An Adaptive Compulsory Protocol for Basic Communication in Ad-hoc Mobile Networks
description
Transcript of An Adaptive Compulsory Protocol for Basic Communication in Ad-hoc Mobile Networks
An Adaptive Compulsory Protocolfor Basic Communication
in Ad-hoc Mobile Networks
Ioannis ChatzigiannakisSotiris Nikoletseas
April 2002
MobileHost
AngledTransmission
Range
GeorgraphicalArea
TransmissionRange
TransmissionBeam
Obstacle
Obstacle
Ad-Hoc Mobile NetworksI. Chatzigiannakis - S. Nikoletseas
• A collection of mobile hosts with wireless network interfaces forming a temporary network WITHOUTWITHOUT any established infrastructure or centralized administration.
• Ease of Deployment• Speed of Deployment• No Infrastructure is used• Instant Networking
The Basic Communication Problem
• Send information from some Sender S to some Receiver R.
• Adverse conditions: – Poor Resources (computational and battery power)– Highly dynamic variable connectivity– Connections are constantly forming and breaking– Hosts may be far away
• Difficult to avoid broadcasting and thus flooding
Is there a more efficient technique – other than Is there a more efficient technique – other than notifying every station that the sender meets, in the notifying every station that the sender meets, in the hope that some of them will then eventually meet hope that some of them will then eventually meet the receiver (i.e. Flooding) ?the receiver (i.e. Flooding) ?
I. Chatzigiannakis - S. Nikoletseas
Previous research
• Use a Dynamic Graph Model:– The network is modeled as an undirected graph.– Vertices correspond to Mobile Hosts– Edges (virtual links) correspond to temporary communication
between pairs of hosts
• Algorithms try to maintain data structures on connectivity, such as sets of paths of intermediate nodes that lie within one another’s transmission range.
M. Adler and C. Sheideler: “Efficient Communication Strategies for Ad-hoc Wireless Networks”, in SPAA 1998.
Y. Ko and N. Vaidya: “Location-Aided Routing (LAR) in Mobile Ad-hoc Networks”, in MOBICOM 1998.
N. Malpani, J.Welch and N. Vaidya: “Leader Election Algorithm for Mobile Ad-hoc Networks”, in DIALM 2000.
I. Chatzigiannakis - S. Nikoletseas
Limitations of Such ApproachesI. Chatzigiannakis - S. Nikoletseas
• Proof of correctness requires– A bound on the rate of virtual link changes– Good Results in static graphs and in quasi-static graphs
(of low or medium mobility rate)– In case of very high mobility rate (i.e. very high rate of
topology changes) such approaches may fail to react fast enough.
• Broadcasting techniques for communication in small area networks or dense networks of many users are efficient but– In wider area networks?– In sparse networks of less users?
Impractical (path formation may not be feasible), Not Efficient (very long paths) and Not Fault-tolerant (if any one path exists)
• Any other host within tr can receive any message Any other host within tr can receive any message broadcasted by the host.broadcasted by the host.
• Given that the mobile hosts are moving in the space S, S is divided into consecutive cubes of volume V(tc).
An Explicit Model Of Motions
tr tc
We assume that each mobile host has a transmission range represented by a sphere sphere trtr centered by itself.
We approximate this sphere by a cube tccube tc
with volume V(tc), where V(tc) < V(tr)
Geographicalarea (2-D)
Obstacle
Geographicalarea (2-D)
Obstacle
I. Chatzigiannakis - S. Nikoletseas
The “Support” ApproachI. Chatzigiannakis - S. Nikoletseas
• We envision networks where the highly dynamic movement of hosts makes “maintenance” of valid paths inconceivable
• We propose the idea of using a small team of nodes to move as per the needs of the protocol – we call these nodes the Support () of the network
• The Support acts as a moving (sweeping the entire network area) intermediate pool for storing and forwarding messages
• We take advantage of the hosts natural movement by exchanging information whenever hosts meet accidentally
• We additionally take special care of users in remote areas that do not move beyond these areas
Our scheme follows the “2-tier” principle – try to move communication and computation to the fixed part of the network [Imielinski+Korth96] – in our case simulates the fixed part
Previous Work: The Snake ProtocolI. Chatzigiannakis - S. Nikoletseas
• At the Set-up phase, a set of k hosts become the support and elect a leader (the head of )
• The nodes of the support move fast enough to cover (in sufficiently short time) the entire motion graph moving as a chain of nodes (in a snake-like formation)
• When some node of gets within communication range of a sender, an underlying sensor sub-protocol P2 notifies the sender to send its message(s).
• The messages are then propagated within structure using a synchronization sub-protocol P3.
