dynamically configure roles (e.g., dns stub name server or sip proxy) dynamically configure links...

2
Dynamically configure roles (e.g., DNS Stub Name Server or SIP Proxy) Dynamically configure links (e.g., IP address of best root, forwarding or master NSs) Task 1.2 Autonomous Internetworking Prepared through collaborative participation in the Communications & Networks Consortium sponsored by the U. S. Army Research Laboratory under the Collaborative Technology Alliance Program, Cooperative Agreement DAAD-DAAD-19-01-2-0011. The U. S. Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation thereon. The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research Laboratory or the U. S. Government. FY05 Plans 0 100000 200000 300000 400000 500000 600000 700000 800000 900000 1000000 0 10 20 30 40 50 60 70 80 90 100 Num berofnodes (n) Routing Overhead (bits) O ne D om ain SQ R T(n)D om ains (based only on topology) SQ R T(n)D om ains (based on topology and m obility) Task 1.2.1 New protocols to maintain reachability in large dynamic ad hoc networks Challenges: Existing solutions poorly handle loss of root/home servers, brittle linkages (e.g., net splits), multi-homing, and HAIPE. Proposals: Integrated location architecture (DNS SIP, Presence, IM) with autoconfigured, Efficient and Robust Inter-domain linkages. Challenges: Balancing fast, simple distributed mechanisms with more optimal global mechanisms. Quantifying the theoretical advantages of dividing a network into independent routing domains. Proposals: Simultaneously optimizing large networks across multiple network functions, layers, and levels of hierarchy. Faster Simulated Annealing and other techniques to optimize more complex cost functions over more nodes. Better local maintenance algorithms based on the reclustering cost functions. Optimize for specific routing metrics (e.g., maximum path length and percentage suboptimatily) . Task 1.2.2 Automatic domain generation for routing and other functions, using complex multi-function, cross-layer, and multi-level optimization Domain 3.X Domain 7.X Domain 5.X Domain 7.X Domain 3.X Domain 5.X Domain 4.X v@Z e@X v@Z e@X f@M c@L Domain 1.X d@L Domain 1.X d@L f@M N1 N2 N4 N3 N4 N3 N1 Dynamic “black” wireless network Manage IP address configuration 11 10 9 12 6 7 8 5 1 3 4 2 C ID = 9 C ID = 5 C ID = 1 11 10 9 12 6 7 8 5 1 3 4 2 C ID = 9 C ID = 5 C ID = 1 Packet loss due to MAC collisions M inim ize R outing Path Length Suboptim ality 100 nodes,4 C lusters 0 2 4 6 8 10 12 14 16 18 1 2 3 4 5 6 7 8 9 10 11 12 13 FlatShortestPath (D ijkstra) A vg.R oute Path Length (hops) FlatShortestPath G ivenC HsPreO pt G ivenCH sPostO pt CombinedO pt 2 2 1 () min , .... , K JC Var C C M inim ize R outing Path Length Suboptim ality 100 nodes,4 C lusters 0 2 4 6 8 10 12 14 16 18 1 2 3 4 5 6 7 8 9 10 11 12 13 FlatShortestPath (D ijkstra) A vg.R oute Path Length (hops) FlatShortestPath G ivenC HsPreO pt G ivenCH sPostO pt CombinedO pt 2 2 1 () min , .... , K JC Var C C HAIPE HAIPE HAIPE HAIPE HAIPE N2 HAIPE HAIPE HAIPE HAIPE a)Hierarchy Benefits b) Hierarchy Drawbacks c) Local Maintenance Task 1.2.3 Highly Adaptive Component Based Routing Protocols that are able to change all functional aspects in response to changes in environment and network demands 87.69 7.69 1.54 0 1.54 1.54 0 10 20 30 40 50 60 70 80 90 100 1 2 3 4 5 6 7 Num ber ofRTT P ercentage Dr. Anthony McAuley, Telcordia, [email protected] Dr. Stephan Bohacek, University of Delaware, [email protected] Routing protocols constructed from different components Classes of components The selection of components depends on the demands placed on the network and the operating environment. on demand flooding proactive topology discovery cluster- based topology discovery local repair flooding topology information flood to source tree route repair first found least hops route selectio n least power longest life low mobility low power low traffic delay tolerant high mobility delay intolerant large topology authentication game- theoretic securit y Components of routing protocols Task I. Taxonomy of components •Find the elementary components of routing protocols •Functional description of elementary components •Component interaction and dependency graph Task 2. Performance analysis of components Identification of performance bottleneck Performance of routing components Topology information dissemination Multicast Broadcast Topology discovery Protocol performance Security Scalability A complete revision of MANET routing protocols. Eight research groups jointly developing a single protocol. Systematic analysis and development of MANET protocols. Deep insight into the routing protocols. Routing table Interest table Route in Packets Binary Tree C ost Table Geographic Inform ation Exact Route Route G uidence R oute R epresentation/ Form ation R oute D iscovery Proactive Reactive R oute Maintenance ---Failure H andling Network wide update Lim it update Route rediscovery Local repair Route cache Alternative route Dr. Ken Young, Telcordia, [email protected] Mr. Hal Harrelson, ARL, [email protected]

