileMAN IAB meeting (Helsinki, 7 Jun 2004) NeSt functionalities NeSt groups and controls all cross-layer interactions It implements two models: Synchronous interactions, to allow data sharing among protocols Asynchronous interactions, to allow network event subscription and notification

MobileMAN IAB meeting (Helsinki, 7 Jun 2004) a. Register b. Seize an abstraction with PID, AID and callback NeSt register() seize() access() subscribe() notify() monitor() P1 P2 1. Generate PID 2. Return PID 1.Verify callback 2. Grant or reject seizing register : (void)  ProID seize : (ProID, AbsID, CallBack())  result Registering and seizing of an abstraction

MobileMAN IAB meeting (Helsinki, 7 Jun 2004) NeSt register() seize() access() subscribe() notify() monitor() P1 P2 a. Access an abstraction with PID, AID and Filter() b. Abstract internal data in NeSt format INTERNAL DATA 1.Invoke callback for AID 2.Apply Filter() on AID 3. Return Filter() result access : (ProID, AbsID, Filter())  result Synchronous interaction

MobileMAN IAB meeting (Helsinki, 7 Jun 2004) NeSt register() seize() access() subscribe() notify() monitor() P1 P2 a. Subscribe event with PID and EID b. Notify event with PID, EID and info regarding the occurrence Catch e 1. Check EID on the subscription list 2. Deliver the occurrence to matching subscribers 1. Register subscription (PID, EID) subscribe : (ProID, EvID)  result notify : (ProID, EvID, EvInfo)  result Asynchronous interaction: internal events

MobileMAN IAB meeting (Helsinki, 7 Jun 2004) NeSt register() seize() access() subscribe() notify() monitor() P1 P2 a. Monitor event with PID, AID and Monitor() b.Abstract internal data in NeSt format Internal data 1.Verify Monitor() 2. While (true) 2a. Invoke callback for AID 2b. Apply Monitor() to AID 2c. If match found notify PID monitor : (ProID, AbsID, Monitor())  result Asynchronous interaction

MobileMAN IAB meeting (Helsinki, 7 Jun 2004) Wireless Technologies Include the cross-layering view at datalink layer. Design and implement a full datalink layer that includes the enhanced MAC protocol for ad hoc networks as designed during the first year. Networking services Include the cross-layering view at network/transport layer Design/Implementation of packet forwarding schemes suitable for MobileMAN. Development and testing of an ad hoc network Co-operation Model Implementation and validation of the cooperation models and mechanisms defined during the first year. Second Year Objectives

MobileMAN IAB meeting (Helsinki, 7 Jun 2004) Middleware Adaptation of Pastry middleware for the MobileMAN environment to exploit cross layering. Development of new solutions for P2P information delivery based on Pastry. New applications and services Include the cross-layering view at application layer Adaptation of existing applications, identified, during the first year, to run on top of MobileMAN. Socio-economic Model Apply the developed methodology for evaluating social, anthropological potential of MobileMAN, and provide the results for improving the technical parts. To investigate market-based mechanisms for exploiting the self-organised paradigm Second Year Objectives (cont.)

MobileMAN IAB meeting (Helsinki, 7 Jun 2004) References MobileMAN: Deliverable D5 M. Conti, S. Giordano, G. Maselli, G. Turi, “Cross Layering in MANET: the MobileMAN Approach”, IEEE Computer, February M. Conti, J. Crowcroft, G. Maselli G. Turi, “A Modular Cross Layer Architecture for Ad Hoc Networks”, in “Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless and Peer-to-Peer Networks”, Jie Wu (Editor) CRC Press, 2004 Thank You ! Questions ?