Hybrid Architectures: Accounting for Networks Exuding DTN and
Download
Report
Transcript Hybrid Architectures: Accounting for Networks Exuding DTN and
Darien Hirotsu
UC Santa Cruz
Gregg Bachmeyer
Integrating UMTS and Bluetooth
Integrating Infrastructure-based and
Infrastructure-less Networks
Darien Hirotsu
Integrating DTN and MANET Paradigms
My apologies to Rance and Philip…
I hope I don’t steal your thunder here (I promise to keep
this short)
Feel free to interrupt/augment any explanations at any
time
What constitutes a DTN?
Traditional IP networks (both wired and even MANET)
suffer in performance when seeing certain qualities:
▪ Large delays
▪ Frequent disruptions
▪ Disconnected network graphs
The DTN architecture attempts to address these issues
Examples where a DTN architecture helps:
Sparsely connected sensor networks
Networks with frequent disconnections due to
node mobility (interplanetary networks)
The DTN protocol
stack provides a
bundle layer
This allows for a
DTN overlay
network to be
built over the
existing
architecture
DTN nodes
typically use
spray-and-wait
between hops
Note that
internet routers
can be integrated
between existing
DTN nodes
DTN Assumptions:
Connectivity is typically achieved without fixed
infrastructure
Nodes move independently and freely
Nodes are typically NOT CONNECTED due to node
mobility or sparse node density
▪ The topology that a node sees is limited to ONLY what is
“locally connected”
▪ A route typically does NOT exist between the sender and
receiver
▪ As a result,a persistent store and forward model is needed to
allow traffic to be routed and forwarded to the end
destination
MANET Assumptions:
Connectivity is typically achieved without fixed
infrastructure
Nodes move independently and freely (although only
moderate movement is tolerable)
Nodes are inherently CONNECTED via a reasonably
dense or stable topology or redundancy of routes
▪ A full topology of the network is maintained by each node
▪ If a route to an end-node does not exist with protocols like
AODV or DSR, packets are not routed or forwarded to the
next-hop
▪ If a stale route exists, packets are “black-holed”
There are many scenarios in which a MANET
would benefit from DTN capability
Sensors in a densely connected MANET may
experience battery failure causing sparse
connectivity
Failed sensors may cause
A
X
X
X
D
X
X
X
C
X
X
B
A to become
disconnected from B
If A and B were DTN
nodes, A could “save” the
data until a path to B
became available again
In the MANET, scenario
all may be lost
There are many scenarios in which a DTN
may benefit from MANET features
DTN’s typically make forwarding decisions based
on node availability rather than optimal paths
2 Suppose C moves at a
A
constant rate with slight
pauses between points 1, 2
C
1
D
E
B
At point 1, C can forward
traffic between A, B
A MANET could p0tentially
discover the more optimal
path (A-C-B) over the typical
one (A-D-E-B)
Connectivity-focused routing solutions
Implement a routing protocol that can build BOTH
optimal end-to-end paths when available but also
leverage store-and-forward if needed
▪ HYMAD
▪ HYbrid MANET-DTN routing protocol
▪ DTN-AODV
“Cooperative” routing solutions
Allow nodes to cooperate to use available bandwidth
optimally
▪ TIL
▪ Transient Information Level based routing
Higher node density makes
a strong case for MANET
since a path likely exists
end-to-end
High node mobility makes a
strong case for DTN since
the network is likely to
become disconnected
A hybrid network that falls
in between the extremes
could benefit from both
paradigms
Also, networks can flip-flop
between the two types to
have characteristics of both
The goal of HYMAD is to group individual
nodes such that only groups need to
exchange data between each other
Inter-group routing can be achieved via DTN.
Intra-group routing can be achieved via
MANET. This simplifies the topology from 12
connected nodes to 3 connected groups.
Intra-group routing (control plane)
Distance vector routing messages to achieve
mesh like connectivity
Nodes within a group exchange distance
vector routing messages much like AODV.
Inter-group routing (control plane)
Border nodes are elected for the group
Border nodes use a flag in the routing messages to discover each other
Spray-and-wait routing of data between border nodes
A
B
Nodes A and B are border nodes use a spray-andwait type routing to forward messages between
groups.
Data plane operation
Suppose A wants to send a “bundle” of data to B
▪ A forwards the message to the border node C
A
Group 3
C
Group 1
Group 2
The data from A is first forwarded to C which
is the border node. C notes that A is the
“custodian” for the bundle. C being a border
node has routing knowledge of both Group 1
B
and 2.
A
Data plane operation
Suppose A wants to send a “bundle” of data to B
▪ C forwards the bundle to node D which is a border node
for Group 2
Group 3
C
D Group 2
Group 1 Border nodes maintain a “messages-in-grouplist” which contains a list of data needing to be
delivered. C compares its list with D and sees
that D does not have the bundle from A, so it’s
B
A
Data plane operation
Suppose A wants to send a “bundle” of data to B
▪ D randomly elects E as the “custodian” of the bundle
and forwards it
E
C
D Group 2
Group 1 D sees that the destination B is not within its
group. D elects E randomly to be the
“custodian” of the DTN bundle from “A” and
forwards it accordingly. D adds the bundle to its
B
“messages-in-group-list.”
