Evaluation and Innovation in Opportunistic Networks

Lade...
Vorschaubild
Dateien
ThesisIslam_MuhammadA.pdf
ThesisIslam_MuhammadA.pdfGröße: 14.09 MBDownloads: 959
Datum
2011
Herausgeber:innen
Kontakt
ISSN der Zeitschrift
Electronic ISSN
ISBN
Bibliografische Daten
Verlag
Schriftenreihe
Auflagebezeichnung
DOI (zitierfähiger Link)
ArXiv-ID
Internationale Patentnummer
Angaben zur Forschungsförderung
Projekt
Open Access-Veröffentlichung
Open Access Green
Core Facility der Universität Konstanz
Gesperrt bis
Titel in einer weiteren Sprache
Publikationstyp
Dissertation
Publikationsstatus
Published
Erschienen in
Zusammenfassung

The presence of an increasing number of mobile devices has prompted the demand to use them for information dispersion through opportunistic networks, which they form coincidently due to their geographic location. Opportunistic networks pose several new challenges to the current transmission protocols as they are not only capable of store and forward routing, but also lack the offline routing capability, i.e. source and destination must be connected to the network simultaneously. We can find several opportunistic network protocols in literature, but neither a solid comparison nor a trusted baseline has been presented.
In this study, we have analyzed and evaluated eight existing routing algorithms on a common basis in an effort to grasp the strong and weak points of each of them and to see whether it is possible to design a hybrid technique that may take advantage of the strengths of several other techniques. We propose three important criticisms regarding the evaluation of existing routing algorithms.
1. Most evaluations restrict themselves to comparing against the two extremes, direct-contact forwarding and flooding.
2. Each attempt uses a completely different choice of scenario and simulation parameters.
3. Most attempts concentrate on methods to find a path to destination but the reliability of the path cannot be ensured in this paradigm.
The findings have revealed that almost all the techniques fail to perform under variable conditions, i.e. bandwidth hungry techniques failed to deliver when bot- tlenecks existed although, they outclassed every other technique where network had sufficient capacity. In contrast, techniques that required good network con- nectivity failed to perform in sparse network. As a result of our comparison of selected networks under a wide variety of realistic scenarios, we have not only been able to identify and describe favorable traits of protocols, but also neces- sary relationships of successful mobile opportunistic network protocols with QoS routing. This study defines a very light weight metric, which not only encapsu- lates the path bandwidth but also maintains a dynamic path ranking by degrading the path efficiency as it suffers from data load. Moreover, this study focuses on the routing algorithm Nile1 that has an adapting capability with the underlying network. It thereby maintains acceptable performance without exhausting the network resources keeping a check on the network “pulse”, i.e. bandwidth. Nile is a multi-path protocol that deploys replication based on heuristic for computing disjoint path . Flooding is considered to be a protocol that can deliver the best performance if its overhead is ignored. Therefore, it is customary to use flooding as a performance benchmark for opportunistic networks. We identify and describe the current sim- ulation practices that do not expose the shortcomings of flooding as an upper bound. We provide a step towards a routing benchmark, which is flexible, pro- vides results close to an upper bound, is simple to implement, and thus might be a candidate for a common benchmark. This new method called EPO2, does not suffer from bottlenecks that limit the performance of epidemic flooding, even when bandwidth is scarce. Our analysis shows that networks are not suffering congestion as suggested by flooding, giving a better insight in the underlying network.
Since most of the practical routing protocols rely on history to profile devices, these profiles are used to compute the routes in the network. We found that history is either not able to predict device behavior accurately or history looses the details about the device behavior due to aggregation of metrics. We have therefore analyzed opportunistic network with max-flow to see the throughput of the network. We afterwards compared the outcome of this max-flow with a modified max-flow that uses history for its throughput computations. We have found that it is not possible to obtain an accurate history based max-flow, since it is not easy to find the link in path that can be considered to be responsible if history gives an unreliable path.

