network-non-traditional-routing.ppt
TRANSCRIPT
![Page 1: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/1.jpg)
Network Routing: Metrics and
Non-Traditional Routing
Y. Richard Yang
2/26/2009
![Page 2: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/2.jpg)
2
Admin.
Project propose due: Friday
![Page 3: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/3.jpg)
3
Recap: Key Problems
Forwarding and location management
Routing due to node mobility/wireless connectivity, link
connectivity/quality can be highly dynamic• need to design routing protocols that are effective in
handling dynamic topologies there can be interference among links and paths
• need good link performance metrics or scheduling
![Page 4: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/4.jpg)
4
Recap: Routing Protocols
Proactive protocols distance vector
• e.g., DSDV link state link reversal
• e.g., partial link reversal, TORA
Reactive protocols DSR AODV
A
ED
CB
F
2
2
13
1
1
2
53
5
![Page 5: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/5.jpg)
5
Recap: ETX
ETX: The predicted number of data transmissions required to successfully transmit a packet over a link
Link loss rate = p Expected number of transmissions
Problems of using ETX in 802.11 networks?
![Page 6: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/6.jpg)
Problems of ETX
ETX does not handle multirate 802.11 networks
ETX does not work out well when nodes have multiple radios working on different channels
6
![Page 7: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/7.jpg)
7
Extending ETX: Multirate
In a multirate environment, need to consider link bandwidth: packet size = S, Link bandwidth = B each transmission lasts for S/B
“Routing in Multi-radio, Multi-hop Wireless Mesh Network,” Richard Draves, Jitendra Padhye, and Brian Zill. Mobicom 2004.
![Page 8: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/8.jpg)
8
Extending ETX: Multirate
Add ETTs of all links on the path Use the sum as path metric
Interpretation: pick a path with the lowest total network occupation time Q: under what condition is SETT total
network occupation time?
![Page 9: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/9.jpg)
9
Extending ETX: Channel Diversity with Multiradio
![Page 10: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/10.jpg)
10
Impact of Interference
Interference reduces throughput throughput of a path is lower if many links
are on the same channel path metric should be worse for non-diverse
paths
![Page 11: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/11.jpg)
11
Combining Link Metric into Path Metric: Proposal 2
Group links on a path according to channel assumes links on the same channel interfere
with one another pessimistic for long paths
Add ETTs of links in each group Find the group with largest sum (BG-ETT)
this is the “bottleneck” group too many links, or links with high ETT (“poor
quality” links) Use this largest sum as the path metric
Lower value implies better path
![Page 12: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/12.jpg)
12
BG-ETT Example
Path Blue Sum Red Sum
BG-ETT Throughput
All-red
1 Blue
Red-Blue
0 5.33 ms 5.33 ms 1.5 Mbps
1.33 ms 4 ms 4 ms 2 Mbps
2.66 ms 2.66 ms 2.66 ms 3 Mbps
![Page 13: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/13.jpg)
13
BG-ETT May Select Long Paths
![Page 14: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/14.jpg)
14
Path Metric: Putting it all together
SETT favors short paths BG-ETT favors channel diverse paths
β is a tunable parameter Higher value: more preference to channel
diversity Lower value: more preference to shorter paths
![Page 15: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/15.jpg)
15
Implementation and such
Measure loss rate and bandwidth loss rate measured using broadcast probes similar to
ETX• updated every second
bandwidth estimated using periodic packet-pairs updated every 5 minutes
Implemented in a source-routed, link-state protocol, Multi-Radio Link Quality Source Routing (MR-LQSR) nodes discover links to its neighbors, measure
quality of those links link information floods through the network
• each node has “full knowledge” of the topology• sender selects “best path”• packets are source routed using this path
![Page 16: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/16.jpg)
16
Evaluations
