Lecture 10 Overview

advertisement
Lecture 10 Overview
!
Last Lecture
!
!
!
Datacenter networking
This Lecture
!
Mobile opportunistic networks
!
Vehicular ad hoc networks
!
Source: lecture note
Next Lecture
!
LiFi networks
!
Network on chips
Motivations
!
Popularity of mobile computing devices
Motivations
!
Wireless is everywhere.
Motivations
!
Storage is cheap and vast.
Network Connectivity
!
Expectation from end users
! Anywhere
! Anytime
! Any device
!
Current situations
! Access internet through cellular data network
is still not cheap
! WiFi networks have limited coverage
Mobile Opportunistic Networks
!
!
!
Assumptions of TCP/IP are violated
! Limited end-to-end connectivity due to
mobility, power saving or unreliable links
Explore the advantages of short range
communication techniques
! Bluetooth
! WiFi/LiFi
“Store and forward” does not work
! Store – carry – forward
How does DTN work?
Traditional Routing
Store and Forward
Data
S
D
How does DTN work?
Data
Store –Carry- Forward
D
Data
S
Data
R
Features of mobile opportunistic networks
!
High Latency & Low Data Rate
!
!
!
Disconnection
!
!
Hours or days
Short Range Contact
!
!
Mobility & low duty-cycle
Long Queuing Time
!
!
Long propagation delay
Asymmetric data rates
Only one-hop communication is guaranteed.
Dynamic Network Topology
!
Different types of user behavior will result in dramatically
different network conditions.
Applications
!
Vehicular Networks - “Drive-Thru Internet” (2)
Internet
email reply
email reply
!
!
!
10
send email
send email
write email
Asynchronous operation: OK for e-mail!
Web caching; Local information; download news
Enough bandwidth even at high speeds!
Applications
Internet to Remote Communities
!
!
!
Email, cached/asynchronous services
Use: Village bus, postman’s vehicle, passing cars
!
!
11
Equip with radio, antenna, and storage
Use: dial-up, satellite, microwave links when available
Applications
!
Mobile Social Network Service
!
!
!
!
!
12
Smart phones
Tablets
PDAs
Laptops
…
Applications
!
Mobile data offloading
13
Routing Protocol Classification
!
Flooding-based protocols
!
!
!
Forwarding-based protocols
!
!
!
!
Forward a copy of each encountered node
Largest delivery rate assuming no storage constraint
Packets never replicate
Less wasteful of network resources
Low delivery rate
Replication-based protocols
!
!
!
Nodes propagate packet replications
Consume more network resources
High delivery rate
Epidemic Routing
!
Give a message copy to every node encountered
!
essentially: flooding in a disconnected context
D
F
E
D
B
D
D
A
D
D
C
Epidemic Routing: Message Vectors
!
Node A encounters node B
Message Vector of A
Dest ID
Seq. Num.
D
0
G
F
Message Vector of B
Dest ID
Seq. Num.
D
0
1
E
0
0
F
0
F
1
(G,1)
(E,0),(F,1)
16
Epidemic Routing: Message Vectors
!
After message exchange
Message Vector of A
Message Vector of B
Dest ID
Seq. Num.
Dest ID
Seq. Num.
D
0
D
0
E
0
E
0
F
0
F
0
F
1
F
1
G
1
G
1
17
Epidemic Routing Performance
!
How many transmissions?
!
!
All nodes receive the message
What is the delay?
!
!
Minimum among all possible routing schemes
If NO resource constraints (bandwidth, buffer space)
Controlled Replication
!
Limit number of copies to L (small, fixed)
!
!
!
Transmissions = L!
Spray and Wait (sigcomm 2005)
!
Spray: For every message, L message copies are
initially spread to L distinct relays
!
Wait: If the destination is not reached in the spraying
phase, each of the L nodes carrying a copy performs
direct transmission.
Two modes
!
Normal: one copy per encountered node
!
Binary: n/2 copies per encountered node
Spray and Wait (Binary Spraying)
!
!
Use forwarding tokens; SRC starts with L tokens
When L = 1, can only forward to DST
L=1
D
F
E
L=1
L=1
B
L=4
D
Src
L=2
L=2
L=1
D
D
Dst
D
C
Opportunistic Routing = ? Random Routing
!
So far all schemes are random: no assumptions about
relays
!
!
!
all relays equally fast, equally capable, similar mobility
epidemic, random flooding, 2-hop, spray & wait, etc.
Is real life that random and homogeneous???
!
!
!
Nodes have different capabilities (PDA, sensor, laptop, BS)
Nodes move differently (vehicles vs. pedestrians, 1st year
student vs. PhD)
Nodes have social relations
!
!
!
Same affiliation => same building, floor
Friends => meet more often than others
Learn and exploit the patterns => better routing
Predicting Future Encounters
Based on past encounter statistics
!
!
!
Mobility pattern non-random, but unknown
Essentially non-parametric learning\prediction
Per contact vs. end-to-end statistics
Grained Contact Characterisation
ows the pairwise contacts between two active devices randomly c
ta traces: Cambridge [Scott et al. 2006], MIT Reality [Eagle an
Prophet Routing
nd UMassDieselNet
[?]. It can be seen that most contacts occurr
me period of a day. This repeating pattern is useful to predict
! Like Epidemic routing, but maintains a probability of
wever, most existing schemes do not fully take this advantage. In
delivery
for each
node
pair p(i,D)
o nodes a and
b contact,
they
update
their encounter predictability,
s follows:
P (a, b) = Pold (a, b) + (1
Pold (a, b)) ⇤ Pencounter ,
is the encounter predictability before the current cont
is a scaling factor at which the probability increases upon encoun
l positive
valuei copies
to set an
upper to
bound
P (a, b)
[Lindgren et al.
