bits_lec 15_11_oct
TRANSCRIPT
-
8/16/2019 BITS_Lec 15_11_Oct
1/36
BITS PilaniPilani Campus
Advanced Computer
Networks (CS ZG525)Virendra S Shekhawat
Department of Computer Science and Information Systems
-
8/16/2019 BITS_Lec 15_11_Oct
2/36
BITS PilaniPilani Campus
First Semester 2015-2016Lecture-15 [11th Oct 2015]
-
8/16/2019 BITS_Lec 15_11_Oct
3/36
BITS Pilani, Pilani CampusFirst Sem 2015-16
Agenda
• Routing in DTNs: Taxonomy and Design [CH-27]
– Reading
• Routing in Delay Tolerant Networks by Sushant Jain, 2004
• conferences.sigcomm.org/sigcomm/2004/papers/p299-jain111111.pdf
• Replication Based Routing Protocols for DTNs [CH-28]
– Reading
• Routing in Delay/Disruption Tolerant Networks: A taxonomy, Survey andChallenges by Yue Cao, 2012
• ukchinab4g.ac.uk/sites/default/files/5_Achievements/journal/routing_de
lay.pdf
3Advanced Computer Networks CS ZG525
-
8/16/2019 BITS_Lec 15_11_Oct
4/36
BITS Pilani, Pilani CampusFirst Sem 2015-16
Routing Taxonomy
Advanced Computer Networks CS ZG525
4
-
8/16/2019 BITS_Lec 15_11_Oct
5/36
BITS Pilani, Pilani CampusFirst Sem 2015-16
DTN Routing Taxonomy
• Random Routing – Epidemic
– Two Hop Routing
–
Spray and Wait• Prediction based Routing
– Based on past encounter statistics
• ProPhet Routing, MaxProp, RAPID
• Coding based Routing
– Source Coding
– Network Coding
Advanced Computer Networks CS ZG525
5
-
8/16/2019 BITS_Lec 15_11_Oct
6/36
BITS Pilani, Pilani CampusFirst Sem 2015-16
Opportunistic Routing
• Graph is disconnected and/or time-varying
• Set of contacts C: unknown
•
Set of nodes V: often unknown too• Basic Principle
– When two nodes meet one another, they must
decide whether to forward a message, and/or to
carry it further
– Store-and-forward Store-carry-and forward
Advanced Computer Networks CS ZG525
6
-
8/16/2019 BITS_Lec 15_11_Oct
7/36BITS Pilani, Pilani CampusFirst Sem 2015-16
Why different routing
protocols…?
• Traditional routing protocols do not work well inenvironments prone to frequent and long liveddisruptions
• Basic assumptions used in these are
– Almost always connected network
– End to end path is exists between two end points
• How DTN environment is different
– Path may never be available between end points – Store-carry-forward A set of independent
opportunistic forwarding decisions will attempt toeventually deliver messages to destinations
Advanced Computer Networks CS ZG525
7
-
8/16/2019 BITS_Lec 15_11_Oct
8/36BITS Pilani, Pilani CampusFirst Sem 2015-16
Basic Primitives of
Opportunistic Routing
• Message Replication
– Greedy Replication
– Controlled Replication
–Utility based Replication
• Message Forwarding
– Based on absolute utility criterion
– Based on relative utility criterion
• Message Coding
– Source Coding
– Network Coding
Advanced Computer Networks CS ZG525
8
-
8/16/2019 BITS_Lec 15_11_Oct
9/36BITS Pilani, Pilani CampusFirst Sem 2015-16
Routing Objectives or Metrics
• Delivery Ratio: It is given by the ratio between thenumber of delivered messages and the number of
generated messages.
• Overhead Ratio: It is given by the ratio between the
number of message transmissions required for delivery
and the total number of messages delivered.
• Delivery Delay: It is given by the time duration between
the messages generation and their delivery.