![Page 17: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/17.jpg)
17
Media Throughput (Baseline, single radio)
![Page 18: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/18.jpg)
18
Media Throughput (Baseline, two radios)
![Page 19: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/19.jpg)
19
Impact of β value
Channel diversity is important; especially for shorter paths
![Page 20: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/20.jpg)
Summary
Link metrics are still an active research area
20
![Page 21: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/21.jpg)
21
Summary: Traditional Routing So far, all routing protocols in the
framework of traditional wireline routing a graph representation of underlying network
• point-to-point graph edges with costs select a lowest-cost route for a src-dest pair commit to a specific route before forwarding
Problems: don’t fully exploit path (spatial) diversity and wireless broadcast opportunities
![Page 22: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/22.jpg)
Outline
Admin. Link metrics Non-traditional routing
22
![Page 23: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/23.jpg)
23
Motivating Scenario: I
Assumes independent loss Tradition routing has to follow one pre-committed route Does not allow exploration of opportunities
![Page 24: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/24.jpg)
24
Motivating Scenario: II
Traditional routing picks a single route, e.g., src -> B -> D -> dst packets received off path are useless
However, one should take advantage of transmissions that reach unexpectedly far or unexpectedly short
![Page 25: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/25.jpg)
25
Motivating Scenario: III
A sends 1 packet to B; B sends packet 3 to A
If R has both packets 1 and 3, it can combine them and explore coding and broadcast nature of wireless
A BR
![Page 26: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/26.jpg)
Outline
Admin. Link metrics Non-traditional routing
motivation network coding: exploiting network
broadcast
26
![Page 27: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/27.jpg)
27
Coding
We have covered source coding (FEC, compression)
The new approach uses opportunistic network coding
goal: increase the amount of information that is transported
![Page 28: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/28.jpg)
28
Opportunistic Coding
![Page 29: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/29.jpg)
Outline
Admin. Link metrics Non-traditional routing
motivation network coding: exploiting network
broadcast opportunistic routing: ExOR
29
![Page 30: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/30.jpg)
30
Opportunistic Routing (ExOR)
Group packets into batches
Instead of choosing a fix sequential path (e.g., src->B->D->dst), the source chooses a list of forwarders (a forwarder list in the packets) using ETX-like metric a background process collects ETX
information via periodic link-state flooding
Forwarders are prioritized by ETX-like metric to the destination
![Page 31: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/31.jpg)
31
ExOR: Forwarding
The highest priority forwarder transmits when the batch ends
The remaining forwarders transmit in prioritized order each forwarder forwards packets it receives yet not
received by higher priority forwarders status collected by batch map
A nodes stops sending the remaining packets in the batch if its batch map indicates over 90% of this batch has been received by higher priority nodes the remaining packets transferred with traditional
routing
![Page 32: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/32.jpg)
32
Batch Map: Example
Batch map indicates, for each packet in a batch, the highest-priority node known to have received a copy of that packet
![Page 33: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/33.jpg)
33
Example: Timeline
Forwarder list: N24(dst), N20, N18, N11, N8, N17, N13, N5(src)
![Page 34: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/34.jpg)
34
Evaluations
65 Node pairs 1.0MByte file
transfer 1 Mbit/s 802.11
bit rate 1 KByte packets EXOR bacth size
100
1 kilometer
![Page 35: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/35.jpg)
35
Evaluation: 2x Overall Improvement
Median throughputs: 240 Kbits/sec for ExOR, 121 Kbits/sec for Traditional
