Design and analysis of adaptive strategies for locating internet-based servers in MANETs

https://doi.org/10.1016/j.peva.2006.08.007Get rights and content

Abstract

A critical problem in providing Internet access to Mobile Ad Hoc Networks (MANETs) is how the mobile hosts can locate Internet-based servers efficiently in a dynamic, unstructured network. This paper studies adaptive strategies that combine both proactive advertising by the servers and on-demand discovery by the mobile hosts. The adaptive strategies determine the relative rate of proactive advertising and on-demand discovery according to system characteristics such as host mobility level and offered load. Our simulation study reveals that, compared to the previous proactive strategies and reactive strategies, the adaptive strategies reduce network traffic by several times when the network has a moderate offered load and a low or high level of host mobility.

Introduction

In a Mobile Ad hoc Network (MANET), a collection of wireless mobile hosts form a temporary network without the assistance of any established infrastructure. A pair of hosts may communicate with each other via other intermediate hosts. Many applications in both the commercial domain and the military domain can be supported by these networks, such as content distribution, information dissemination, ad hoc multimedia streaming, and distributed games, to name just a few.

The approach of combining MANETs with the Internet infrastructure has recently attracted attention [7]. This approach can greatly enrich the applications, increase network scalability, and improve quality of service. First, the Internet supports a much larger set of popular applications. These applications, if made available via the interfaces between the Internet and MANETs, will further facilitate universal accessibility. Second, MANETs are infrastructure-less and they do not scale up to a large number of hosts. For example in large networks, routing and target discovery may incur extremely high traffic. On the other hand, the Internet has a well-established infrastructure. This infrastructure has excellent scalability and abundant network resources. An Internet-based MANET has a more hierarchical architecture: at the high level the Internet connects a set of interfaces between the Internet and MANETs, and at the low level a native MANET connects the mobile hosts. Such a hierarchical approach leads to more scalable systems. Third, in MANETs the network topology changes dynamically and the multi-hop communication route between a pair of hosts can be broken due to host mobility and possibly host joining/leaving. Therefore, it is difficult to provide high-quality service to the applications. On the other hand, by connecting MANETs to the Internet, they will likely provide more reliable services to the applications. If the MANETs are connected to the Internet via many interfaces, a pair of hosts can communicate with each other via an Internet shortcut.

An important question is how to locate the interfaces between the Internet and MANETs. Hereafter, we call the interfaces Internet-based servers in MANETs. In other words, how can the mobile hosts be informed of the existence of the servers and how can they reach the servers? In a stationary network this problem is trivial. However, in a mobile network, every time when a host requests Internet services, it may have to locate a new server and find a path to this server. Due to the infrastructure-less nature of MANETs, it is expensive to do so. The usual search methods of using query flooding generate potentially very high network traffic. Making things worse, when the request rate increases, naive search methods require that search traffic be increased in proportion to the request rate, and hence the network would be overloaded.

This paper focuses on strategies for locating the servers at minimum network cost. Broadly there are two categories of strategies: reactive (on-demand) strategies and proactive strategies. With reactive strategies, a mobile host initiates server discovery only when there is a request. The host floods a query into the network, hoping to hit at least one of the servers and to discover the path to the server. With proactive strategies, the servers advertise their availability by flooding packets into the entire network. In this way the mobile hosts obtain the routes to the servers. There are tradeoffs between the two categories of strategies. A number of factors play important roles in these tradeoffs. At a high level of host mobility, reactive strategies are favored since routes to servers will frequently become stale. At a high offered load (or request rate), proactive strategies will likely cause lower network traffic than reactive strategies do.

We study adaptive strategies for locating the servers in MANETs. By adaptive strategies, we mean, first they are hybrid strategies that combine both proactive advertising by the servers and on-demand discovery by the mobile hosts, and second the relative rate of proactive advertising and on-demand discovery is determined by the current network characteristics (such as request rate and mobility level). We first study the theoretical optimality of adaptive strategies. Our main contributions are two novel, integrated algorithms. First, to determine the rate of proactive advertising, we propose an exponential backoff algorithm to probe the optimal operating point. Second, to reduce the network traffic due to reactive discovery, we propose a novel controlled flooding algorithm, which generates low network traffic. Our simulation study reveals that the combined use of these two algorithms is near-optimal in minimizing network traffic. Compared to the previous proactive strategies and reactive strategies, our adaptive strategies reduce network traffic by several times when the network has a low or high mobility level and a moderate request rate.

The remainder of this paper is organized as follows. In the next section, we first describe our network model, and discuss proactive strategies and reactive strategies. Section 3 illustrates the intuition behind our adaptive strategies and investigates the properties of the optimal operating point. Section 4 describes our exponential backoff algorithm for proactive advertising, and Section 5 describes our novel flooding algorithm. Section 6 describes our simulation and performance evaluation. Section 7 briefly describes related work and finally Section 8 summarizes the paper.

Section snippets

Preliminaries

In this section we describe the network model and compare reactive strategies and proactive strategies.