Upload: basil-chase

Post on 16-Dec-2015

233 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Dynamically configure roles (e.g., DNS Stub Name Server or SIP Proxy) Dynamically configure links (e.g., IP address of best root, forwarding or master

Dynamically configure roles

(e.g., DNS Stub Name Server or SIP Proxy)

Dynamically configure links (e.g., IP address of best root, forwarding or master NSs)

Task 1.2 Autonomous Internetworking

Prepared through collaborative participation in the Communications & Networks Consortium sponsored by the U. S. Army Research Laboratory under the Collaborative Technology Alliance Program, Cooperative Agreement DAAD-DAAD-19-01-2-0011. The U. S. Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation thereon.

The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research Laboratory or the U. S. Government.

FY05 Plans

0

100000

200000

300000

400000

500000

600000

700000

800000

900000

1000000

0 10 20 30 40 50 60 70 80 90 100

Number of nodes (n)

Rou

ting

Ove

rhea

d (b

its)

One Domain

SQRT(n) Domains (based only on topology)

SQRT(n) Domains (based on topology and mobility)

Task 1.2.1 New protocols to maintain reachability in large dynamic ad hoc networks Challenges: Existing solutions poorly handle loss of root/home servers,

brittle linkages (e.g., net splits), multi-homing, and HAIPE.

Proposals: Integrated location architecture (DNS SIP, Presence, IM) with

autoconfigured, Efficient and Robust Inter-domain linkages.

Challenges: Balancing fast, simple distributed mechanisms with

more optimal global mechanisms. Quantifying the theoretical advantages of dividing a

network into independent routing domains.

Proposals: Simultaneously optimizing large networks across multiple network functions, layers, and levels of hierarchy. Faster Simulated Annealing and other techniques to optimize more complex cost functions over more nodes. Better local maintenance algorithms based on the reclustering cost functions. Optimize for specific routing metrics (e.g., maximum path length and percentage suboptimatily) .

Task 1.2.2 Automatic domain generation for routing and other functions, using complex multi-function, cross-layer, and multi-level optimization

Domain 3.X

Domain 7.X

Domain 5.X

Domain 7.X

Domain 3.X

Domain 5.X Domain 4.X

v@Z

e@X

v@Z

e@X

f@M

c@L

Domain 1.X

d@L Domain 1.X

d@L

f@MN1

N2

N4

N3

N4

N3N1

Dynamic “black” wireless network

Manage IP address configuration

11

10

9

126

7

8

5

1

3 4

2

CID = 9 CID = 5

CID = 1

11

10

9

126

7

8

5

1

3 4

2

CID = 9 CID = 5

CID = 1

Pac

ket

loss

due

to

MA

C c

ollis

ions

Minimize Routing Path Length Suboptimality

100 nodes, 4 Clusters

0

2

4

6

8

10

12

14

16

18

1 2 3 4 5 6 7 8 9 10 11 12 13

Flat Shortest Path (Dijkstra)

Avg

. Ro

ute

Pat

h L

eng

th (

ho

ps)

FlatShortestPath GivenCHsPreOpt GivenCHsPostOpt CombinedOpt

2 2

1( ) min , ...., KJ C Var C C

Minimize Routing Path Length Suboptimality100 nodes, 4 Clusters

0

2

4

6

8

10

12

14

16

18

1 2 3 4 5 6 7 8 9 10 11 12 13

Flat Shortest Path (Dijkstra)

Avg

. Ro

ute

Pat

h L

eng

th (

ho

ps)

FlatShortestPath GivenCHsPreOpt GivenCHsPostOpt CombinedOpt

2 2

1( ) min , ...., KJ C Var C C

HAIPE

HAIPE

HAIPEHAIPE

HAIPE

N2

HAIPEHAIPE

HAIPE

HAIPE

a) Hierarchy Benefits b) Hierarchy Drawbacks

c) Local Maintenance

Task 1.2.3 Highly Adaptive Component Based Routing Protocols that are able to change all functional aspects in response to changes in environment and network demands

