DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.

Slides:



Advertisements
Similar presentations
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Advertisements

Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
1 Mobile IPv6-Based Ad Hoc Networks: Its Development and Application Advisor: Dr. Kai-Wei Ke Speaker: Wei-Ying Huang.
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp, Scott Schenker Presented by Greg Nims.
Self-Organizing Hierarchical Routing for Scalable Ad Hoc Networking David B. Johnson Department of Computer Science Rice University Monarch.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Small-world Overlay P2P Network
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Scribe: A Large-Scale and Decentralized Application-Level Multicast Infrastructure Miguel Castro, Peter Druschel, Anne-Marie Kermarrec, and Antony L. T.
Effects of Applying Mobility Localization on Source Routing Algorithms for Mobile Ad Hoc Network Hridesh Rajan presented by Metin Tekkalmaz.
Internet Indirection Infrastructure Ion Stoica UC Berkeley.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
CSCI 4550/8556 Computer Networks Comer, Chapter 19: Binding Protocol Addresses (ARP)
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
SkipNet: A Scaleable Overlay Network With Practical Locality Properties Presented by Rachel Rubin CS294-4: Peer-to-Peer Systems By Nicholas Harvey, Michael.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
A Distance Routing Effect Algorithm for Mobility (DREAM)* Stefano Basagni Irnrich Chlamtac Violet R. Syrotiuk Barry A. Woodward.
Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Ad Hoc Wireless Routing COS 461: Computer Networks
1 Virtual Direction Routing for Overlay Networks Bow-Nan Cheng Murat Yuksel Shivkumar Kalyanaraman.
Mobile Ad-hoc Pastry (MADPastry) Niloy Ganguly. Problem of normal DHT in MANET No co-relation between overlay logical hop and physical hop – Low bandwidth,
Multi-level Hashing for Peer-to-Peer System in Wireless Ad Hoc Environment Dewan Tanvir Ahmed and Shervin Shirmohammadi Distributed & Collaborative Virtual.
Mobile Routing protocols MANET
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Mobile Adhoc Network: Routing Protocol:AODV
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
Information-Centric Networks07a-1 Week 7 / Paper 1 Internet Indirection Infrastructure –Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh.
ROUTING ALGORITHMS IN AD HOC NETWORKS
SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG.
Scalable Ad Hoc Routing the Case for Dynamic Addressing.
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
MobileMAN Integration and Experimentation of Legacy Mobile Multihop Ad Hoc Networks Eleonora Borgia, Marco Conti, and Franca Delmastro Institute for Informatics.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
Scalable Content- Addressable Networks Prepared by Kuhan Paramsothy March 5, 2007.
Peer to Peer A Survey and comparison of peer-to-peer overlay network schemes And so on… Chulhyun Park
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
A Scalable Routing Protocol for Ad Hoc Networks Eric Arnaud Id:
Intro DSR AODV OLSR TRBPF Comp Concl 4/12/03 Jon KolstadAndreas Lundin CS Ad-Hoc Routing in Wireless Mobile Networks DSR AODV OLSR TBRPF.
SHORT: Self-Healing and Optimizing Routing Techniques for Mobile Ad Hoc Networks Presenter: Sheng-Shih Wang October 30, 2003 Chao Gui and Prasant Mohapatra.
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
Self-stabilizing energy-efficient multicast for MANETs.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Using Ant Agents to Combine Reactive and Proactive strategies for Routing in Mobile Ad Hoc Networks Fredrick Ducatelle, Gianni di caro, and Luca Maria.
An Efficient Implementation of File Sharing Systems on the Basis of WiMAX and Wi-Fi Jingyuan Li, Liusheng Huang, Weijia Jia, Mingjun Xiao and Peng Du Joint.
Plethora: A Locality Enhancing Peer-to-Peer Network Ronaldo Alves Ferreira Advisor: Ananth Grama Co-advisor: Suresh Jagannathan Department of Computer.
Fabián E. Bustamante, Fall 2005 A brief introduction to Pastry Based on: A. Rowstron and P. Druschel, Pastry: Scalable, decentralized object location and.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Speaker: Ju-Mei Li Virtual Paths Routing: A Highly Dynamic Routing Protocol for Ad Hoc Wireless Networks Abdulrahman H. Altalhi and Golden G. Richard Computer.
A Cluster-based Routing Protocol for Mobile Ad hoc Networks
Lecture 28 Mobile Ad hoc Network Dr. Ghalib A. Shah
Internet Networking recitation #4
A comparison of Ad-Hoc Routing Protocols
Self-Organizing Hierarchical Routing for Scalable Ad Hoc Networking
Self-Organizing Hierarchical Routing for Scalable Ad Hoc Networking
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
PROSE CS 218 Fall 2017.
Mobile and Wireless Networking
Other Routing Protocols
Routing protocols in Mobile Ad Hoc Network
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
Presentation transcript:

DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪

Outline 一. Introduction  MADPastry 三. MADPastry’s Unicast  Simulation Results  Conclusion

Introduction (1/4)  Both MANETs and peer-to-peer (P2P) overlay networks share a number of key characteristics.  the lack of a central infrastructure  highly dynamic network topologies  the need for self-organization

Introduction (2/4)  Distributed Hash Tables (DHTs) have been proposed for large-scale network applications.  Route a packet based on a key (rather than a fixed destination address) to the (unknown) node in the network that is currently responsible for the given key within a bounded number of hops.  This overlay routing is also referred to as indirect routing.