Advanced Computer Networks CS ZG525
9
-
8/16/2019 BITS_Lec 15_11_Oct
10/36BITS Pilani, Pilani CampusFirst Sem 2015-16
Message Replication[1]
• Message Replication- A relay X carrying a copy of msg m can decide to spawn a new copy of m and forward it to
the newly encountered node, Y
1. If the new neighbor does not have a copy of this msg
2. If node have buffer space available
3. If the “context” of the two nodes allows
• Greedy Replication- A node decides to forward a msg m
based on 1 and 2 only• e.g. Epidemic routing
• + Minimum average message delay
• - Consuming maximum network resources
Advanced Computer Networks CS ZG525
10
-
8/16/2019 BITS_Lec 15_11_Oct
11/36BITS Pilani, Pilani CampusFirst Sem 2015-16
Epidemic Routing[1]
•
Give a message copy to every node encountered – essentially: flooding in a disconnected context
A
C
B
D
D
EF
D
D
D
D
Advanced Computer Networks CS ZG525
11
-
8/16/2019 BITS_Lec 15_11_Oct
12/36BITS Pilani, Pilani CampusFirst Sem 2015-16
Epidemic Routing[2]
• How many transmissions (per message)?
– At least N
– All nodes receive the message
• What is the delay?
– Minimum among all possible routing schemes
– If NO resource constraints (bandwidth, buffer space)
Advanced Computer Networks CS ZG52512
-
8/16/2019 BITS_Lec 15_11_Oct
13/36BITS Pilani, Pilani CampusFirst Sem 2015-16
Message Replication [2]
• Controlled Replication- A node decides to forward amsg m based on all three conditions (i.e. 1,2 and 3shown in slide no. 8)
– “Context” keeps track on the number of copies to be created
– Copy-limited replication: each msg copy generated isaccompanied by a number of forwarding tokens (e.g. spray &wait)
– Time-limited replication: each new message generated (say attime Ts) may be further replicated to nodes (other than thedestination) only for an amount of time Trep
– Probability-limited replication: a node decides to forward acopy of a msg to any node it encounters with a specificprobability, P
Advanced Computer Networks CS ZG52513
-
8/16/2019 BITS_Lec 15_11_Oct
14/36BITS Pilani, Pilani CampusFirst Sem 2015-16
Reducing the Overhead of
Epidemic
Randomized Flooding (“Gossiping”)
• Give message to neighbor with a probability p ≤ 1
• p = 1) epidemic
•
p = 0) direct transmission+ Fewer transmissions
- For long duration, transmissions = O(N)
Other flooding-based variants:
• Each node forward up to Kmax times
• Self-limiting epidemic (SLEF)
Advanced Computer Networks CS ZG52514
-
8/16/2019 BITS_Lec 15_11_Oct
15/36BITS Pilani, Pilani CampusFirst Sem 2015-16
2-hop Scheme: Version 1
• When message created at source
– Forward to destination if within range
– Forward to a neighbor relay if destination not in range
• Relay: forward only to destination
• Transmissions per message
– At most 2
• Delay?
– Finite if each node meets every other node…eventually
Advanced Computer Networks CS ZG52515
-
8/16/2019 BITS_Lec 15_11_Oct
16/36BITS Pilani, Pilani CampusFirst Sem 2015-16
2-hop Scheme: Version 2
•
Source gives a copy to any relay encountered• Relays can only give copy to destination
Src
C
B
Dst
D
EF
D
D
D
Relay C cannot FWD to B
Relay C can FWD to Dst
Avg Transmissions per msg = (N-1)/2
Advanced Computer Networks CS ZG52516
-
8/16/2019 BITS_Lec 15_11_Oct
17/36BITS Pilani, Pilani CampusFirst Sem 2015-16
Spray and Wait (Binary
Spraying)
•Use forwarding tokens; SRC starts with L tokens
• When L = 1, can only forward to DST
Src
C
B
Dst
D
EF
D
D
D
DL = 4
L = 2
L = 2
L = 1
L = 1
L = 1L = 1
Advanced Computer Networks CS ZG52517
-
8/16/2019 BITS_Lec 15_11_Oct
18/36BITS Pilani, Pilani CampusFirst Sem 2015-16
Spray & Wait: Analysis
• L (e.g. L = 10) copies might be – Too little if number of nodes M is large (e.g. 10000) =>
almost 2-hop.v1
– Too many if number of nodes M small (e.g. 20) => almost
epidemic