Throughput (Kbits/sec)
1.0
0.8
0.6
0.4
0.2
00 200 400 600 800C
um
ula
tive F
ract
ion o
f N
ode P
air
s
ExORTraditional
![Page 36: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/36.jpg)
36
25 Highest throughput pairs
Node Pair
Thro
ughput
(Kbit
s/se
c)
0
200
400
600
800
1000 ExORTraditional Routing
1 Traditional Hop
1.14x
2 Traditional Hops1.7x
3 Traditional Hops2.3x
![Page 37: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/37.jpg)
37
ExOR uses links in parallel
Traditional Routing3 forwarders
4 links
ExOR7 forwarders
18 links
![Page 38: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/38.jpg)
38
ExOR moves packets farther
ExOR average: 422 meters/transmission Traditional Routing average: 205 meters/tx
Fract
ion o
f Tra
nsm
issi
ons
0
0.1
0.2
0.6 ExORTraditional Routing
0 100 200 300 400 500 600 700 800 900 1000
Distance (meters)
25% of ExOR transmissions
58% of Traditional Routing transmissions
![Page 39: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/39.jpg)
39
Comments
Pros takes advantage of link diversity (the
probabilistic reception) to increase the throughput
does not require changes in the MAC layer can cope well with unreliable wireless
medium and mobility Cons
maybe hard to scale to a large network overhead in packet header (batch info) batches increase delay
![Page 40: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/40.jpg)
Outline
Admin. Link metrics Non-traditional routing
motivation network coding: exploiting network
broadcast opportunistic routing: ExOR opportunistic routing: MIXIT
40
![Page 41: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/41.jpg)
Mesh Networks Borrowed the Internet API
Network
Forward correct packets to destination
PHY/LL Deliver correct packets
![Page 42: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/42.jpg)
S
R1
R2
D
99% (10-3
BER)
99% (10 -3 BER)
Wireless Naturally Provides Reliability Across Links
0%
0%
Even 1 bit in 1000 incorrect Packet loss of 99%
![Page 43: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/43.jpg)
S
R1
R2
D
99% (10-3
BER)
99% (10 -3 BER)
Implication
0%
0%
Link by link reliability 50 transmissions
Loss
Loss
![Page 44: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/44.jpg)
S
R1
R2
D
99% (10-3
BER)
99% (10 -3 BER)
Wireless Naturally Provides Reliability Across Links
0%
0%
Spatial diversity: Even if no correct packets, every bit is likely received correctly at some node
Exploit wireless characteristics 3 transmissions
Current contract 50 tx Low throughputExploit wireless characteristics 3 tx High throughput
![Page 45: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/45.jpg)
Useful with High Quality Links?R1
R2
R3
R4
Sa
Pb
Db
Da
Sb
Pb
Pa
Pa
Pa
Pb
1%
2%
1%
3%
0%
0%
0%
0%
Loss
Loss
Loss
Loss
![Page 46: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/46.jpg)
Useful with High Quality Links?R1
R2
R3
R4
Sa
Pb
Db
Da
Sb
Pb
Pa
Pa
Pa
Pb
1%
2%
1%
3%
0%
0%
0%
0%Current contract Inhibits concurrency
Exploit wireless characteristics Enables high concurrency
![Page 47: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/47.jpg)
Current Contract
Limits throughput, inhibits concurrency
PHY + LL
Deliver correct symbols to higher layer
Network
Forward correct symbols to destination
PHY + LL
Deliver correct packets
Network
Forward correct packets to destination
High throughput, high concurrency
New Contract Exploiting Wireless Characteristics
![Page 48: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/48.jpg)
MIXIT• New contract between layers to harness
wireless characteristics• Novel symbol-level network code that
scalably routes correct symbols• High concurrency MAC• Implementation and evaluation
• 3-4x gain over shortest path routing• 2-3x gain over packet-level opp. routing
![Page 49: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/49.jpg)
How does a Router Identify Correct Symbols?• PHY already estimates a confidence for every
decoded symbol [JB07]• PHY + LL delivers high confidence symbols to
network layer
PHY Confidence
Packet
PHY + LL
Deliver correct symbols to higher layer
Network
Forward correct symbols to destination
![Page 50: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/50.jpg)
What Should Each Router Forward?
R1
R2
DSP1P2
P1P2
P1P2
![Page 51: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/51.jpg)
What Should Each Router Forward?