Introduction (3/4)  DHTs do not closely concern themselves with the physical (routing) aspects of the underlying network  designed to form overlay networks in Internet-based networks where physical routing is practically taken for granted.

Introduction (4/4)  In MANETs, DHT can provide  indirect routing  direct physical routing (unicasting)  MADPastry  a DHT substrate explicitly designed for MANETs  DHT-based unicast can achieve  better packet delivery rates  lower network traffic

MADPastry (1/8)  MADPastry combines AODV ad hoc routing and Pastry overlay routing at the network layer  provide an efficient primitive for key-based routing in MANETs.

MADPastry (2/8)  Each node in a MADPastry network assigns itself a unique overlay id  defines its logical position on the virtual overlay id ring.  A message's packet header contains a message key.  MADPastry routes the message to that node in the network that is currently responsible for the message key  the node whose overlay id is currently the numerically closest to the message key among all MADPastry nodes in the network.  To avoid message broadcasts (e.g. for route discovery)  MADPastry considers physical locality in the construction of its routing tables.

MADPastry (3/8) - Clusters  Random Landmark  No fixed landmark nodes, landmark keys instead  These keys divide the logical overlay id space into equal sections  , , , F  Node currently closest to a landmark key  Become temporary landmark node  Periodically issue beacon messages  Nodes overhear these beacon messages and periodically determine the physically closest temporary landmark node.

MADPastry (4/8) - Clusters  Node associates itself with closest temporary landmark  assumes same overlay ID prefix  If need be, a node assigns itself a new overlay id sharing the same prefix with the new closest temporary landmark node.  physically close nodes forming overlay clusters with common id prefixes  Physically close nodes are also likely to be close in the overlay

MADPastry (5/8)- Spatial Topology Spatial Topology

MADPastry (6/8) – Routing Tables  MADPastry maintains three different routing tables:  AODV-style routing table for physical routes from a node to specific target nodes  stripped down Pastry routing table that only contain landmark keys  standard Pastry leaf set for indirect routing

MADPastry (7/8) – Routing Tables

MADPastry (8/8) - Routing  When a node wants to send a packet to a specific key 1.Consults its Pastry routing table and/or leaf set to determine the closest prefix match, as stipulated by standard Pastry. 2.Consults its AODV routing table for the physical route to execute this overlay hop. 3.Intermediate nodes on the physical path of an overlay hop consult their AODV table for the corresponding next physical hop. 4.When a packet reaches the destination of an overlay hop, that node again consults its Pastry routing table and/or leaf set to determine the next overlay hop.  This process continues until the packet reaches the eventual target node that is responsible for the packet key ( whose overlay id is the numerically closest to the packet key).

MADPastry’s Unicast (1/7) – Address Publication  Each nodes has exactly one temporary address server  Address server stores its client's current overlay ID  Node A hashes its node ID  address server key (ASK).  Node A publishes its current overlay ID towards ASK  Node currently responsible for node A's hash key becomes node A's address server

MADPastry’s Unicast (2/7) – Address Publication ASK:h(17) →B7A9CC

MADPastry’s Unicast (3/7) – Address Resolution  Node A wants to communicate with node B  Node A does not know node B's current overlay ID  Node A hashes node B's net ID to get ASK  Node A sends request towards ASK  Node B's address server replies with node B's current overlay ID

MADPastry’s Unicast (4/7)– Address Resolution ASK: h(17) →B7A9CC

MADPastry’s Unicast (5/7) – Unicast  Node A uses overlay ID from reply to send message to node B  MADPastry delivers message using indirect routing

MADPastry’s Unicast (6/7) – Unicast

MADPastry’s Unicast (7/7)  Shortest Routing Paths  A direct, straight path from the source node to the destination node  When using AODV and it doesn’t know the path to that destination, it needs to engage in a costly route discovery process  MADPastry’s Routing Paths  Probably travel multiple overlay hops  The entries in its routing table are likely up-to-date and valid  Usually won’t have to discover a route because it can use at each overlay routing step any existing route that would bring the packet numerically closer to its key

Simulation Results (1/6)  Compare MADPastry's unicast against a popular ad hoc routing protocol  AODV (reactive)  OLSR (proactive)  Simulations in ns2  1 random request every 10s per node

Simulation Results (2/6)  Constant node velocity:1.4 m/s  Varying network sizes (50,100,150,200,250)

Simulation Results (3/6)

Simulation Results (4/6)

Simulation Results (5/6)  Constant network size:250 nodes  Varying node velocities (0.1,1.4, 2.5,5.0 m/s)

Simulation Results (6/6)

Conclusion (2/2)  MADPastry already present in the MANET to provide key-based, indirect routing  MADPastry can also provide point-to-point unicasting  No need to maintain ad hoc routing protocol in parallel for DHT applications that use MADPastry handle their point-to-point routing

Conclusion (2/2)  MADPastry's unicast can outperform popular reactive and proactive ad hoc routing protocols  In MANETs it can be advantageous to travel numerous short up-to-date routes instead of one long direct route