• Analytical equation for S&W delay as a function of L/M – Choose desired L (tradeoff delay vs. transmissions)
• What if number of nodes is unknown? – Estimate number of nodes online
Advanced Computer Networks CS ZG52518
-
8/16/2019 BITS_Lec 15_11_Oct
19/36BITS Pilani, Pilani CampusFirst Sem 2015-16
Message Replication[3]
• Utility based replication- the forwarding decisiondepends on the “context” of the current custodian and
that of the candidate relay node
– Uncontrolled utility based replication: e.g. A node forwards a
new copy to a new neighbor only if the neighbor has a high
enough probability of the future encounter with the
destination (used to improve epidemic routing)
– Controlled utility based replication: e.g. Number of replicas of
a message delivered to a relay node can be decided based
upon the ratio of encounter value that the relay advertises
Advanced Computer Networks CS ZG52519
-
8/16/2019 BITS_Lec 15_11_Oct
20/36BITS Pilani, Pilani CampusFirst Sem 2015-16
Utility Functions
• Destination Dependent – Age of last encounter
– History of past encounters
– Pattern of location visited
– Social networks – Traditional Routing Table Entry
• Destination Independent
– Amount of mobility
– Node resources
– Cooperative behavior
– Trustworthiness
Advanced Computer Networks CS ZG52520
-
8/16/2019 BITS_Lec 15_11_Oct
21/36BITS Pilani, Pilani CampusFirst Sem 2015-16
Prophet Routing
• Like Epidemic routing, but maintains a probability ofdelivery for each node pair p(i,D)
• Node i copies message to j only if p(j,D) > p(i,D)
• Algorithm:
i D
p(i,D) = 1
Contact with Dest D
i
D
p(i,D) * γt, (γ < 1)
No Contact with Dest D
Per Hop Probability
Contact with j
i
D
p(i,D) = f(p(i,D),p(j,D))
j
Path Probability
Advanced Computer Networks CS ZG52521
-
8/16/2019 BITS_Lec 15_11_Oct
22/36
BITS Pilani, Pilani CampusFirst Sem 2015-1622
Past Encounters: Encounter
Frequency
• Last encounter not necessarily representative• Consider:
– Node A meets D every 10min, last saw D before 5min
– Node B meets D every 1h, last saw D before 1min
• Use frequency: p(i,D) = # encounters(i,D) / Timewindow• Consider
– Node A meets D every 10min, for 1sec each time
– Node B meets D every 20min, for 2min each time
• Use total contact duration: p(i,D) = Timeconnected / Timewindow•
Consider – Node A meets D every 10 min
– Node B meets D in bursts: average = 10min, average during burst =1min, last meeting before 30sec
Prediction Becomes Complex!Advanced Computer Networks CS ZG525
-
8/16/2019 BITS_Lec 15_11_Oct
23/36
BITS Pilani, Pilani CampusFirst Sem 2015-16
Message Forwarding
• By message forwarding, a node relinquishes its copyof msg and ceases to be one of its custodians
– Forwarding can be done based on a utility function or in
a probabilistic manner – If a node i carrying a msg copy for a destination d
encounters a node j with no copy of the msg then
• U j(d) >Uth (Absolute utility criterion)
•U j(d) > Ui(d) (Relative utility criterion)
• e.g. If utility function is lower than a certain threshold, nodes
with highest mobility to move farthest in the network are
chosen as relays
Advanced Computer Networks CS ZG52523
-
8/16/2019 BITS_Lec 15_11_Oct
24/36
BITS Pilani, Pilani CampusFirst Sem 2015-16
Message Coding
• Message can be coded at the source (aka source coding)or in the network (aka network coding)
•
Source coding- Increases delivery reliability andreducing worst case delay
• Network Coding-A way to increase the capacity of the
wireless networks
Advanced Computer Networks CS ZG52524
-
8/16/2019 BITS_Lec 15_11_Oct
25/36
BITS Pilani, Pilani CampusFirst Sem 2015-16
Reducing the overhead of
epidemic: Network Coding[1]
• Coding may combine one or more packets
x1
x2
x3
Outgoing links
Incoming links x1
x2
x3
Store-and-forward
x1
x2
x3
25Advanced Computer Networks CS ZG525
R d i th h d f
-
8/16/2019 BITS_Lec 15_11_Oct