• When a receiver node comes within communication range of a node of , the underlying sensor sub-protocol P2 notifies the node of , and the pending messages are forwarded to the receiver.
Previous Work: Communication Times
The time needed for two mobile userstwo mobile users to communicate is:
X time for the sender to reach a node of Τ time for the message to propagate inside Y time for the receiver to meet , after after the propagation of the message inside
YTXTtotal
I. Chatzigiannakis - S. Nikoletseas
kk
n
GTE total
)(
2)(
2
Gn
k2
2
The above upper bound is minimized when
Theorem : The total communicate time for the snake protocol is bounded above by the following:
The Runners ProtocolI. Chatzigiannakis - S. Nikoletseas
• At the Set-up phase, a set of k hosts become the support • Each member of performs an independent random walk
on the network area. Thus all support hosts sweep the area “in parallel” by moving independently of each other.
• When some node of gets within communication range of a sender, an underlying sensor sub-protocol P2 notifies the sender to send its message(s).
• The messages are then propagated within structure using a synchronization sub-protocol P3.
• When a receiver node comes within communication range of a node of , the underlying sensor sub-protocol P2 notifies the node of , and the pending messages are forwarded to the receiver.
The Synchronization Sub-protocol P3
• When 2+ members of (runners) meet, a two-phase commit protocol is initiated
• Let the members of that reside on the same area of the network be MS1, MS2,…, MSj
• Let S1(i) be the set of undelivered messages and S2(i) be the set of delivery receipts (i.e. we assume a generic storage scheme) of runner MSi where 1≤i≤j.
• Phase 1: Using the sensor sub-protocol P2, identify the runner with the lowest ID (i.e. MS1) and transmit S1 and S2.
– MS1 collects all the sets and combines them with its own to compute its new
sets S1 and S2: and
• Phase 2: MS1 broadcasts its decision to all the other runners.
– All hosts that received the broadcast apply the same rules (as MS1 did) to join their S1 and S2 sets.
Any host that receives a message in phase 2, and which has not participated in phase 1, accepts the values received in that message as if it had participated in phase 1.
jllSS
1 22 )(
I. Chatzigiannakis - S. Nikoletseas
)1()( 21 21 SlSSjl
Protocol Correctness• Theorem 1: Assuming that the motions of the hosts of the
network which are not member of are independent of the motion of the runners, the runners protocol is correct.
• Proof: Under this independence assumption, any mobile any mobile host will eventually meet some node of host will eventually meet some node of with with probability 1.probability 1.
• By using Borel-Cantelli Lemmas for infinite sequences of trials, given an unbounded period of (global) time each station will meet the support infinitely ofteninfinitely often with probability 1.
This guarantees delivery of a message onto This guarantees delivery of a message onto and, and, then, reception by a destination when it meets the then, reception by a destination when it meets the support.support.
I. Chatzigiannakis - S. Nikoletseas
Fault Tolerance
• Theorem 2: The runners protocol is t-fault tolerant, where t<k and k the size of . Hosts need to re-transmit messages until a receipt of delivery is received by a member of .
• Proof: Let’s assume that a sender S transmits some messages to the first runner R that it encounters, and let’s assume further that this runner is distant from the rest of .
• Thus copies of the original messages are only stored in R and they will not propagate within for some time (i.e. until R meets other members of ).
• In a worst case, if a fault occurs on R during this period , the only copies of the messages will be lost and not delivered to their final destination.
Thus S retransmits the messages until finally a receipt is received by a member of .
I. Chatzigiannakis - S. Nikoletseas
Highly Changing Ad-Hoc Mobile NetworksI. Chatzigiannakis - S. Nikoletseas
• First Time Considered• Stronger Model • Mobile Hosts can expand or Shrink the Area of the
Network– Possible Obstacles Appear such as rumbles, destroyed bridges…– New Paths Discovered due to rumble removal– Exploration of New Areas due to the mobility of the hosts
• We study such changes by using the number of vertices n=|V| of the motion graph G.
• At any time instance, the motion graph G will undergo certain changes by – adding or removing one or more vertices– adding or removing one or more edges
These changes are unpredictable and are not known in advance.
The Need for AdaptationI. Chatzigiannakis - S. Nikoletseas
• The Snake + Runners protocols assume that the area of deployment (motion graph G) remains fixed throughout the execution of the protocol. The execution and performance analysis provided assume a fixed G
• Selection of an optimal support size (k) implied by the analysis assumes that the network size (n) is known in advance
• But in highly-changing network the network size (n) can change → the optimal support size (k) can change This leads to big communication times OR unnecessary high
number of support (k)• What if the initial network size is not known in advance?
