Gerhard Haßlinger Search Methods in Dynamic Wireless Networks  Challenges for search in wireless networks  Random walks and flooding for search with.

Slides:



Advertisements
Similar presentations
Ch. 12 Routing in Switched Networks
Advertisements

Peer-to-Peer and Social Networks An overview of Gnutella.
Evaluation of a Scalable P2P Lookup Protocol for Internet Applications
Queuing Network Models for Delay Analysis of Multihop Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute.
VDR: Proactive element Conclusions VDR reaches 3.5% more nodes than VDR-R and 9% more nodes than our modified random walk routing strategy (RWR) VDR shows.
Rumor Routing Algorithm For sensor Networks David Braginsky, Computer Science Department, UCLA Presented By: Yaohua Zhu CS691 Spring 2003.
Structuring Unstructured Peer-to-Peer Networks Stefan Schmid Roger Wattenhofer Distributed Computing Group HiPC 2007 Goa, India.
1 An Overview of Gnutella. 2 History The Gnutella network is a fully distributed alternative to the centralized Napster. Initial popularity of the network.
Search and Replication in Unstructured Peer-to-Peer Networks Pei Cao, Christine Lv., Edith Cohen, Kai Li and Scott Shenker ICS 2002.
LightFlood: An Optimal Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
Eddie Bortnikov/Aran Bergman, Principles of Reliable Distributed Systems, Technion EE, Spring Principles of Reliable Distributed Systems Recitation.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Topology Control II.
Randomized 3D Geographic Routing Roland Flury Roger Wattenhofer Distributed Computing Group.
Building Low-Diameter P2P Networks Eli Upfal Department of Computer Science Brown University Joint work with Gopal Pandurangan and Prabhakar Raghavan.
Issues in ad-hoc networks Miguel Sanchez Nov-2000.
Efficient Content Location Using Interest-based Locality in Peer-to-Peer Systems Presented by: Lin Wing Kai.
Before start… Earlier work single-path routing in sensor networks
Search and Replication in Unstructured Peer-to-Peer Networks Pei Cao Cisco Systems, Inc. (Joint work with Christine Lv, Edith Cohen, Kai Li and Scott Shenker)
 Idit Keidar, Technion Intel Academic Seminars, February Octopus A Fault-Tolerant and Efficient Ad-hoc Routing Protocol Idit Keidar, Technion Joint.
Adaptive Topology Discovery in Hybrid Wireless Networks
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
1 Characterizing Selfishly Constructed Overlay Routing Networks March 11, 2004 Byung-Gon Chun, Rodrigo Fonseca, Ion Stoica, and John Kubiatowicz University.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
On Self Adaptive Routing in Dynamic Environments -- A probabilistic routing scheme Haiyong Xie, Lili Qiu, Yang Richard Yang and Yin Yale, MR and.
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
On the Scalability of Path Exploration Using Opportunistic Path-Vector Routing Hasan T. Karaoglu, Murat Yuksel, Mehmet H. Gunes University of Nevada, Reno.
1 Virtual Direction Routing for Overlay Networks Bow-Nan Cheng Murat Yuksel Shivkumar Kalyanaraman.
Roger ZimmermannCOMPSAC 2004, September 30 Spatial Data Query Support in Peer-to-Peer Systems Roger Zimmermann, Wei-Shinn Ku, and Haojun Wang Computer.
Multi-level Hashing for Peer-to-Peer System in Wireless Ad Hoc Environment Dewan Tanvir Ahmed and Shervin Shirmohammadi Distributed & Collaborative Virtual.
IEEE P2P, Aachen, Germany, September Ad-hoc Limited Scale-Free Models for Unstructured Peer-to-Peer Networks Hasan Guclu
2 Introduction: phase transition phenomena Phase transition: qualitative change as a parameter crosses threshold Matter temperature magnetism demagnetism.
Hongyu Gong, Lutian Zhao, Kainan Wang, Weijie Wu, Xinbing Wang
Profiles and Multi-Topology Routing in Highly Heterogeneous Ad Hoc Networks Audun Fosselie Hansen Tarik Cicic Paal Engelstad Audun Fosselie Hansen – Poster,
