87987987654

Upload: anonymous-jstkqvc27b

Post on 14-Apr-2018

213 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/27/2019 87987987654

    1/14

    UCLA Undergraduate Research Program in Electrical Engineering

    Summer 2003 (June 16 - August 8, 2003)

    Integrated System Manager of a Mobile Backbone Network

    Jonathan Chan

    Professor Izhak Rubin

  • 7/27/2019 87987987654

    2/14

    Abstract

    Given a Mobile Backbone Network (described below), we are implementing an

    Integrated System Manager (ISM) to further increase stability, support and the Quality of

    Service in the network. Each node will have the ability to become a Network Manager

    and all the nodes will be connected in a hierarchical form. Data about the network will

    be relayed through the nodes, according to specific routing algorithms; nodes lower in

    the hierarchy will update their information to those higher.At the top of the hierarchy will

    be a centralized Integrated System Manager. All nodes have the capabilities to convert

    itself from a Network Manager into an Integrated System Manager and from an ISM

    back into a Network Manager. The difference between the ISM and a Network Manager

    is that an ISM is repeatedly updated with information from everyone in the network while

    a Network Manager only receives data from those nodes below in on the hierarchy. The

    ISM is simply a Network Manager and the top of the hierarchy. With this data, the ISM

    will control the network, mainly the stability of the links and the Quality of Service.

    Introduction

    Mobile Backbone Network

    A Mobile Backbone Network (MBN) is an ad hoc wireless mobile network that employs a

    hierarchical networking architecture. This is different from usual networks for many

    reasons. What separates a MBN from a regular network is its highly decentralized

    structure. Because the network is not restricted with a permanent infrastructure, data

    can be transferred through different routes in the network. This mobility gives us a huge

    advantage over centralized networks. Centralized networks have too much

    dependence on its central nodes. If any of those go down, the network collapses. In a

    MBN, any node nearby can resume the tasks of the fallen node. Each node can rely on

    multiple different routes to send and receive information. The architecture is also

    different from a usual ad hoc network because of its multi-leveled structure. A normal ad

    hoc network contains only one level. Each node has the same capabilities as each

    other. In the network, the nodes are separated into two categories: high power and low

    power nodes. Two levels of nodes provide more efficiency and capability within the

    network. Certain nodes, usually low powered ones, do not have the capacity or energy

  • 7/27/2019 87987987654

    3/14

    to act as a hop for other nodes. Low power nodes, or Regular Nodes (RNs), can route

    to other low power nodes if within the range or use the high power nodes or Backbone

    Nodes (BNs) as hops to their destination.

    With these two levels comes a variety of associations and networks that the MBN can

    encompass. An association is a possible connection in the network. Because there are

    several routes to a destination, associations between nodes provide possible

    connections in the network. Through these associations of Regular Nodes and

    Backbone Nodes, the MBN supports three different sub-networks. The first is a typical

    ad hoc wireless network. This provides the means for Regular Nodes to connect and

    communicate with each other. The second sub network needed is the Backbone Node

    network comprised of all the Backbone Nodes or Bnet. A Bnet is an ad hoc network on

    the second layer of the MBN. This network controls the routing to other Backbone

    Nodes as well as the routes to the Regular Nodes. This is done by simply routing to the

    Backbone Node that the Regular Node is

    associated to. The last sub-network, an

    Anet, must be incorporated to provide

    each Regular Node with a Backbone

    Node association. This sub-network is

    formed around the Backbone Node with

    one or more associated Regular Nodes.

    But what of the Backbone Nodes that

    are not associated with any Regular

    Nodes?

    Imagine a topology of multiple Backbone Nodes with no Regular Nodes; it would be

    useless to route through each Backbone Node, when it is easier and safer to route

    through one Backbone Node. To save energy, any Backbone Node that is not

    associated with any Regular Nodes becomes elected as a Backbone Capable Node

    (BCN). These Backbone Capable Nodes have all the capabilities of a Backbone Node

    but regulates itself to only capabilities of a Regular Node for efficiency. Backbone

    Capable Nodes are associated to the MBN through a Backbone Node as a Regular

    Node is. A Backbone Capable Node has the capability to be reelected as a Backbone

    Node when a Regular Node moves into the area if needed.