Group 3
Data plane operation
Suppose A wants to send a “bundle” of data to B
▪ E happens to be a border node as well to Group 3
A
E
Group
3
F
C
D Group 2
Group 1 E references its “messages-in-group-list” and
sees F is missing the bundle in A. E forwards
the “bundle” accordingly via “spray-and-pray.”
B
A
Data plane operation
Suppose A wants to send a “bundle” of data to B
▪ F sees B is in its group and forwards the “bundle” as
needed
E
Group
3
F
C
D Group 2
Group 1 F sees that B is a member of its group. F
forwards the datagram to B using distance
vector like routing.
B
Group formation (control plane revisited)
Intra-group disconnections may cause new groups to form
▪ Border nodes are re-elected
▪ “Messages-in-group” list allows “bundles” to be re-forwarded as
needed
Dmax is a group diameter that represents the maximum
number of allowable hops to reach the farthest node of a group
(restricts group membership)
When routes are lost due to disconnections, data is stored by
the “custodian” rather than dropped
Group 1 may disconnect into different groups
should node mobility cause link disconnections
A
B
If Dmax=2, node B cannot join the adjacent
group since it’s 3 hops away from node A.
Benefits of HYMAD:
Outperforms a standard spray-and-wait forwarding
scheme in terms of delay and delivery-ratio over a
variety of mobility scenarios
▪ Random Waypoint (synthetic)
▪ Rollernet (trace-based group movement)
Performance in terms of overhead is NOT dependent
on Dmax
▪ Increasing Dmax increases the group size which increases the
amount of control plane messages within the group
▪ As a tradeoff, this also decreases the amount of control
messages between groups
Detriments of HYMAD:
Over a wide variety of scenarios, Epidemic routing still
outperforms HYMAD in terms of delay and delivery-ratio
▪ In Epidemic routing, random pairs of nodes that establish
connectivity exchange information as needed
Performance is strongly tied to timer values of the control
plane messages
All nodes need to be DTN nodes
▪ All nodes need to have storage for the batch layer
Assumes that the “custodian” of data can store data for a
period long enough for delivery
▪ How does it deal with storage failure?
The goal of AODV with DTN capability is to
extend the reach of AODV by discovering DTN
nodes
If DTN nodes (D) are able
to speak AODV at the IP
layer, DTN nodes can
extend the reach of AODV
to allow nodes such as
originator (O) to reach
targets that would be
unreachable (T) under
typical circumstances.
Integrating AODV with DTN:
Need to expand the route discovery process and
processing of RREQ/RREP messages
▪ Add a flag in the AODV header to tell nodes to check for the
DTN header shown below
Integrating AODV with DTN (RREQ):
▪ O wants to send data to T
▪ O generates a RREQ as per usual
O
A
O generates a RREQ and forwards it to adjacent
nodes. Node A is a non-DTN AODV speaker, so
it does not toggle the DTN flag in the header,
but still forwards the RREQ accordingly.
T
Integrating AODV with DTN (RREQ):
▪ O wants to send data to T
▪ B is a DTN speaker so it toggles DTN bit in the header and adds its
DTN header telling AODV nodes it has DTN capability
O
A
B
B toggles the DTN bit in the AODV header. B
also adds the DTN Router Info extension to the
RREQ including a hop count to O. The RREQ is
then forwarded normally.
T
Integrating AODV with DTN (RREQ):
▪ O wants to send data to T
▪ D also is a DTN node so it adds another Router Info. Extension
header to the RREQ and adds B to its list of DTN nodes
O
A
B
C
D
C is a non-DTN node, so it forwards the RREQ per normal
AODV. D sees the DTN bit toggled already, but it still
needs to add its Router Info header to the RREQ. It also
adds node B to its list of DTN aware nodes establishing a
full DTN overlay topology.
T
Integrating AODV with DTN (RREP):
▪ O wants to send data to T
▪ T sees that it’s the target for node O so it generates an RREP
O
A
B
C
D
T generates the RREP and copies all Router Info extension
headers from the RREQ onto the RREP and forwards it
normally. If node T does not understand the DTN
extension, all Router Info extension headers are dropped.
T
Integrating AODV with DTN (RREP):
▪ O wants to send data to T
▪ Nodes may also learn about DTN information based on RREP
O
E
A
B
C
D
Node E can also see RREP packets and also learn about
DTN nodes B and D through that process. This ensures
robustness for nodes in learning the DTN overlay
network.
T
Integrating AODV with DTN (RREP):
▪ O wants to send data to T
▪ Node O can make in intelligent decision on how to forward traffic
to T based on the DTN information it has received
O
E
A
B
C
D
Node O processes RREP normally. All intermediate nodes
may now make “optimal” forwarding decisions based on
the knowledge of both the AODV network and the DTN
overlay network. The DTN Router Info. header has a
“metric” field which potentially could indicate how
trustworthy a DTN route is.
