Adapting Distributed Hash Tables for Mobile Ad Hoc Networks



Similar documents
8 Conclusion and Future Work

Security in Structured P2P Systems

Peer-to-Peer Networks. Chapter 6: P2P Content Distribution

RVS-Seminar Overlay Multicast Quality of Service and Content Addressable Network (CAN)

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

Definition. A Historical Example

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)

Unit 3 - Advanced Internet Architectures

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November ISSN

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Wireless Sensor Networks Chapter 3: Network architecture

Security for Ad Hoc Networks. Hang Zhao

Hosts Address Auto Configuration for Mobile Ad Hoc Networks

Attacks Against Peer-to-peer Networks and Countermeasures

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks

RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

Experimental Comparison of Routing and Middleware Solutions for Mobile Ad Hoc Networks: Legacy vs Cross-Layer Approach

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Scalable Source Routing

Bandwidth Management Framework for Multicasting in Wireless Mesh Networks

Chord - A Distributed Hash Table

A Catechistic Method for Traffic Pattern Discovery in MANET

Figure 1. The Example of ZigBee AODV Algorithm

Hybrid Overlay Multicast Framework draft-irtf-sam-hybrid-overlay-framework-01.txt. John Buford, Avaya Labs Research

DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks

Calto: A Self Sufficient Presence System for Autonomous Networks

Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

A Peer-to-Peer File Sharing System for Wireless Ad-Hoc Networks

Networking Systems (10102)

Evaluating Load Balancing in Peer-to-Peer Resource Sharing Algorithms for Wireless Mesh Networks

Architectures and protocols in Peer-to-Peer networks

A distributed system is defined as

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

Internetworking and Internet-1. Global Addresses

CS5412: TIER 2 OVERLAYS

Comparison of WCA with AODV and WCA with ACO using clustering algorithm

Internetworking. Problem: There is more than one network (heterogeneity & scale)

Dynamic Source Routing in Ad Hoc Wireless Networks

Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam

Broadband Networks. Prof. Karandikar. Department of Electrical Engineering. Indian Institute of Technology, Bombay. Lecture - 26

An Introduction to Peer-to-Peer Networks

Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach

LIST OF FIGURES. Figure No. Caption Page No.

OSPF Version 2 (RFC 2328) Describes Autonomous Systems (AS) topology. Propagated by flooding: Link State Advertisements (LSAs).

How To Create A P2P Network

White paper. Reliable and Scalable TETRA networks

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin,

Distributed Computing over Communication Networks: Topology. (with an excursion to P2P)

Tactical Service Bus: The flexibility of service oriented architectures in constrained theater environments

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

Monitoring within an Autonomic Network: A. Framework

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks

Ring Protection: Wrapping vs. Steering

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

PSON: A Scalable Peer-to-Peer File Sharing System Supporting Complex Queries

TOPOLOGIES NETWORK SECURITY SERVICES

Scalable Internet Services and Load Balancing

Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks

HPAM: Hybrid Protocol for Application Level Multicast. Yeo Chai Kiat

A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2

P2P: centralized directory (Napster s Approach)

Designing a Voice over IP Network. Chapter 9

How To Make A Network Overlay More Efficient

Optimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India

query enabled P2P networks Park, Byunggyu

How To Write A Transport Layer Protocol For Wireless Networks

A SURVEY OF P2P OVERLAYS IN VARIOUS NETWORKS

Multicasting in Mobile Ad-Hoc Networks: Achieving High Packet Delivery Ratios

Security Design.

A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS

PEER TO PEER FILE SHARING USING NETWORK CODING

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM

Top-Down Network Design

Location-Aided Routing (LAR) in mobile ad hoc networks

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)

Transcription:

University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and Distributed Systems Group Wilhelm-Schickard-Institute for Computer Science University of Tübingen Mobile P2P 06, Pisa 1

Mobile Ad Hoc Networks and DHTs? Scenarios for large MANETs Disaster scenario / emergency response teams Campus scenario / loosely organized groups Mass events / police squads Military use / troops No central components available Full decentralization Basic demand for managing and exchanging data Mobile P2P 06, Pisa 2

Distributed Hash Tables for Ad Hoc Networks? DHTs are know to be Fully decentralized Scalable Fault tolerant More rigidly constrained than unstructured P2P relationships between Relationship between Nodes (constrains connections) Relationship between Nodes and data items (constrains data location) Higher maintenance cost MANETs are challenging environments for DHTs Mobile P2P 06, Pisa 3

Overview Differences MANET vs. Internet Overlay-level adaptations Node-level adaptations Routing-level adaptations Conclusions Mobile P2P 06, Pisa 4

MANETs vs. Internet from a DHTs point of view Mobile P2P 06, Pisa 5

Assumptions made by conventional DHTs Assumptions made by conventional DHT approaches Stable network Long lasting connections Stationary peers Relatively high bandwidth Hierarchical structure efficient underlay routing Efficient connection establishment Dedicated routers These assumptions can not be made in mobile ad hoc networks! Mobile P2P 06, Pisa 6