  • 7/27/2019 87987987654

    4/14

    Both Regular Nodes and Backbone

    Nodes can communicate in two ways.

    Regular Nodes can communicate to

    other Regular Nodes in similar fashion

    as in an ad hoc network. If the packets

    destination is out of range or not within

    neighboring Regular Node capabilities, it

    can also route its packet through a

    Backbone Node. Backbone

    Nodes have two options as well. The first option is through the higher powered

    Backbone Nodes. However, if messages are directed to the Regular Nodes and

    Backbone Capable Nodes associated to that particular Backbone Node, the message is

    routed to its destination.

  • 7/27/2019 87987987654

    5/14

    This network has also been expanded to cover larger areas with the help of UAVs and

    UGVs. Unmanned Aircraft Vehicles and Unmanned Ground Vehicles are used to create

    direct lines of communications between Bnets if regular Backbone Node nodes are

    incapable of a certain distance. Both UAVs and UGVs perform as a Backbone Node. If

    stationed between two Bnets within range, it could provide a connection between the two

    networks. These mobile nodes are mostly used as the Backbone Nodes to connect

    Regular Nodes in Anets and as Backbone Nodes to connect Backbone Nodes in Bnets.

    A sensor network is also incorporated in the network to identify objects. It alerts the

    network allowing the nodes to check out what was sensed by the sensor network.

    Integrated System Manager

    Now with the network in place with all its association and routing capabilities, how is the

    network controlled? The easiest way would be to define a simple algorithm that all the

    nodes would have such as sending messages on a first come first serve basis or by

    electing Backbone Nodes based on the node ID. However, this is certainly not the most

    optimal solution especially in a mobile network. For every association, every movement,

    every Backbone Capable Node election there is change in the network. How can a node

    route through a network if it doesnt know where the destination is without flooding the

    network with queries?

    The answer to these questions is to create an Integrated System Manager (ISM). The

    ISM controls the Mobile Backbone Network by enforcing Quality of Service (QoS) in the

    network. This included congestion control, priority and the ability to connect and

    associate in the network.

    The ISM adds additional levels to the network. Each Backbone Node includes an

    application called a Network Manager (NM). A Network Manager simply maintains

    information about the network as seen through its node and collects data from nearby

    nodes. One Network Manager is selected to become the ISM and collects data from all

    the other Network Managers. This works in a hierarchy of Network Managers. Since

    the ISM is only a Backbone Node, it can only collect data from all its neighboring nodes

    through their Network Managers. Those Network Managers in turn collect data from

  • 7/27/2019 87987987654

    6/14

    their neighboring nodes and the cycle continues until all Backbone Nodes that can be

    connected are collected. Each Network Manager not only collects all the information

    from its neighboring nodes but all the information they have of other nodes as well. This

    allows each Network Manager to only talk to its neighbors but receive information from

    everyone under it in the hierarchy. The ISM contains all the information of all the nodes

    connected in the network.

    With the data received, we are able to control the network. To control the ISM we use

    the principles of the Simple Network Management Protocol (SNMP) over UDP (User

    Datagram Protocol).

    User Datagram Protocol

    UDP is very simple transport protocol. It simply adds the source and destination port

    and IP address and lets the IP layer handle everything else. However, its

  • 7/27/2019 87987987654

    7/14

    straightforwardness allows us to manipulate certain aspects to better control our

    network. UDP is unreliable because it is connectionless and doesnt contain states. If a

    node wanted to receive information from another node, it would just take the information

    instead of asking for permission. Because the other node doesnt know if that node

    wants information, if the packet is lost or damaged, nothing is done. However, this

    allows the ISM to control the network without waiting for a certain node that could be lost

    or cannot be connected. UDP also has small overhead and an unregulated send rate.