Hop-limited flooding over dynamic networks M. Vojnović and A. Proutiere Microsoft Research IEEE Infocom 2011, Shanghai, April 2011.
Stochastic sleep scheduling (SSS) for large scale wireless sensor networks Yaxiong Zhao Jie Wu Computer and Information Sciences Temple University.
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
MapReduce and Graph Data Chapter 5 Based on slides from Jimmy Lin’s lecture slides ( (licensed.
1 BitHoc: BitTorrent for wireless ad hoc networks Jointly with: Chadi Barakat Jayeoung Choi Anwar Al Hamra Thierry Turletti EPI PLANETE 28/02/2008 MAESTRO/PLANETE.
IEEE Globecom 2010 Tan Le Yong Liu Department of Electrical and Computer Engineering Polytechnic Institute of NYU Opportunistic Overlay Multicast in Wireless.
CCAN: Cache-based CAN Using the Small World Model Shanghai Jiaotong University Internet Computing R&D Center.
Fault-Tolerant Papers Broadband Network & Mobile Communication Lab Course: Computer Fault-Tolerant Speaker: 邱朝螢 Date: 2004/4/20.
Many random walks are faster than one Noga AlonTel Aviv University Chen AvinBen Gurion University Michal KouckyCzech Academy of Sciences Gady KozmaWeizmann.
Doc.: IEEE /1047r0 Submission Month 2000August 2004 Avinash Joshi, Vann Hasty, Michael Bahr.Slide 1 Routing Protocols for MANET Avinash Joshi,
Rendezvous Regions: A Scalable Architecture for Service Location and Data-Centric Storage in Large-Scale Wireless Sensor Networks Karim Seada, Ahmed Helmy.
Stefan Rührup 1 HEINZ NIXDORF INSTITUTE University of Paderborn, Germany Algorithms and Complexity Competitive Time and Traffic Analysis of Position-based.
Eclipse Attacks on Overlay Networks: Threats and Defenses By Atul Singh, et. al Presented by Samuel Petreski March 31, 2009.
BARD / April BARD: Bayesian-Assisted Resource Discovery Fred Stann (USC/ISI) Joint Work With John Heidemann (USC/ISI) April 9, 2004.
1 TBD: Trajectory-Based Data Forwarding for Light-Traffic Vehicular Networks IEEE ICDCS’09, Montreal, Quebec, Canada Jaehoon Jeong, Shuo Gu, Yu Gu, Tian.
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
LightFlood: An Efficient Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
P2p, Fall 06 1 Topics in Database Systems: Data Management in Peer-to-Peer Systems Search in Unstructured P2p.
Nour KADI, Khaldoun Al AGHA 21 st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications 1.
Ching-Ju Lin Institute of Networking and Multimedia NTU
Computer Science 1 Using Clustering Information for Sensor Network Localization Haowen Chan, Mark Luk, and Adrian Perrig Carnegie Mellon University
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
A Simulation-Based Study of Overlay Routing Performance CS 268 Course Project Andrey Ermolinskiy, Hovig Bayandorian, Daniel Chen.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
School of Electrical Engineering &Telecommunications UNSW Cost-effective Broadcast for Fully Decentralized Peer-to-peer Networks Marius Portmann & Aruna.
Mobility Increases the Connectivity of K-hop Clustered Wireless Networks Qingsi Wang, Xinbing Wang and Xiaojun Lin.
SERENA: SchEduling RoutEr Nodes Activity in wireless ad hoc and sensor networks Pascale Minet and Saoucene Mahfoudh INRIA, Rocquencourt Le Chesnay.
The Multi-agent System for Dynamic Network Routing Ryokichi Onishi The Univ. of Tokyo, Japan.
1 “Hybrid Search Schemes for Unstructured Peer- to-Peer Networks” “Random Walks in Peer-to-Peer Networks” Christos Gkantsidis, Milena Mihail, Amin Saberi.
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications * CS587x Lecture Department of Computer Science Iowa State University *I. Stoica,
Virtual Direction Routing
On Growth of Limited Scale-free Overlay Network Topologies
Professor Arne Thesen, University of Wisconsin-Madison
GIA: Making Gnutella-like P2P Systems Scalable
Exploring Energy-Latency Tradeoffs for Sensor Network Broadcasts
Presentation transcript:

Gerhard Haßlinger Search Methods in Dynamic Wireless Networks  Challenges for search in wireless networks  Random walks and flooding for search with partial info.  Evaluation using transient analysis and bounds Efficiency of search methods in dynamic wireless networks Gerhard Haßlinger, T-Systems, Germany, Thomas Kunz, Carleton University, Ottawa, Canada,

Gerhard Haßlinger Search Methods in Dynamic Wireless Networks Traffic Rate Experience with wireless routing: Inaccuracy of node state info. for OLSR routing (RFC 3626) OLSR information enhanced by probing

Gerhard Haßlinger Search Methods in Dynamic Wireless Networks No full support for routing and search can be given in  Wireless and mobile networks  Sensor networks  Overlay, peer-to-peer networks Advantage: More flexibility to set up and expand networks, less overhead in managing networks with high churn Disadvantage: More expensive search by exploration of the network The Internet itself exhibits unstructured growth and churn, but  the IETF (Cisco, Juniper...) established reliable routing and  search engines (Google, Yahoo, … ) provide content exploration  New IETF WG on “ Routing for low power & lossy Networks ” Challenges for search in wireless networks

Gerhard Haßlinger Search Methods in Dynamic Wireless Networks Network exploration by flooding & random walks  Flooding is exhaustive for all neighbors up to a distance d or time to live (TTL); Parallel search; large amount of messages spread in all directions  Random walks follow some probabilistic winding route

Gerhard Haßlinger Search Methods in Dynamic Wireless Networks  Control of message overhead for flooding is difficult: Unknown network coverage as a function of the distance d Coverage may rise e.g. from 3% to 30% in one step d  d + 1  A random walk of predefined length L has fixed expense Randoms walks can proceed in parallel, with forking or can be enhanced by flooding with small d from some points  Many ways to combine random walks & flooding schemes (see Gkantsidis et al., IEEE Infocom 2004 & ’05) Network coverage is partial, but random walk searches are efficient e.g. for replicated data in P2P networks Random network growth is also efficiently supported by r. walks Network exploration by flooding & random walks

Gerhard Haßlinger Search Methods in Dynamic Wireless Networks Transient analysis of basic random walks Performance studies on random walks prefer simulation, although transient analysis offers a simple and scalable alternative Bounds e.g. based on second largest eigenvalue of the transition matrix prove convergence but often are not tight Performance criteria: Number of steps required - to reach a target node - or for network coverage with predefined probability (e.g. 99%) Transient analysis - computes the probability distribution for the random walks’ sojourn node step by step - starting from a node or an arbitrary initial distribution

Gerhard Haßlinger Search Methods in Dynamic Wireless Networks Basic transient analysis of a random walks An absorbing state („black hole“) is introduced at a considered network node  The probability to enter the absorbing state from some starting conditions, e.g. from steady state, equals the probability to discover the network node during the random walk For networks with heterogeneous nodes, coverage can be studied depending on different types or degrees of nodes

Gerhard Haßlinger Search Methods in Dynamic Wireless Networks Example of a transient random walk analysis Absorbing state: Modified graph for considering a target 1. hop... Start 2. hop 12. hop: 10.11%  10% 14.89%  15% 20.23%  20%

Gerhard Haßlinger Search Methods in Dynamic Wireless Networks Performance Results for random walk & flooding Random walks: Number of hops required for 90% and 99% success for different levels of available routing info and for different distances to destination (up to 20 hops on a grid diagonal)

Gerhard Haßlinger Search Methods in Dynamic Wireless Networks Extensions of the transient analysis for random walks The following cases are tractable by extended analysis: - Several random walks in parallel  product formula for the probability that independent trials miss a node - Random walk without step back (except for nodes of degree 1)  increased state space for analysis: network edges instead of nodes, but the run time complexity is unchanged - Random walk followed by flooding on distance d after the last step  extend absorbing state to the set of all neighbors up to distance d - Random walk search for replicated data on n nodes  use a set of n absorbing states or assume a binomial distributed hit count based on single node search

Gerhard Haßlinger Search Methods in Dynamic Wireless Networks  m : Distance to the destination after m random walk steps (with changes)  m has a binomial distribution: for unrestricted range of distances in both directions with mean E(  m ) =  –  m (q  –p)/(q  +p); variance  2 (  m ) = mpq/(q  +p) if m(q  –p)/(q  +p) >  E(  m ) 50% Start pq D: S:  pq Destination Convergence bound for biased random walks D:0 S:    Example: 2-dim. Grid

Gerhard Haßlinger Search Methods in Dynamic Wireless Networks Bound (thin lines) compared to transient analysis

Gerhard Haßlinger Search Methods in Dynamic Wireless Networks Conclusions  Random walks are useful for search and routing in networks with unreliable or incomplete information on target nodes  Random walks outperform flooding for large hop distances  Many options for combining routing, flooding & random walks for improved performance in different scenarios  Transient analysis yields accurate evaluation of random walks - for the basic case and many variants - is scalable for networks of large size - bounds can be given on convergence behaviour