We need a mechanism to modify (adapt) the size of to the (current) optimal by periodically measuring the communication times
The Adaptive Runners Protocol (1)I. Chatzigiannakis - S. Nikoletseas
• At the Set-up phase, the set of k hosts of elect a leader• The leader executes the adaptation sub-protocol Padapt
• The protocol Padapt evolves in phases of possible adaptation• At the beginning of each such phase, the protocol tries to
sense the need (or not) of possible adaptation– Does not assume knowledge on the network size (n)– This is sensed explicitly by measuring the communication times
• Let tmeas be the time needed to measure (accurately enough) the communication times of the network
• Such measurements may indicate that– Communication times becomes significantly bigger → Increase k– Communication times becomes significantly smaller → Reduce k
The Adaptive Runners Protocol (2)
• Adaptation is done progressively by adding (or removing) support members in each step of the adaptation procedure
• Let tchange-size be the time needed to change the support size This progressive adaptation allows to sense reaching a
new optimal size – since further increase of the Σ size (k) will not significantly affect the communication times
Previous research (both analytical and experimental) on the performance of the Support approach indicate such a threshold behavior for the support size (k) and its effect on communication times
• Let tsteps be the number of adaptation steps• Then the overall time to adapt is
I. Chatzigiannakis - S. Nikoletseas
sizechangemeasstepsadapt tttT
The Adaptation Procedure Padapt (1)
• Let x0,x1,…,xi be the performance measure at the end of step i, where x0 is an initial value and step i is the current execution step
• Let xi = |xi - xi-1| ≥ xi-1 be the “sensed” alteration and is the “sensitivity factor” and is set to a fixed small percentage constant (i.e. =0.1)We use the sensitivity factor to avoid non-necessary
adaptation in cases of trivial changes in the network
• When sensitivity threshold (xi-1) is crossed a new adaptation phase is initiated.
• At the step t of the procedure, the leader of Σ will increase or decrease k by c·t where c is a small constant (for
initialization purposes) and
I. Chatzigiannakis - S. Nikoletseas
1
1
i
ii
x
xx
The Adaptation Procedure Padapt (2)
• Let tsense be the last i such xi ≥ xi-1 – i.e. tsense is the last step of the last adaptationAt the end of each adaptation phase, the leader stores
xtsense for further use• Then for any sensing of subsequent adaptation phases,
the following rule is used:
• Let xi = |xi - xtsense | ≥ xtsense the next “sensed” alteration since the last adaptation phase tsense
• Remark that xi measures the performance measures over short time intervals
xi is used to prevent our protocol from not detecting a sequence of small changes that do not cross the sensitivity factor but whose cumulative effect over a long time period leads to an adaptation need
I. Chatzigiannakis - S. Nikoletseas
Analysis of the Adaptation Speed
• The overall time to adapt is
• Let n=|V| of the motion graph at the beginning of Padapt, i.e. at tsense and n’ be the number of vertices at the end of the adaptation phase.• Remark that both n and n’ are not known by the protocol but implied by the
performance measurements taken
• Let k, k’ be the “optimal” support sizes for n and n’ respectively.
• If the optimal support size then the number of steps is
upper bounded by
sizechangemeasstepsadapt tttT
I. Chatzigiannakis - S. Nikoletseas
c
kkt
kkc
ckk
steps
t
t
steps
steps
ln
'ln
'
'
nk nn '
Analysis of the Time to Increase the Size of Σ
• Note that the analysis holds only in the case where the hosts not in perform concurrent and independent random walks on G.
• Remark that runners also perform concurrent and independent random walks on G.
• Theorem 4: In the case of adapting by increasing the support size, the expected time is:
• Theorem 5: Assuming uniform spread of the h hosts into the n cubes of the network area, the expected time is:
nG
cTE sizechange )(
1)(
2
I. Chatzigiannakis - S. Nikoletseas
h
ncTE sizechange )(
Analysis of the Time to Decrease the Size of Σ
• We work using similar arguments as in the case of increasing the support size.
• Theorem 6: In the case of adapting by decreasing the support size, the expected time is:
• Theorem 7: Assuming uniform spread of the k runners into the n cubes of the network area, the expected time is:
nG
cTE sizechange )(
1)(
2
I. Chatzigiannakis - S. Nikoletseas
k
ncTE sizechange )(
Concluding Remarks & Future Work
• We presented a new adaptive, compulsory protocol for the basic communication problem in highly-changing ad-hoc mobile networks.
• Provided correctness and fault-tolerance proofs• Investigated analytically its performance• There are several directions for future work:
– Provided tighter bounds for the performance of the Runners protocol (probably using advanced analytic techniques from Physics, such as theory of interacting particles)
– Implement the protocol and experimentally validate its superiority over the static implementation of the runners protocol.
I. Chatzigiannakis - S. Nikoletseas