    This is imperative for communication speed and priority. Because humans can

    understand audio and video even if a few packets are lost, this tremendously increases

    the speed of the packet rate due to packets not being resent because or packet loss or

    errors. The unregulated send rate allows the ISM to control the flow of the network.

    Simple Network Management Protocol

    SNMP is a management protocol comprised of agents and managers written for network

    devices such as hubs and routers. An SNMP Agent is any device that runs a program

    that understands the SNMP language. A manager is an agent the collects the data.

    Each agent has a database called a Management Information Base (MIB). Although our

    application modifies SNMP to better assist our network, several properties are used.

    Everything the ISM needs to know is stored in the MIB and is collected when queried by

    other Network Managers. In our MIBs, each entry has a key and value. This simplifies

    the SNMP MIB database which uses a tree system where each value is stored in certain

    directories which you can choose from.

    SNMP 1.0 uses five simple functions to control its operations which we mimic. The first

    four functions are relatively simple are great for data collection. The most common

    function is the SNMP Get function. This simply queries the node for a particular value of

    a MIB key. The SNMP GetNext function calls for the value of the next key in the MIB.

    When the function reaches the end of the MIB after several GetNext function calls, the

    MIB returns the value of the first key which alerts the manager that all the information

    has been collected. The SNMP GetResponse function is the response of a Get or a

    GetNext function call. The SNMP Set function simply sets a value of a MIB to a specific

    key. The most interesting function is the last of the five: the SNMP Trap function. The

    Trap function is its own process, sent out by an agent when a set of circumstances

  • 7/27/2019 87987987654

    8/14

    occurs. Usually a trap is triggered by a threshold: a value that the key cannot go above

    or cannot go below. When the Trap is set off, it alerts the Network Manager, which will

    respond accordingly. This can be very useful in determining several aspects of our

    routing protocol. Traps can set thresholds on anything from the number of RN

    associations to the maximum traffic flow. The use of a Trap is essential to help regulate

    the nodes and ensuring Quality of Service. Thresholds can be put on each node to

    maintain certain standards on the network such as congestion or maximum associations.

    If these traps are set off, they immediately alert the Integrated System Manager which

    has the power to reroute and move nodes to ease high association of nodes. This puts

    the power of the network into the hands of the user who can manipulate the network into

    a form he sees fit.

    ISM operations

    The ISM is a three pronged network manager. Its operations can be split up into three

    clusters. The first is the integration with the other gateways. To become completely

    integrated and control the network, the ISM must know more than just what each BNs

    has in its MIB. Specialized BNs such as UGVs and UAVs have more functioning than

    regular BNs and can be better utilized if they were not treated as regular BNs. The

    Sensor Network has other qualities that can be maximized as well with proper

    integration. The ISMs second main operation is the association algorithm between each

    nodes. This includes the Anet and Bnet. Each node must know its neighbors to create

    a well routed network. And finally, the ISM must control the actual routing of packets to

    ensure Quality of Service within the MBN.

    ISM Integration

    MBN

    The ISMs integration with the MBN is mainly to collect data from each MIB. Each MIB

    contains the information of each Backbone Nodes RN associations as well as the

    neighboring BNs. It also contains routing information such as traffic flow. This data is

    very important for routing purposes as will be seen later.

  • 7/27/2019 87987987654

    9/14

    UGV

    Unmanned Ground Vehicles are great in the sense that they are unmanned and can be

    controlled directly by the ISM. UGVs are like an insurance policy on the network. They

    are used mainly to keep all the nodes associated in the network. Because they have the

    same qualities as a Backbone Node, UGVs insure connections in both the Anet and the

    Bnet. Any node that strays far from the network, whether it is a Regular Node or a

    Backbone Node, can easily be re-associated with a UGV properly placed between that

    node and the network. New implementation is made in the ISM to accommodate

    instructions to relocate the UGV to specific coordinates.