R1
R2
DSP1P2
But overlap in correctly received symbols Potential solutions1)Forward everything Inefficient2)Coordinate Unscalable
P1P2
P1P2
P1P2
P1P2
![Page 52: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/52.jpg)
Forward random combinations of correct symbols
R1
R2
DSP1P2
MIXIT Prevents Duplicates using Symbol Level Network Coding
P1P2
P1P2
![Page 53: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/53.jpg)
1s
…
…R1
R2
D
2s2
1
7s
2s
2
7
…
1s
…
…
2s
Routers create random combinations of correct symbols
2
1
9s
5s
5
9
…
MIXIT Prevents Duplicates using Symbol Level Network Coding
![Page 54: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/54.jpg)
R1
R2
D2
1
7s
2s
…
2
1
9s
5s
…
21 s,sSolve 2
equations
Destination decodes by solving linear equationsRandomness prevents duplicates without co-ordinationRandomness prevents duplicates without co-ordination
MIXIT Prevents Duplicates using Symbol Level Network Coding
![Page 55: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/55.jpg)
1s
…
…R1
R2
D
2s2
1
7s
2s
2
7
…
1s
…
…
2s
Routers create random combinations of correct symbols
15s
5
0
…
MIXIT Prevents Duplicates using Symbol Level Network Coding
![Page 56: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/56.jpg)
R1
R2
D2
1
7s
2s
…
15s …
21 s,sSolve 2
equations
Destination decodes by solving linear equations
Symbol Level Network Coding • No duplicates Efficient • No coordination Scalable
Symbol Level Network Coding • No duplicates Efficient • No coordination Scalable
MIXIT Prevents Duplicates using Symbol Level Network Coding
![Page 57: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/57.jpg)
Destination needs to know which combinations it received
21 9s5s
21 0s5s
21 9s0s
(if both symbols were correct)
(if only s1 was correct)
(if only s2 was correct)
Nothing (if neither symbol was correct)
![Page 58: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/58.jpg)
Destination needs to know which combinations it received
Use run length encoding
5
9
Original Packets Coded Packet
![Page 59: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/59.jpg)
0
9
Original Packets Coded Packet
Use run length encoding
Destination needs to know which combinations it received
![Page 60: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/60.jpg)
9
5
Original Packets Coded Packet
Destination needs to know which combinations it received
Use run length encoding
![Page 61: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/61.jpg)
0
5
Original Packets Coded Packet
Destination needs to know which combinations it received
Use run length encoding
![Page 62: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/62.jpg)
Run length encoding efficiently expresses combinations
Run length encoding efficiently expresses combinations
Destination needs to know which combinations it received
Use run length encoding
![Page 63: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/63.jpg)
Routers May Forward Erroneous Bits Despite High Confidence
MIXIT has E2E error correction capability!
Symbol-LevelNetwork CodingECC Data
MIXIT’s Error Correcting Code (ECC)1.Routers are oblivious to ECC2.Optimal error correction capability3.Rateless
Decode ECCData
PHY + LL
Deliver correct symbols to higher layer
Network
Forward correct symbols to destination
Source Destination
![Page 64: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/64.jpg)
High Concurrency MAC
• Each node maintains a map of conflicting transmissions
• Map is based on empirical measurements and built in distributed, online manner
w & x NO!w & u YES!
xu w
![Page 65: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/65.jpg)
Evaluation
• Implementation on GNURadio SDR and USRP• Zigbee (IEEE 802.15.4) link layer• 25 node indoor testbed, random flows• Compared to:
1. Shortest path routing based on ETX2. MORE: Packet-level opportunistic routing
![Page 66: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/66.jpg)
Throughput (Kbps)
CD
F
Throughput increase: 3x over SPR,
2x over MORE
Throughput increase: 3x over SPR,
2x over MORE
Throughput Comparison
2.1x3x
Shortest PathMOREMIXIT
![Page 67: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/67.jpg)
Throughput (Kbps)
CD
FWhere do the gains come from?
Shortest PathMOREMIXIT
Take concurrency away from MIXIT
![Page 68: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/68.jpg)
Where do the gains come from?
1.5x
Without concurrency, 1.5x gain over MOREWithout concurrency, 1.5x gain over MOREThroughput (Kbps)
CD
F
Shortest PathMORE
MIXIT withoutconcurrency
Take concurrency away from MIXIT
![Page 69: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/69.jpg)
Where do the gains come from?