26/36
BITS Pilani, Pilani CampusFirst Sem 2015-16
Reducing the overhead of
epidemic: Network Coding[2]
• Coding may combine one or more packets
Outgoing links
Incoming links x1
x2
x3
Network Coding
f(x1,x2,x3)
Advanced Computer Networks CS ZG52526
-
8/16/2019 BITS_Lec 15_11_Oct
27/36
BITS Pilani, Pilani CampusFirst Sem 2015-16 Advanced Computer Networks CS ZG52527
Coding Packets: A simple
example
• XOR: The simplest combination:2 1 2 1
x x ) x ,f(x
1 0 1 1msg x1:
0 1 1 0msg x2:
1 1 0 1f(x1,x2):
-
8/16/2019 BITS_Lec 15_11_Oct
28/36
BITS Pilani, Pilani CampusFirst Sem 2015-16 Advanced Computer Networks CS ZG52528
Coding Packets: A simple
example
• XOR: The simplest combination:2 1 2 1
x x ) x ,f(x
1 0 1 1msg x1:
0 1 1 0msg x2:
1 1 0 1f(x1,x2):
-
8/16/2019 BITS_Lec 15_11_Oct
29/36
BITS Pilani, Pilani CampusFirst Sem 2015-16 Advanced Computer Networks CS ZG52529
De-coding Packets: A simple
example
• Assume node that send x1 receives the coded packet f(x1,x2)
1 0 1 1msg x1:
0 1 1 0msg x2:
1 1 0 1f(x1,x2):
-
8/16/2019 BITS_Lec 15_11_Oct
30/36
BITS Pilani, Pilani CampusFirst Sem 2015-16
Network Coding for Wireless
• Broadcast nature of medium: natural ground
for network coding
A BC
B x1 A x2B x1
A x2 B x1A x2
No coding: delay = 4 Advanced Computer Networks CS ZG525 30
-
8/16/2019 BITS_Lec 15_11_Oct
31/36
BITS Pilani, Pilani CampusFirst Sem 2015-16
Network Coding for Wireless
• Broadcast nature of medium: natural ground
for network coding
A BC
B x1 A x2B x1
A x2
Coding: delay = 3
21 xx
21 xx 21 xx
Advanced Computer Networks CS ZG52531
-
8/16/2019 BITS_Lec 15_11_Oct
32/36
BITS Pilani, Pilani CampusFirst Sem 2015-16
MAXPROP (1/2)
• Motivated by pedestrian mobility and city vehicles (busses)• Addressed resources issues considering vehicles
– Bulky equipment
– energy
• Maintains ordered destination based queues – Ordered by the estimated likelihood of a future transitive path to that
destination
• Assumes
–
Unlimited buffer for own messages per node – Fixed size buffer for relaying messages
– No topology knowledge/control
32Advanced Computer Networks CS ZG525
-
8/16/2019 BITS_Lec 15_11_Oct
33/36
BITS Pilani, Pilani CampusFirst Sem 2015-16
MAXPROP (2/2)
• Communication steps (flooding-based!):
1. Neighbor Discovery
(no knowledge of when the next opportunity to communicate will be)
2. Data Transfer
a) Transfer packets destined for neighbor peer
b) Transfer routing information
c) Acknowledge any delivered data
d) Prioritize “young” relayed packets (with lower hop counts)
e) Send un-transmitted packets by estimated delivery likelihood
f) Ensure only new packets are sent
3. Storage Management
(expunge packets to accommodate the relay buffers)
33Advanced Computer Networks CS ZG525
-
8/16/2019 BITS_Lec 15_11_Oct
34/36
BITS Pilani, Pilani CampusFirst Sem 2015-16
RAPID Protocol
• RAPID: Resource Allocation Protocol for Intentional DTNRouting
• Goal: Intentionally affect a single routing metric (e.g.
average delay, missed deadlines, and maximum delay)
• Method: Utility function (Ui) based replication(Ui is
defined as expected contribution of packet i to this
metric)
• Average Delay Optimization: Ui = - D(i) – The protocol replicates the packet that results in the greatest
decrease in delay among all packets in its buffer
Advanced Computer Networks CS ZG52534
-
8/16/2019 BITS_Lec 15_11_Oct
35/36
BITS Pilani, Pilani CampusFirst Sem 2015-16
Challenges and Open Issues
• Need for a framework to compare various routingapproaches
• Congestion control in DTNs
•
Prediction based approaches still needs to beinvestigated more
• Multicasting and any-casting in DTNs is still untouched
• Capturing mobility characteristics and topology control
is the biggest challenges so far
Advanced Computer Networks CS ZG52535
-
8/16/2019 BITS_Lec 15_11_Oct
36/36
Thank You !
36