Structural Differences: Ad-Hoc Networks vs. Internet No global connectivity but local domains Network splits, mergers, no central services Heterogeneous networks Unreliable nodes and unreliable links Changing network characteristics Unpredictable router behavior Underlay characteristics Expensive connections, high initial cost & delay, scarce resources Mobile P2P 06, Pisa 7

Overlay-level Adaptations Mobile P2P 06, Pisa 8

How can you find a DHT in a MANET? Problems No global connectivity No rendezvous points or IP caches DHT discovery necessary Possible solution: restricted flooding Efficient Identify close DHT nodes Multiple DHTS can be discovered Decide which DHT to join (size, connectivity) Mobile P2P 06, Pisa 9

How robust are DHTs in MANETs? MANET splits up DHT view: many nodes fail simultaneously How robust must a DHT be? Robustness via redundancy 300 nodes, 2 equally sized parts 6 successors: 90% failure prob. 12 successors: 4% failure prob. Redundancy is expensive Maintenance Path finding Copying of item backups Redundancy limits the scalability of the system Mobile P2P 06, Pisa 10

How robust are DHTs in MANETs? MANET splits up DHT view: many nodes fail simultaneously How robust must a DHT be? Robustness via redundancy 300 nodes, 2 equally sized parts 6 successors: 90% failure prob. 12 successors: 4% failure prob. Redundancy is expensive Maintenance Path finding Copying of item backups Redundancy limits the scalability of the system Mobile P2P 06, Pisa 11

Underlying networks can merge Multiple DHTs in one MANET All data items should be accessible over the DHT Data items are stored in one of the DHTs Merge DHTs Many data items have to be moved Topological changes Costly Communication between two DHTs Decreased performance Further splits lead to fragmented DHTs Mobile P2P 06, Pisa 12

Underlying networks can merge Multiple DHTs in one MANET All data items should be accessible over the DHT Data items are stored in one of the DHTs Communication between two DHTs Decreased performance Further splits lead to fragmented DHTs Merge DHTs Many data items have to be moved Topological changes Costly Mobile P2P 06, Pisa 13

Underlying networks can merge Multiple DHTs in one MANET All data items should be accessible over the DHT Data items are stored in one of the DHTs Communication between two DHTs Decreased performance Further splits lead to fragmented DHTs Merge DHTs Many data items have to be moved Topological changes Costly Mobile P2P 06, Pisa 14

Simple merging scheme Goals: Move as few items as possible Establish as few new connections as possible! Different DHT topologies require different merging schemes Solution: Keep the identifiers of each node Keep flexible links (e.g. fingers in Chord) Adjust constrained links (e.g. ring connections in Chord) Move nodes from the smaller to the bigger DHT Mobile P2P 06, Pisa 15

Merging scheme performance 7,5 7,5 7 7 6,5 6,5 6 6 Hops 5,5 5 4,5 50% 40% 20% One ring Hops 5,5 5 4,5 50% 40% 20% One ring 4 4 3,5 3,5 3 0 1000 2000 3000 4000 5000 Nodes 3 0 1000 2000 3000 4000 5000 Nodes One successor per node Four successors per node Mobile P2P 06, Pisa 16

Node-level Adaptations Mobile P2P 06, Pisa 17

Weak or unreliable nodes Nodes can be disconnected from the network The node is still operational Temporary disconnections Recovery mechanisms cause overhead Recovery is unnecessary if node reenters the MANET Possible solutions: Delay maintenance operations Backup nodes (neighbors) perform the tasks for absent nodes Build DHT of reliable subset of nodes (node ranking) Increased robustness and fewer maintenance operations Mobile P2P 06, Pisa 18

Weak links Unreliable underlay links Weak, short lived, only temporary available Using these links for a DHT is costly (recovery) Solution: Force network splits Identify and tag weak and unreliable links Indicators: link lifetime, signal strength, node properties Don t use these links for DHT traffic Requires: traffic classification on routing level (DHT control traffic) Requires: classification of route finding requests (DHT induced requests) Virtual partitioning into reliable sub networks! But: not all data items are accessible Mobile P2P 06, Pisa 19

Routing-layer Adaptations Mobile P2P 06, Pisa 20

Routing topologies MANETs and DHTs are routing topologies Similar or duplicate functionality ID propagation Neighbor discovery Failure detection Routing Both routing instances are unaware of each other Cross layer modifications Mobile P2P 06, Pisa 21

Cross-layer optimizations Use the underlay to propagate DHT IDs Information about close DHT nodes Additional DHT routing information for free Use multicast for maintenance messages Efficient message delivery! BUT: numerous multicast groups Applicability depends on the choice of the underlying MANET protocol DHT aware underlay routing DHT nodes are MANET routers Each forwarding node has DHT routing information Use DHT information to relay packets Shorter overlay paths Mobile P2P 06, Pisa 22

Conclusions Problematic combination of two dynamic routing layers Affects overlay, node, and routing levels Solutions must address all levels Mobile P2P 06, Pisa 23

Thank you for your attention. Questions? Mobile P2P 06, Pisa 24