Throughput (Kbps)
CD
F
MIXIT
Gains come from both moving to the symbol level and high
concurrency
Gains come from both moving to the symbol level and high
concurrency
Shortest PathMORE
MIXIT withoutconcurrency
![Page 70: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/70.jpg)
Multiple Flows
Shortest PathMOREMIXIT
No. of concurrent flows
Avg.
Net
wor
k Th
roug
hput
(Kbp
s)
MORE/SPR: Higher congestion Lower concurrency
MIXIT: Higher congestion High concurrency
MORE/SPR: Higher congestion Lower concurrency
MIXIT: Higher congestion High concurrency
![Page 71: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/71.jpg)
79
![Page 72: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/72.jpg)
Geographical Routing
![Page 73: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/73.jpg)
81
Motivations
A need for geographical based distribution e.g., sensornets and location-based services
Reducing state overhead the routing protocols we discussed so far
may not scale to large-scale networks• maintain (end-to-end) routing states for each
destination• thus overhead proportional to network size
![Page 74: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/74.jpg)
82
GeoRouting: Greedy Distance
S D
Closest to D
A
-Find neighbors who are the closest to destination D-To make progress, the chosen neighbor should be closer to destination
![Page 75: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/75.jpg)
83
Geographical Routing
Each node only needs to keep state for its neighbors
Beaconing mechanism each node broadcasts its MAC and position to minimize costs: piggybacking
![Page 76: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/76.jpg)
84
Greedy Routing Not Always Works
D
![Page 77: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/77.jpg)
85
Greedy Routing Works Well in Dense Networks
If node density is high, it is a low probability event for the region to have no nodes
Greedy fails if no node in this region
D
![Page 78: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/78.jpg)
86
Dealing with Void: Right-Hand Rule
Right-hand rule: When arriving at node x from node y, the next edge traversed is the next one sequentially counterclockwise about x from edge (x,y)
![Page 79: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/79.jpg)
87
Right Hand Rule on Convex Subdivision
Applying the right hand rule to convex subdivision (namely a planar graph where every internal face is a polytope): first remove the edges crossing the line from source to destination, and then apply the right hand rule
s t
If not convex subdivision, removing crossing edges may not work
![Page 80: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/80.jpg)
88
Right-Hand Rule Does Not Work Well with Cross Edges
u
z
w
D
x
v
x originates a packet to u
Right-hand rule results in the long detour x-u-z-w-u-x
![Page 81: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/81.jpg)
89
Removing Cross Edges
u
z
w
D
x
v
Remove (w,z) from the graph
Right-hand rule results in the route x-u-z-v-D
![Page 82: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/82.jpg)
90
How to Make a Graph Planar?
Convert a connectivity graph to planar non-crossing graph by removing “bad” edges
make sure the original graph will not be disconnected
two types of planar graphs: • Relative Neighborhood Graph (RNG)• Gabriel Graph (GG)
![Page 83: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/83.jpg)
91
Relative Neighborhood Graph
Edge uv can exist only if there does not exist another node w inside the intersection of the two circles centered at u and v with radius d(u, v) i.e., no w such that d(w, u) < d(u, v) and d(w, v) < d(u, v)
Or equivalently w u, v: d(u,v) ≤ max[d(u,w),d(v,w)]
not empty remove uv
![Page 84: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/84.jpg)
92
Gabriel Graph
An edge (u,v) exists between vertices u and v if no other vertex w is present within or on the circle whose diameter is uv.