Intuition behind our adaptive strategies

Our general discussions in Section 2.2 indicate the key problem is how to find the optimal operating point. This optimal point could be purely reactive, or a balance between proactive advertising and reactive discovery. To that end we need first to define the cost function of the search strategies, and then we will investigate the optimal operating point.

Exponential backoff for proactive advertising

The exponential backoff algorithm probes the optimal operating point between proactive and reactive strategies. The algorithm is depicted in Fig. 5. The general process is described as follows.

The system divides time into slots such that there are N requests in each slot. Initially in the first slot from line (1) to (5), the frequency of proactive advertising is set to ccontrolled advertisement per request. In this slot, the servers count how many times the mobile hosts initiate reactive

Controlled flooding for reactive discovery

In this section we describe a novel flooding algorithm to minimize the cost of reactive discovery. Recall that in Eq. (1) the constant ccontrolled represents the per-discovery cost using controlled flooding, i.e. the average number of broadcasts per host in order to locate a server.

One popular algorithm is called expanding ring, as shown in Fig. 7. Briefly, this algorithm performs multiple rounds of flooding with increased TTL values. However, this algorithm has potentially very high search

Simulation study

This section evaluates the performance of our new adaptive strategies for locating the servers in MANETs. First, we investigate the probability of route staleness as a function of the rate of proactive advertising via simulation. Second, we compare the performance of various strategies using the number of transmitted packets as the performance metric. These compared strategies may or may not use proactive advertising. They may use the expanding ring flooding or our spiral flooding for reactive

Related work

The tradeoffs between reactive and proactive strategies have been investigated in the context of (1) ad hoc routing, (2) caching in ad hoc networks, and (3) search in sensor networks.

For ad hoc routing there are three categories of protocols. Reactive protocols, such as AODV [21] and DSR [14], delay route discovery until a route is required. Proactive protocols, represented by DSDV [20], exchange routing information periodically between hosts. Hybrid protocols, such as ZRP [9] and SHARP [22],

Conclusions

In this paper we have studied adaptive, hybrid strategies for locating servers in MANETs. After we theoretically prove the existence of the optimal operating point, we show our exponential backoff algorithm can rapidly probe a near-optimal operating point which balances proactive advertising by the servers and reactive discovery by the mobile hosts. The algorithm can adapt to the dynamic network conditions such as the host mobility level and the offered load. Furthermore, we have used a novel

Acknowledgments

The authors would like to thank Ray-Yaung Chang who is involved in developing the simulator and Limin Wang for discussions on flooding search techniques. An earlier version of this work appeared as [12]. The authors would like to thank the anonymous reviewers for their valuable comments and suggestions.

Hongbo Jiang received the B.S. and M.S. degrees from Huazhong University of Science and Technology, China. He is currently working toward the Ph.D. degree in Computer Science at Case Western Reserve University, Cleveland, OH. His research concerns computer networking, especially algorithms and architectures for high-performance networks and wireless networks.

References (25)

  • Y. Baryshnikov et al.

    Flood search under the California split rule

    Oper. Res. Lett.

    (2004)
  • D. Braginsky, D. Estrin, Rumor routing algorithm for sensor networks, in: Proceedings of IEEE International Conference...
  • T. Camp et al.

    A survey of mobility models for ad hoc network research

    Mobile Ad Hoc Networking

    Wireless Comm. Mobile Comput.

    (2002)
  • N. Chang, M. Liu, Revisiting the TTL-based controlled flooding search: Optimality and randomization, in: Proceedings of...
  • N. Chang, M. Liu, Controlled flooding search in a large network, in: Proceedings of Modeling and Optimization in...
  • Z. Cheng, W.B. Heinzelman, Flooding strategy for target discovery in wireless networks, in: Proceedings of ACM...
  • M.S. Corson et al.

    Internet-based mobile ad hoc networking

    IEEE Internet Comput.

    (1999)
  • R. Friedman, M. Gradinariu, G. Simon, Locating cache proxies in MANETs, in: Proceedings of ACM International Symposium...
  • Z. Haas, A new routing protocol for the reconfigurable wireless networks, in: Proceedings of the IEEE International...
  • T. Hara, Effective replica allocation in ad hoc networks for improving data accessibility, in: Proceedings of IEEE...
  • T. Hara

    Replica allocation methods in ad hoc networks with data update

    ACM-Kluwer J. Mobile Netw. Appl.

    (2003)
  • H. Jiang, S. Jin, Adaptive strategies for efficiently locating Internet-based servers in MANETs, in: Proceedings of ACM...
  • Cited by (5)

    Hongbo Jiang received the B.S. and M.S. degrees from Huazhong University of Science and Technology, China. He is currently working toward the Ph.D. degree in Computer Science at Case Western Reserve University, Cleveland, OH. His research concerns computer networking, especially algorithms and architectures for high-performance networks and wireless networks.

    Shudong Jin (M ’00 / ACM ’01) received his B.S. and M.S. from Huazhong University of Science and Technology, China, and received his Ph.D. from Boston University. He is an assistant professor in Computer Science at Case Western Reserve University. His research interests include network protocols and algorithms, network modeling and performance evaluation, multimedia streaming, and pervasive computing. His email address is [email protected].

    View full text