87.69

7.691.54 0 1.54 1.54

0

10

20

30

40

50

60

70

80

90

100

1 2 3 4 5 6 7

Number of RTT

Per

cen

tag

e

Dr. Anthony McAuley, Telcordia, [email protected]. Stephan Bohacek, University of Delaware, [email protected]

Routing protocols constructed from different components

Classes of components

The selection of components depends on the demands placed on the network and the operating environment.

on demandflooding

proactive topology discoverycluster-based

topology discovery

local repairfloodingtopology

informationflood to

source tree

route repair

first foundleasthops

route selection

leastpower

longest life

low mobility low powerlow traffic

delay tolerant

high mobility delay intolerantlarge topology

authenticationgame-

theoretic

security

Components of routing protocols

Task I. Taxonomy of components•Find the elementary components of routing protocols•Functional description of elementary components•Component interaction and dependency graph

Task 2. Performance analysis of componentsIdentification of performance bottlenecksPerformance of routing components

Topology information disseminationMulticastBroadcastTopology discovery

Protocol performanceSecurityScalability

A complete revision of MANET routing protocols.Eight research groups jointly developing a single protocol. Systematic analysis and development of MANET protocols.Deep insight into the routing protocols.

Routing table

Interest table

Route in Packets

Binary Tree

Cost Table

Geographic Information

Exact Route

Route Guidence

Route Representation/Formation

Route Discovery Proactive Reactive

Route Maintenance---Failure Handling

Network wideupdate

Limit update

Route rediscovery

Local repair

Route cache

Alternative route

Dr. Ken Young, Telcordia, [email protected]. Hal Harrelson, ARL, [email protected]

Page 2: Dynamically configure roles (e.g., DNS Stub Name Server or SIP Proxy) Dynamically configure links (e.g., IP address of best root, forwarding or master

a) Optimized domain creation using Simulated Annealing with complex cost functions and constraints

b) Domain maintenance reassociation using the same cost functions used in domain generation

Prepared through collaborative participation in the Communications & Networks Consortium sponsored by the U. S. Army Research Laboratory under the Collaborative Technology Alliance Program, Cooperative Agreement DAAD-DAAD-19-01-2-0011. The U. S. Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation thereon.

The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research Laboratory or the U. S. Government.

FY04 Accomplishments

Number of Sessions

Unitary Plane

Srp = 1

Srp = 100

Srp = 10

K=10, l=5, m=med, d=20

Mobility Rate

Indirect, through HA

Direct to CN

lPDCSlBUDSkREG

mkPDCSkREGd

cn

d

cn

d

dh

d

tri

d

ih

prrm

prm)()()(

)()(

;

MIP

MIP

6

4

Cp Cost to process packet/message at a node.Ct Cost to transmit one message over one hopm, mobility rate p, packet arrival rate per sessionSr , number of sessionsw Number of LA registrations for each HA registrationd Number of moves results are averaged over

Mobile Node

d = 0

d = 20

Unitary Plane

p= m=Sr=1

Task 1.2.1 A new analytical framework for performance evaluation of mobility protocols

lkmlk

Degradation of the Clustering Map CostApproach 1 (A1-Lower ID) vs. Approach 2 (A2-Similar Mobility)

0.0E+00

2.0E+09

4.0E+09

6.0E+09

8.0E+09

1.0E+10

1.2E+10

1.4E+10

Time (secs)

Co

st o

f C

lust

erin

g M

ap

Lower ID (A1) Similar Mobility (A2)

Objective Cost Function

Balanced Size Clusters (1)(2)

Balanced Diameter Clusters (3)(4)

Balanced Clusters with minimum Border Routers.