T
Integrating AODV with DTN (RREP):
▪ Failure of RREQ
▪ The first DTN node in a path for an RREQ is responsible for
ensuring the RREQ reaches the destination
O
E
A
B
C
D
B is the first DTN node in the path from O to T. It
maintains a timer that kicks off after getting the RREQ
and listens for an RREP from T. If node T fails and does not
send an RREP before B’s timer expires, B sends a special
“DTN-Only” RREP to allow nodes to still learn the DTN
overlay network.
T
X
Benefits of DTN-AODV
Allows for the dynamic establishment of the DTN
overlay network over the AODV network
▪ Normally overlay networks requires static configuration
▪ BGP is an example
Allows for the learning of a granular view of the
network to provide optimal forwarding decisions
▪ Knowing both AODV and DTN nodes allows the mobile
node to intelligently determine an optimal next-hop
Benefits of DTN-AODV
Evaluation of a similar implementation shows
performance improvement over Epidemic routing
in terms of delivery-ratio and delay
▪ Implementation (called adaptive routing) was slightly
different but still integrated AODV and DTN capability
Not all nodes have to be DTN speakers
▪ Not all nodes even have to understand the DTN
extensions
Detriments of DTN-AODV
Overhead increases with the number of DTN nodes
▪ Since each DTN node adds its Router Info header to the
RREQ, more DTN nodes yields higher protocol overhead
DTN-AODV results in a lot of queueing
▪ DTN-AODV results in far more queuing on average per node
compared to Epidemic routing
Route cacheing may cause issues with AODV-only
speakers
▪ If an AODV-only node receives an RREQ and responds via
route-cache, it will only send AODV routes limiting the full
realization of the DTN network
Created for directional tactical networks using
RF and optical links (free-space optical
networks)
Directional networks
Sometimes nodes can’t transmit data in the optimal
path due to interference or physical conditions
A satellite may not be pointing the optimal direction
C
B
D
A
Node A needs to
transmit to D, but it
can’t send data directly
due to the direction of
the antennae. Instead,
it takes a suboptimal
path through B and C.
The goal of TIL is to have nodes coordinate
together and share bandwidth optimally based
on a “DTN algorithm” using a called TIL
An individual node in a network is typically selfish
Since bandwidth is finite, there is some benefit for
nodes to “cooperate” and share to maximize
bandwidth
Built primarily for DTN’s, but the paper claims
that the solution works for directional MANET’s
as well
Consider the scenario
where Gregg and Darien see
an 802.11n and 802.11a
access point
Both of us knowing 802.11n
is faster, we both join that
access point and potentially
contend over the available
bandwidth
If we played nicer and
coordinated, we could work
together and join different
access points to potentially
maximize our perceived
service
802.11n
802.11a
X
Gregg
Darien
Assumes the following:
All nodes have perfect knowledge of:
▪ Location of nodes in the network
▪ Amount of network traffic at each node
▪ Connectivity of the network
If all nodes have this complete information,
an algorithm can be used by each node to
minimize the amount of work needed to
move data from source to destination
The goal is to forward traffic based on the
lowest TIL value for all nodes i and j
T(i, j) : amount of traffic needing to be delivered
from node i to node j
D(i, j) : distance between node i and node j
h(i, j) : amount of traffic being retained via DTN
on the path from node i to j
Detriments:
Impractical
▪ Is it even possible for to get this granular information AND
disperse it through a network?
All nodes have to be DTN nodes
Benefits:
Novel solution
▪ Cooperation makes sense when “fighting” over a shared
resource
Simulations show the protocol shows correctness in
delivering data over an RF, optical network
Varying simulation tools
Different simulators have different capabilities
Comparing performance of unlike protocols in unlike tools
is inefficient
Congestion control mechanisms
The possibility exists for congestion to occur at DTN
capable nodes
Does the bundle layer need additional congestion control
mechanisms?
Security
DTN nodes present a natural target for DoS
Thanks for listening
Why not use MANET only?
MANET routing protocols use
Hellos for neighbor discovery
which could be wasteful if
nodes are rarely connected
MANET forwarding is based
on availability, so if an endto-end path does not exist,
traffic is dropped
This is not optimal if the
network graph is typically
disconnected or constantly
changing
Why not use DTN only?
DTN forwarding is often
based on a per-encounter
basis (the node that is
connected the “most” based
frequency of connectivity
may become the best hop)
This means the most optimal
path through the network is
not always utilized (DTN
nodes don’t know the full
topology)
Without constant topology
discovery, suboptimal
forwarding/routing is a
possibility
Persistent storage
The assumption is a DTN node shall retain any data in the instance of a system
restart
Storage distribution
Storage has to be well distributed through the network
▪ Issues with congestion management
▪ Denial-of-Service mitigation
Routing is still a challenge
Lossy media
Unknown intermittent connectivity
Store-and-Forward
Traditional routers are only store-and-forward for a limited duration of time
Is store-and-forward a better alternative than continuous connectivity or
other alternatives?