DART: Scalable Ad Hoc Routing
DART: Scalable Ad Hoc Routing
DART: Scalable Ad Hoc Routing
Routing
DART: Dynamic Address RouTing
Michalis Faloutsos
M. Faloutsos 1
The Future of Ad Hoc Networks
Meganode ad hoc networking
• Pockets of wireless connectivity
• Consumer owned networks
• Large scale sensor networks
Commercial interest: Starbucks, cell phone companies
Interoperate and exploit wires where available
Plug-n-play operation, zero-configuration.
M. Faloutsos 2
Why on Earth...?
Overthrowing governments? Who knew what Internet
would become?
Rural networks DIY networking
M. Faloutsos 4
DART Could Be It!
M. Faloutsos 5
DART: a Novel Networking Approach
application application
(P2P networking, Chord, Pastry etc)
transport transport
network network
(DART)
link link
physical physical
M. Faloutsos 6
Roadmap
DART
• Address allocation
• Routing
• Node Lookup
Simulation Results
Related work
Conclusion
M. Faloutsos 7
The Status Quo: Proactive Routing
10.48.11.x
10.48.x.x Proactive routing: do
routing before you need it
In Internet: scaling thru
10.x.x.x address aggregation
10.48.2.x
With mobility: you can’t
aggregate addresses
Keep state per node O(N),
10.100.x.x and updates for all
M. Faloutsos 8
The Status Quo: Reactive
M. Faloutsos 10
Overview: How DART Works
M. Faloutsos 11
Address Space as Binary Tree
Prefix Tree
M. Faloutsos 13
Managing Dynamic Addresses
M. Faloutsos 14
Basic Operation
M. Faloutsos 15
Address Allocation Example
M. Faloutsos 16
Several Subtleties Exist
When nodes move, who is in charge
• Left most node in address tree
• Id of this node “characterizes” subtree or network
Should we try to balance the tree proactively?
• We tried, made things complicated
• Per-need balancing seems to work well
Merging of networks
• Network with “lowest” id wins
Clever assignment of ids to “stable” static nodes will help
things
M. Faloutsos 17
Routing with DART
M. Faloutsos 18
Routing is simplified
M. Faloutsos 19
How Routing Works in DART
M. Faloutsos 20
An example
M. Faloutsos 22
Node Lookup Table
Maps node identity -> current routing address.
Uses existing routing layer state only.
Upon connection establishment, current routing
address of destination is looked up in table.
Hierarchy of tables, local -> global, ensures
scalability.
M. Faloutsos 23
Look Up Preliminaries
Id space address space
Node is associated with
three values
A • Id of node, say A
Hash(A)
• Current address of node
addr(A)
• Hashed address of node A
Hash(A)
M. Faloutsos 24
How The Look-Up Works
M. Faloutsos 25
Subtle Issues of Look Up
M. Faloutsos 26
Other Characteristics of DART
M. Faloutsos 27
Performance Evaluation
M. Faloutsos 28
Simulations
M. Faloutsos 29
Routing Table Size Scales
Superbly!
Simulation Results log(N) 2*log(N)
30
Routing Table
2 log N
Routing Table Size (entries)
20
log N
10
0
10 100 1000 10000
Network Size (nodes)
Network Size Yes, 10,000
0.6
0.5
Path Stretch (%)
0.4
0.3
0.2
0.1
0
125 250 375 500 625 750 875 1000
Network Size (nodes)
M. Faloutsos 32
Overhead vs. CEF
DART AODV DSR
3500000
3000000 AODV
Overhead (packets)
2500000
2000000
DSR
1500000
1000000
500000
DART
0
0.1 1 10 100
Connection Establishment Frequency (conn/s)
8000
7000
6000
Throughput (packet)
5000
4000
3000
2000
1000
0
0.1 1 10 100
Connection Establishment Frequency (conn/s)
M. Faloutsos 36
Future Work
M. Faloutsos 37
My Areas of Research
Data Mining the Internet (Karagiannis, Siganos)
• Topology: models and patterns [ToN 03] [Netw/ing05]
• Traffic: model and predict behavior [GI 01] [Infocom 04]
• BLINC: traffic classification in the dark: [IMC 04] [SIGCOMM 05]
Modeling and Improving BGP (G. Siganos, Y. He)
• NEMECIS: safeguarding BGP graph[Infocom 04] [GI 01]
DART: A radical network layer for ad hoc [IPTPS 03]
[Infocom 04] [TON 06]
Ad hoc network protocols (Law)
• Multicasting and power efficient broadcast [ICNP 03] [Netw/ing05]
Modeling mobility and cellular networks (Jobin) [Infocom 04]
Cooperative Diversity (Jakllari) work in progress
M. Faloutsos 38
Late Breaking News: Poisson Returns
Poisson distributions
appear at the backbone
High speed and large
aggregation of sources
seem to change the
behavior!
[Karagiannis et al Infocom ‘04]
M. Faloutsos 40
NEMECIS: Validating BGP Policy
M. Faloutsos 41
NEMECIS: Two Loops of Functionality
Human
Administrator NEMECIS
-Detecting misconfigurations
-Detecting illegitimate routing
Misconfiguration Alert
M. Faloutsos 45