(5)

Cluster members move in a similar direction, so we expect longer durations of stable cluster membership

(6)(7)

Cluster members have similar velocity, so expect more stable cluster membership

(8)

Links among cluster members have long expiration time estimates. Improves the lifetime of the generated hierarchy

(9)

Cluster members move with similar direction and velocity. Like (6),(7),(8) capturing more node dynamics (e.g., direction and velocity)

(10)

2 2

1( ) min , ...., KJ C Var C C

2

1

( ) minK

ii

J C C

2

1

( ) mini

K

Ci

J C d

1 2

2 2 2min , ,....,KC C CJ C Var d d d

2 2

11

min ,....,i

K

K Ci

J C Var C C BR

,

2

1 , 1

( ) minz

i j

CK

rz i j

J C

1,2 1,

1

min ,...,z zC Cz z

K

r rz

J C Var

,

2

2

1 , 1

minz

zi j

CK

rz i j

J C U

2

1 , 1

minzCK

z ijz i j

J C I LET

,

,

2

, 1

1

, 1

2*maxmin

180

z zi j

zi j

Cr

Ki j

Cz r

i j

U

SJ C

n

Border Router for MN

Subnet

Networkm k

p

HAMN

MN

HACN

l

Local Mobility Agent for MN

LAMN

q

Home Agent for MN

BRMN

LACNSubnet

CNBRCN

Task 1.2.2 Improved automatic domain generation providing scalability, manageability and efficiency in large heterogeneous networks, such as FCS and WIN-T

c) Domain maintenance beacon quickly detects constraint violations

T=0

Merge

Split

T=1

T=2

T=3

T=4

Domain ID = 6

Domain ID = 9

2 domains

Domains Merge

Low Priority1 domain

Domain split

Self elected beacon node (new domain ID = 3)b

2 domains

High Priority

Detects

Detects

MIP6 better

MIP4 better

Task 1.2.3 Routing

Task 1.2 Autonomous Internetworking

MIP6

MIP4MIP6

MIP4

Dr. Anthony McAuley, Telcordia, [email protected]. Stephan Bohacek, University of Delaware, [email protected]

Dr. Ken Young, Telcordia, [email protected]. Hal Harrelson, ARL, [email protected]

• Key observation– Idling consumes significant amount of energy– Unattended ground sensors (UGS): hard energy constraint

• To conserve energy: turn off the sensors – duty cycling• Different types of duty cycling: Single radio and Dual radio• Goal: reducing duty cycle while maintaining coverage

Network Coverage with Low Duty Cycled SensorsNetwork Coverage with Low Duty Cycled Sensors

Objective• Analyze the applicability of recent

research in authentication techniques for secure routing

Results• Traditional signature and new

signature techniques outperform Zhang’s authentication schemes

• In our hop-by-hop authentication scenarios Zhang’s schemes are preferred at rates above 2 Mbps and communication energy costs below 4 mJ/kbps

P-III M (Ultra Low) (N = 10 Hops End-to-End Authentication)

1.0E+02

1.0E+03

1.0E+04

1.0E+05

1.0E+06

1 10 100 1,000 10,000

Effective Data Rate (Kbps)

Del

ay (

bit

s)

DSA

ECDSA F_2

ECDSA_F_P

BLS F_3^97

Z98 S4 SHA

Z98 S4 MD5

Z98 S5 SHA

Z98 S5 MD5

C&C F_3^97

P-III M (Ultra Low) (N = 10 Hops End-to-End Authentication)

1.0E+02

1.0E+03

1.0E+04

1.0E+05

1.0E+06

1.0E+07

1.0E+08

1.0E+09

1.0E+10

0.01 0.10 1.00 10.00 100.00 1,000.00 10,000.00

Energy per Unit Comms (mJ/kb)

En

erg

y (m

J)

DSA

ECDSA F_2

ECDSA_F_P

BLS F_3 9̂7

Z98 S4 SHA

Z98 S4 MD5

Z98 S5 SHA

Z98 S5 MD5

C&C F_3^97

Evaluating the Trade-offs between Broadcasting and MulticastingEvaluating the Trade-offs between Broadcasting and MulticastingMain resultsThere is no clear winner between broadcasting and multicasting.The scenario in question dictates the choice.

For large group sizes with a single multicast source, SBA (or broadcast) is preferable. For small group sizes with single source, ODMRP (or multicast) is a clear choice

In high node mobility, SBA (or broadcast) is preferableWith single source, ODMRP (or multicast) is preferable in dense networks

Cost of Security forCost of Security for Tactical MANETSTactical MANETS – Modular architecture facilitates

customized configurations – OS abstraction for rapid development

and testing– Smooth transition of shared code

from simulation testbed to prototypes

OPNETOPNET

Off-line Analysis

Logging

PackbotPackbot

Radio

MAC

Transceiver Duty Cycling

Transmit Power Control

NeighborDiscovery

Routing

Shared Network Layer

Protocols

IP

Applications

Multi-hop Routing Protocol Integration with PackbotsMulti-hop Routing Protocol Integration with Packbots

Real-Time Network Monitoring and Management