w u, v: d2(u,v) < [d2(u,w) + d2(v,w)]
Not empty remove uv
![Page 85: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/85.jpg)
93
• 200 nodes
• randomly placed on a 2000 x 2000 meter region
• radio range of 250 m
•Bonus: remove redundant, competing path less collision
Full graph GG subset RNG subset
Examples
![Page 86: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/86.jpg)
94
Properties of GG and RNG
RNG is a sub-graph of GG because RNG removes more
edges
GG is a planar graph and thus RNG is also planar
Connectivity if the original graph is
connected, RNG is also connected
RNG
GG
![Page 87: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/87.jpg)
95
Connectedness of RNG Graph
Key observation any edge on the minimum
spanning tree of the originalgraph is not removed
Assume (u,v) is such an edge but removed in RNG due to w
u v
w
![Page 88: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/88.jpg)
96
Delaunay Triangulation
Let disk(u,v,w) be a disk defined by the three points u,v,w
The Delaunay Triangulation (Graph) There is a triangle of edges
between three nodes u,v,w iff the disk(u,v,w) contains no other points
Properties of the Delaunay Triangulation graph it is the dual of the Voronoi
diagram DT graph is planar
![Page 89: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/89.jpg)
97
Some Interesting Properties
Since the MST(V) is connected and the DT(V) is planar, all the planar graphs above are connected and planar
![Page 90: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/90.jpg)
98
Final Algorithm: Greedy Perimeter Stateless Routing (GPSR)
Maintenance all nodes maintain a single-hop neighbor
table Use RNG or GG to make the graph planar
Routing use greedy forwarding whenever possible resort to perimeter routing when greedy
forwarding fails and record current location Lc
resume greedy forwarding when we are closer to destination than Lc
![Page 91: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/91.jpg)
99
a
d
b
c
S
e
f
D
a
S
c
e
D
Example
For details about GPSR algorithm, please [GPSR].
d
![Page 92: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/92.jpg)
100
Evaluations
50, 112, and 200 nodes with 802.11 WaveLAN radios
Maximum velocity of 20 m/s 30 CBR traffic flows, originated by 22
sending nodes Each CBR flows at 2 Kbps, and uses 64-
byte packets
![Page 93: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/93.jpg)
101
Packet Delivery Success RateVery dense network: 20 neighbors
![Page 94: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/94.jpg)
102
Routing Protocol Overhead
![Page 95: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/95.jpg)
103
Routing State
State per router for 200-node GPSR node stores state for 26 nodes on
average in pause time-0
![Page 96: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/96.jpg)
104
Path Length
![Page 97: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/97.jpg)
105
Worst Case of GeoRouting in Terms of Hop Count
A worst case scenario destination is central node source is any node on ring any spine can go to
middle O(c) nodes along ring and
O(c) nodes along each spine
Best path length: O(c)+O(c)
Geographic routing: Test O(c) spines of length
O(c) Cost O(c2) instead of O(c)
![Page 98: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/98.jpg)
106
Geographic Routing
![Page 99: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/99.jpg)
107
Pros and Cons of GPSR
Pros: low routing state and control traffic scalable handles mobility well
Cons: planarized graph is hard to guarantee under mobility location might not be available everywhere (we will
see the problem next week) geographic distance does not correlate well with
network proximity
![Page 100: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/100.jpg)
108
Why Geographic Routing Without Location?
Location is hard to get GPS takes power, doesn’t work indoors,
difficult to incorporate in small sensors the network localization problem is difficult
True location may not be useful if there are obstacles
S DA
B
In the “connectivity” space, B is closer to destination!!