    UAV

    Unmanned Air Vehicles are similar to a UGV without any ground limitations such as

    mountains or lakes. Because the UAVs fly and are without restriction, their reception as

    a Backbone Node is increased. Normal Backbone Nodes are limited in wireless

    communication by physical structures and cannot travel as quickly. UAVs present the

    ability to associate quickly and in a broad fashion, covering much more ground than a

    normal BN.

    UAVs also add increased implementation to the ISM. The UAVs use the CloudCap

    Protocol to calculate a variety of aspects in flying. This protocol provides the ISM with a

    gateway to communicate with the UAV. Unlike UGVs, where the ISM controls mostly

    the coordinates it wants the UGV to reside at, UAVs have enhanced features, including

    calculating speed, direction and altitude.

    Sensor Network

    The Sensor Network is a group of sensors designed to detect targets in the network.

    By using actual SNMP, it floods the area of sensors with predefined traps. Each sensor

    acts as its own SNMP agent and sets off the trap when it senses a target. The Sensor

    Network Gateway acts as a manager and collects all these responses. When two or

    more sensors set off the same trap, the Sensor Network Gateway relays a message to

    the ISM which records these trap responses. Each message the Sensor Network

  • 7/27/2019 87987987654

    10/14

    Gateway sends includes in its value the location of the target and the Sensor IDs that

    detected the target. This provides the ISM with a timeline of where targets are sensed

    as well as their movements in the network.

    This implementation of the Sensor Network is very interesting in a mobile network. The

    ISM control can execute a number of options including sending UGVs and UAVs to a

    specified target that set off a trap. The Sensor Network can also detect lost BNs and

    RNs that are out of range from the MBN. When the UAVs or UGVs relocate to the

    correct coordinates, the sensor network confirms their movement solidifying the network

    associations. With the Sensor Network implementation intact, the topography of the

    overall network is more precise.

    One factor in nodal movement is the Quality of Service of a node. Too much movement

    in a node results in less stability. Although any slight nodal movements wont result in

    increased packet loss, too much nodal movement could result in the loss of an

    association. The Sensor Network provides additional judgment to routing. Important

    video feed sent over the network might want the most stable connection available.

    Because the Sensor Network continuously senses targets, the movement of nodes can

    be detected and the ISM can relay a message to the other nodes rerouting packets if

    necessary.

    Nodal Association

    A query system is used to incorporate each node into the network. Regular Nodes

    associate itself with a BN in the Anet by querying BNs until one answer. This can be

    done with a Hello echoed back and forth to establish an association. Any BN that

    does not hear from an RN is automatically reverts to its BCN functioning until an RN

    associates with it.

    The Network Managers and Backbone Nodes associate themselves in the Bnet also by

    sending messages. Backbone Nodes themselves know all the possible connections

    through a similar querying method as the Regular Nodes. Since every Backbone Node

    can also be a Network Manager, each Network Manager knows two things: its Network

    Manager and all the nodes it is managing. If the node does not hear from its Network

  • 7/27/2019 87987987654

    11/14

    Manager for a specified period of time, it immediately un-associates itself with its

    Network Manager and queries the network asking for all other possible Network

    Managers in the area. The node in turn waits a period of time for all the responses.

    After that period is over, it selects its Network Manager based off an algorithm and

    sends a message setting that Network Manager as its Network Manager. This algorithm

    can be anything from selecting the Network Manager with the smallest ID to selecting

    the closest Network Manager in the network.

    If a Network Managers periodic update requests are not being replied to, it assumes the

    node has moved or is not within range. It un-associates itself with that node and ceases

    its periodic update requests.

    Routing

    The MBNs routing capabilities are perhaps the most important part of the MIB updates.

    As associations change, the topography of the network is stored in a connectivity matrix.