! Node
message
j onlyon
if p(j,D)
> p(i,D)
messages based on this metric is simple but may not be efficient
old (a, b)
ACM Transactions on Internet Technology, Vol. V, No. N, Article A, Publication date:
3R – Fine-grained routing
!
Fine-grained encounter pattern
!
!
!
!
∆n |, which
ar. |∆n | is
used in the
rder [5]. In
|∆n | in the
Weekday vs. weekend
Each day is divided into multiple time slots
Estimate encounter probability in each time slot
Single-copy message routing
ν
weekday
weekday
weekday
weekday
...
weekend
weekend
...
τ
(08:00,09:00]
(09:00,10:00]
(10:00,11:00]
(12:00,13:00]
...
(08:00,09:00]
(09:00,10:00]
...
n1
0.4
0.1
0
0
...
0
0
...
Table IV
n2
0.2
0
0
0
...
0.8
0
...
n3
0.1
0.6
0.5
0.8
...
0
0.2
...
n4
0
0
0.6
0
...
0
0.7
...
Performance Comparison
!
Cambridge data trace (Scott et al. 2006)
108616
110543
L. W
109345
Fig. 2: Performance with unlimited message buffer size
duce message overhead, the average delivery rate is not dropped too mu
Fig. 2: Performance
with unlimited message buffer size
Performance
Comparison
! Cambridge
data trace
(Scott delivery
et al. 2006)
to reduce
message overhead,
the average
rate is not dropped too much as it
uses fine-grained encounter information for contact prediction.
42350
43512
43844
Fig. 3: Performance with limited message buffer size: 1M bytes/node
Fig. 3 shows the performance of the three schemes where the message buffer is
restricted to 1M bytes/node. The average delivery rates achieved by Epidemic and
PRoPHET are dropped to 0.43 and 0.45, respectively, and the performance of Epi
Model-based Prediction
Office
Cafeteria
50%
5%
Restaurant 2
Restaurant 1
5%
Rest of Area
2%
!
3%
Library
20%
Class
15%
Mobility Profile: Each node visits specific locations
more often
COMPUTER SCIENCE
Introduction to the
Kevin XIAO
Outline
VANET
Broadcast Storm
Broadcast Island
COMPUTER SCIENCE
What is VANET?
Vehicles connected to each others
through an ad hoc formation form a
wireless network called “Vehicular Ad
Hoc Network”.
Vehicular ad hoc networks (VANETs) are
a subgroup of mobile ad hoc networks
(MANETs).
COMPUTER SCIENCE
What is VANET?
VANET is an important component of ITS,
including:
V2V Communications: Vehicle To Vehicle
Communications
V2I Communications: Vehicle To
Infrastructure Communications
COMPUTER SCIENCE
What is VANET?
COMPUTER SCIENCE
What is VANET?
VANET Communication Standards
The VANET communication builds on IEEE 802.11p
WLAN operating on seven reserved channels in the
5.9 GHz frequency band.
COMPUTER SCIENCE
What is VANET?
COMPUTER SCIENCE
Why VANET
Increase the vehicles’ safety
21.8 million vehicle crashes from 1990 to 2015;
36,000 fatalities in 2005 only;
24,000 of these due to collision with other
vehicles/objects.
Cost more than $100 billion per year in
medical health and etc.
COMPUTER SCIENCE
Why VANET
COMPUTER SCIENCE
vb
c
va
vc
Why VANET
a
COMPUTER SCIENCE
Accleration
Overtaking
c
b
d
Why VANET
Increase the driving experience
Online videos in vehicles;
Smart driving;
Vehicle-Human interaction.
COMPUTER SCIENCE
Characteristics of VANET
High mobility of vehicles
Rapidly changing network topology.
Unbounded network size.
Potential support from infrastructure
Real-time, time sensitive data exchange.
Crucial effect of security and privacy.
COMPUTER SCIENCE
VANET Broadcast
COMPUTER SCIENCE
Broadcast Storm
COMPUTER SCIENCE
What is Broadcast Storm?
A broadcast storm occurs when a network system
is overwhelmed by continuous multicast or
broadcast traffic.
When different nodes are sending/broadcasting
data over a network link, and the other network
devices are rebroadcasting the data back to the
network link in response, this eventually causes
the whole network to melt down and lead to the
failure of network communication.
COMPUTER SCIENCE
How the Broadcast Storm occurs?
Poor network management
Poor monitoring of the network;
The use of cheap devices, including hubs,
switches, routers, cables, connectors, etc.;
Improperly maintained network configuration and
inexperienced network engineers.
COMPUTER SCIENCE
How the Broadcast Storm occurs?
Network Topology
The lack of a network diagram design,
which is needed for proper management
and to provide guidelines for all network
traffic routes. This can be done on paper
and with the help of application
software that creates an automated
network diagram.
COMPUTER SCIENCE
Broadcast Island
COMPUTER SCIENCE
Any solution?
COMPUTER SCIENCE
Download