Zusammenfassung in einer weiteren Sprache
Fachgebiet (DDC)
004 Informatik
Schlagwörter
Konferenz
Rezension
undefined / . - undefined, undefined
Forschungsvorhaben
Organisationseinheiten
Zeitschriftenheft
Datensätze
Zitieren
ISO 690ISLAM, Muhammad Arshad, 2011. Evaluation and Innovation in Opportunistic Networks [Dissertation]. Konstanz: University of Konstanz
BibTex
@phdthesis{Islam2011Evalu-12967,
  year={2011},
  title={Evaluation and Innovation in Opportunistic Networks},
  author={Islam, Muhammad Arshad},
  address={Konstanz},
  school={Universität Konstanz}
}
RDF
<rdf:RDF
    xmlns:dcterms="http://purl.org/dc/terms/"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:bibo="http://purl.org/ontology/bibo/"
    xmlns:dspace="http://digital-repositories.org/ontologies/dspace/0.1.0#"
    xmlns:foaf="http://xmlns.com/foaf/0.1/"
    xmlns:void="http://rdfs.org/ns/void#"
    xmlns:xsd="http://www.w3.org/2001/XMLSchema#" > 
  <rdf:Description rdf:about="https://kops.uni-konstanz.de/server/rdf/resource/123456789/12967">
    <bibo:uri rdf:resource="http://kops.uni-konstanz.de/handle/123456789/12967"/>
    <dc:creator>Islam, Muhammad Arshad</dc:creator>
    <dc:language>eng</dc:language>
    <dcterms:title>Evaluation and Innovation in Opportunistic Networks</dcterms:title>
    <dcterms:hasPart rdf:resource="https://kops.uni-konstanz.de/bitstream/123456789/12967/2/ThesisIslam_MuhammadA.pdf"/>
    <dcterms:rights rdf:resource="https://rightsstatements.org/page/InC/1.0/"/>
    <dspace:isPartOfCollection rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/>
    <foaf:homepage rdf:resource="http://localhost:8080/"/>
    <dc:rights>terms-of-use</dc:rights>
    <dcterms:isPartOf rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/>
    <dc:contributor>Islam, Muhammad Arshad</dc:contributor>
    <void:sparqlEndpoint rdf:resource="http://localhost/fuseki/dspace/sparql"/>
    <dcterms:issued>2011</dcterms:issued>
    <dcterms:available rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2011-05-12T07:12:39Z</dcterms:available>
    <dc:date rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2011-05-12T07:12:39Z</dc:date>
    <dcterms:abstract xml:lang="eng">The presence of an increasing number of mobile devices has prompted the demand to use them for information dispersion through opportunistic networks, which they form coincidently due to their geographic location. Opportunistic networks pose several new challenges to the current transmission protocols as they are not only capable of store and forward routing, but also lack the offline routing capability, i.e. source and destination must be connected to the network simultaneously. We can find several opportunistic network protocols in literature, but neither a solid comparison nor a trusted baseline has been presented.&lt;br /&gt;In this study, we have analyzed and evaluated eight existing routing algorithms on a common basis in an effort to grasp the strong and weak points of each of them and to see whether it is possible to design a hybrid technique that may take advantage of the strengths of several other techniques. We propose three important criticisms regarding the evaluation of existing routing algorithms.&lt;br /&gt;1. Most evaluations restrict themselves to comparing against the two extremes, direct-contact forwarding and flooding.&lt;br /&gt;2. Each attempt uses a completely different choice of scenario and simulation parameters.&lt;br /&gt;3. Most attempts concentrate on methods to find a path to destination but the reliability of the path cannot be ensured in this paradigm.&lt;br /&gt;The findings have revealed that almost all the techniques fail to perform under variable conditions, i.e. bandwidth hungry techniques failed to deliver when bot- tlenecks existed although, they outclassed every other technique where network had sufficient capacity. In contrast, techniques that required good network con- nectivity failed to perform in sparse network. As a result of our comparison of selected networks under a wide variety of realistic scenarios, we have not only been able to identify and describe favorable traits of protocols, but also neces- sary relationships of successful mobile opportunistic network protocols with QoS routing. This study defines a very light weight metric, which not only encapsu- lates the path bandwidth but also maintains a dynamic path ranking by degrading the path efficiency as it suffers from data load. Moreover, this study focuses on the routing algorithm Nile1 that has an adapting capability with the underlying network. It thereby maintains acceptable performance without exhausting the network resources keeping a check on the network “pulse”, i.e. bandwidth. Nile is a multi-path protocol that deploys replication based on heuristic for computing disjoint path . Flooding is considered to be a protocol that can deliver the best performance if its overhead is ignored. Therefore, it is customary to use flooding as a performance benchmark for opportunistic networks. We identify and describe the current sim- ulation practices that do not expose the shortcomings of flooding as an upper bound. We provide a step towards a routing benchmark, which is flexible, pro- vides results close to an upper bound, is simple to implement, and thus might be a candidate for a common benchmark. This new method called EPO2, does not suffer from bottlenecks that limit the performance of epidemic flooding, even when bandwidth is scarce. Our analysis shows that networks are not suffering congestion as suggested by flooding, giving a better insight in the underlying network.&lt;br /&gt;Since most of the practical routing protocols rely on history to profile devices, these profiles are used to compute the routes in the network. We found that history is either not able to predict device behavior accurately or history looses the details about the device behavior due to aggregation of metrics. We have therefore analyzed opportunistic network with max-flow to see the throughput of the network. We afterwards compared the outcome of this max-flow with a modified max-flow that uses history for its throughput computations. We have found that it is not possible to obtain an accurate history based max-flow, since it is not easy to find the link in path that can be considered to be responsible if history gives an unreliable path.</dcterms:abstract>
    <dspace:hasBitstream rdf:resource="https://kops.uni-konstanz.de/bitstream/123456789/12967/2/ThesisIslam_MuhammadA.pdf"/>
  </rdf:Description>
</rdf:RDF>
Interner Vermerk
xmlui.Submission.submit.DescribeStep.inputForms.label.kops_note_fromSubmitter
Kontakt
URL der Originalveröffentl.
Prüfdatum der URL
Prüfungsdatum der Dissertation
March 30, 2011
Finanzierungsart
Kommentar zur Publikation
Allianzlizenz
Corresponding Authors der Uni Konstanz vorhanden
Internationale Co-Autor:innen
Universitätsbibliographie
Ja
Begutachtet
Diese Publikation teilen