![Page 101: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/101.jpg)
109
Overview
Objective: assign “virtual” coordinates to nodes so that the coordinates are computed efficiently, routing works well using the computed
coordinates Progress in three steps
the perimeter nodes and their locations are known
the perimeter nodes are known but not their coordinates are not known
nothing is known We cover the first two steps
![Page 102: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/102.jpg)
110
The Perimeter Nodes and Their Locations Are Known
Image a rubber band from each node to each (connected) neighbor
The force of a rubber band is proportional to its length, directedto the neighbor
![Page 103: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/103.jpg)
111
The Perimeter Nodes and Their Locations Are Known
The equilibrium is achievedwhen the position p of a node is equal to the average of its neighbors
where n is number of neighbors
Algorithm each node sends its position
to its neighbors a node updates its new position to be the
average of those of its neighbors
n
pppp i
i 0)(
n
tptp i
)()1(
![Page 104: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/104.jpg)
112
Perimeter Nodes Are Known (True Positions)
3200 nodes; 64 perimeter nodes on the boundary
![Page 105: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/105.jpg)
113
Perimeter Nodes Are Known (10 iterations)
Internal nodes initialized as the center of the square
![Page 106: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/106.jpg)
114
Perimeter Nodes Are Known (100 iterations)
Internal nodes initialized as the center of the square
![Page 107: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/107.jpg)
115
Perimeter Nodes Are Known (1000 iterations)
Internal nodes initialized as the center of the square
![Page 108: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/108.jpg)
116
Routing Performance
32000 packets with random source-destination pairs
Success rate
Average path length
True position
0.989 16.8
Virtual position
0.993 17.1
Success rate: using (distance) greedy routing
![Page 109: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/109.jpg)
117
Two More Scenarios
Success rate: 0.981Avg. path length: 17.3
Success rate: 0.99Avg. path length: 17.1
![Page 110: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/110.jpg)
118
Weird Shapes
![Page 111: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/111.jpg)
119
The Perimeter Nodes Are Known But Their Locations Are Not Known
Assume the distance between two nodes is the (minimum) number of hops to go from one to the other
Distances can be derived by flooding the network each perimeter node sends a HELLO
message with a hop counter of 0 when seeing a message from a perimeter node with
a lower hop counter, a node increases the counter by 1 and forwards it
![Page 112: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/112.jpg)
120
Virtual Coordinates by Triangulation
Each perimeter node solves the minimization problem:
Detail
nodesperimeter ,
2ji, )-(dmin
jiji pp
21
22
2
2
221
2
UX
Uof columns 2first the:
eseigen valu 2largest the:
111 ;/
][ where, Compute
V
U
V
UVUH
JJDH
],...,[eneeIJ
dDD
T
T
ij
![Page 113: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/113.jpg)
121
Convergence and Performance
One iteration: success rate = 0.992; avg. path length = 17.2Ten iterations: success rate = 0.994; avg. path length = 17.2
![Page 114: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/114.jpg)
Backup Slides
![Page 115: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/115.jpg)
123
Improving Resiliency
If perimeter vector is inaccurate, it results in inconsistent information
Augment with two beaconing nodes which provide two coordinate axes special perimeter nodes or run leader
election to select the two nodes
Origin is chosen as the center of gravity of all perimeter nodes more robust to lost information
![Page 116: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/116.jpg)
124
Selecting Perimeter Nodes
Rule: A node is a perimeter node if: It is farthest away from the first beacon
node among all its one-hop neighbors
![Page 117: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/117.jpg)
125
Perimeter Node Detection
![Page 118: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/118.jpg)
126
Convergence and Performance
Ten iterations: success rate = 0.996; avg. path length = 17.3
![Page 119: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/119.jpg)
127
Projecting on Circle After First Computation
Circle: center is center of gravity; radius is average of distance of the perimeter nodes to the CG
Motivation: maintain a consistent coordinate space
![Page 120: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/120.jpg)
128
Virtual Polar Coordinate Space Each node is assigned a label
label is number of hops to root and virtual angle range
Discussion: how to do routing?
![Page 121: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/121.jpg)
129
Build the Tree
Root node starts as root broadcasts “level 0”
A non-root node1. receives message “level n” – marks parent2. broadcasts message saying level “n+1”
All subtrees report size back to parent.Root does assignment of virtual angles.
Question: what about the issues of the described algorithm?
![Page 122: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/122.jpg)
130
Motivation for a Better Metric
![Page 123: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/123.jpg)
131
Implementation and such
Modify DSDV or DSR
Example evaluation: in DSDV w/ ETX, route table is a snapshot
taken at end of 90 second warm-up period in DSR w/ ETX, source waits additional 15
sec before initiating the route request
![Page 124: network-non-traditional-routing.ppt](https://reader030.vdocuments.site/reader030/viewer/2022012922/555d76d4d8b42a0b778b566c/html5/thumbnails/124.jpg)
132
ETX Performance
DSDV DSR