    The connectivity matrix displays each possible connection within the network as well as

    the stability of each link. The stability of the link refers to many aspects of routing. To

    be stable, a node must have set associations and good traffic flow. Any node that

    repeatedly loses its associations is less stable and will induce more packet loss. This

    goes the same for nodes with congested links. Their ability to pass packets is

    decreased and a different route would be better corresponding to other nodes. Each

    time an association is made or a dropped the connectivity matrix is updated. When the

    ISM is informed of a change in the association or stability of a link, the ISM broadcasts

    the new connectivity matrix to its nodes. Each Network Manager sends the connectivity

    matrix to the BNs that are associated with it until everyone receives the new matrix.

    When a new connectivity matrix is received, each node calculates the route needed to

    send packets to any node in the network. It uses these calculations until a new

    connectivity matrix is broadcasted.

    There are several other options looked upon to route packets. The first is priority.

    Certain packets from different routes are more important than others. Smaller audio

    messages might be more important than a long video feed. Adding a priority to each

  • 7/27/2019 87987987654

    12/14

    packet guarantees the importance of a packet. Packets with higher priority take the

    faster routes while packets are relayed slower depending on traffic. In a congested

    network, packets sent regardless of traffic get to their destination faster but has less

    reliability on a route due to congestion. The second option is the algorithm used to

    route packets. The ISM associates two algorithms that packets can route in. Robust

    routing is the safer, reliable route. It sends packets through links with high values in the

    connectivity matrix. Dijkstras Algorithm is used as a second algorithm. It chooses the

    fastest route regardless of reliability. These selections help nodes route packets

    depending on the packet.

    ISM Election Algorithm

    A Mobile Backbone Network is more efficient than a regular network because of its

    structure and decentralized nodes. Because every network is different, an MBN is more

    manageable and is easier to establish and maintain based on the circumstances of the

    environment it is run on. This must also be true of the Integrated System Manager.

    The ISM itself is a centralized administration. It can manage every node in the network

    and receives updates from every node to create topographies in both the eyes of the

    Backbone Nodes and the Sensor network. However, each Backbone Node has the

    capabilities from converting itself from a Network Manager into an Integrated System

    Manager and vice versa. There is no enforced structure on which node has to act as the

    ISM. The ISM is controlled by a simple algorithm: any node that is its own Network

    Manager (it stands at the top of the hierarchy) is an Integrated System Manager. While

    an ISM, it queries other nodes periodically to see if there is any node willing to be its

    Network Manager. The network is constantly querying itself, wanting to establish more

    associations and to improve its service.

    Each node can also set itself as the ISM. It un-associates itself with its Network

    Manager and then queries all surrounding nodes telling them to set the ISM as their new

    Network Manager. These nodes un-associate themselves with their previous Network

    Manager and sets the ISM as their new Network Manager.

  • 7/27/2019 87987987654

    13/14

    These new associations work because each Network Manager only is aware of its

    Network Manager and all the other associations it has below it on the hierarchy. To

    change Network Managers, it simply un-associates itself from the old Network Manager

    and associates itself with the new one.

    Conclusion

    This paper describes the implementation of an Integrated System Manager onto a

    Mobile Backbone Network. This application will support the network and control it to

    generate maximum efficiency and more effectiveness. The Quality of Service on a

    network is very important and the ISM situates the owner of the network to control it as

    to how he sees fit. This is imperative as this Mobile Backbone Network can be utilized in

    a variety of fashions.

  • 7/27/2019 87987987654

    14/14

    References

    [1] I. Rubin, A. Behzad, R. Zhang, H. Luo, E. Caballero, "TBONE: a mobile-backbone

    protocol for ad hoc wireless networks",Aerospace Conference Proceedings,

    2002. IEEE , Volume: 6 , 2002, Page(s): 2727 -2740

    [2] Kurose, James F., Ross, Keith W. Computer Networking: A Top-Down Approach

    Featuring the Internet (2nd edition). Pearson Addison Wesley. 2002.

    [3] SUNY Institute of Technology. SNMP For Dummies.

    http://www.tele.sunyit.edu/snmp4dum.pdf Accessed 2003 June 12.