SlideShare a Scribd company logo
1 of 19
Conference on Future Internet
Communications 2013
Guaranteed Greedy Routing in
Overlay Networks
Dragan Milic and Torsten Braun
Universität Bern, Switzerland
braun@iam.unibe.ch, cds.unibe.ch
Overview
> Introduction
— Motivation
— Greedy Routing in Virtual Spaces
— Greedy Routing Failure
> Overlay Network Construction for Greedy Routing
— Nearest Neighbours Convex Set (NNCS)
— Algorithm for NNCS Maintenance
— NNCS Robustness
— Routing Optimization
> NNCS Applications
— Building of Multicast Trees
— Service Discovery
— Spatially Bound Query Flooding
— Network Optimization / QoS
> Evaluation: Relative Path Stretch
> Conclusions
CFIC, Coimbra, May 16, 2013
Torsten Braun: Guaranteed Greedy Routing in Overlay Networks
2
Motivation
> Overlay network construction does often not consider
underlying network topology.
> Overlay network routing protocols
— optimize number of hops along the path, but
— disregard paths’ RTT stretch
= actual RTT on the path through the overlay network
RTT along the optimal path in the underlying network
> Proposal: apply greedy routing in virtual spaces,
where distance between nodes is proportional to their RTT
CFIC, Coimbra, May 16, 2013
Torsten Braun: Guaranteed Greedy Routing in Overlay Networks
3
CFIC, Coimbra, May 16, 2013
Torsten Braun: Guaranteed Greedy Routing in Overlay Networks
4
Positioning Hosts in a Virtual Space
Host 1
Host 2
Host 8
Host 3
Host 5
Host 7
Host 4
Host 6
Physical Network
Virtual Space
Host 1
Host 8
Host 2
Host 3
Host 7
Host 4
Host 5
Host 6
x
y
Greedy Routing in Virtual Spaces
> Next hop =
neighbour with minimal
distance to destination
CFIC, Coimbra, May 16, 2013
Torsten Braun: Guaranteed Greedy Routing in Overlay Networks
5
Greedy Routing Failure
> Problem
— There might not always be
a neighbour closer to the
destination.
> Solutions
— For geographical routing in
mobile ad-hoc networks:
backup routing modes,
e.g., using right-hand rule
in GPSR
— For overlay networks:
construct an overlay
network that ensures to
have always a neighbour
closer to the destination
CFIC, Coimbra, May 16, 2013
Torsten Braun: Guaranteed Greedy Routing in Overlay Networks
6
Overlay Network Construction
for Greedy Routing
CFIC, Coimbra, May 16, 2013
Torsten Braun: Guaranteed Greedy Routing in Overlay Networks
7
> Delaunay triangulation
— can ensure existence of
closer neighbours towards
destination,
— but distributed approach is
complex.
> Solution
— Nearest Neighbors
Convex Set (NNCS)
is based on dividing the
virtual space into half spaces.
Current Node
Neighbour Node
Half Space
Nearest Neighbours Convex Set (NNCS)
> Construct half spaces
for all neighbours of a node
> NNCS
— is a convex set
defined by intersection of
all half spaces.
— guarantees that
greedy routing makes
progress at each node.
CFIC, Coimbra, May 16, 2013
Torsten Braun: Guaranteed Greedy Routing in Overlay Networks
8
Current Node
Neighbour Node
Other Nodes
Half Space
Algorithm for NNCS Maintenance
CFIC, Coimbra, May 16, 2013
Torsten Braun: Guaranteed Greedy Routing in Overlay Networks
9
NNCS Robustness
> Problem
— In case of churns or
failures, NNCS may lead to
routing failures or isolated
nodes.
> Solution
— Add second NNCS layer by
constructing a NNCS without
considering the nodes in the
first layer of the NNCS
CFIC, Coimbra, May 16, 2013
Torsten Braun: Guaranteed Greedy Routing in Overlay Networks
10
Routing Optimization
CFIC, Coimbra, May 16, 2013
Torsten Braun: Guaranteed Greedy Routing in Overlay Networks
11
> Problem
— NNCS selects close
neighbours, which leads to many
hops.
— Fisheye overlay network with a
mix of close and distant
neighbours, but greedy routing
using a Fisheye overlay network
does not guarantee progress.
> Solution
— maintain NNCS and Fisheye
overlay network sets
— select next hop making most
progress from both node sets
D. Milic, T. Braun: “Fisheye: Topology aware
choice of peers for overlay networks”,
34th IEEE Local Computer Networks, 2009
Applications
> Building of Multicast Trees
> Service Discovery
> Spatially Bound Query Flooding
> Network Optimization / QoS
CFIC, Coimbra, May 16, 2013
Torsten Braun: Guaranteed Greedy Routing in Overlay Networks
12
Building of Multicast Trees
> Reverse path multicast routing
> Node R forwards a received
multicast message to all
nodes that would use R
for routing a unicast
message to the source
CFIC, Coimbra, May 16, 2013
Torsten Braun: Guaranteed Greedy Routing in Overlay Networks
13
Service Discovery
CFIC, Coimbra, May 16, 2013
Torsten Braun: Guaranteed Greedy Routing in Overlay Networks
14
> Problem
— Service discovery is
usually based on flooding.
— Efficient flooding
mechanisms
> Solution
— Forwarding of query
message along reverse path
Query Source
End Systems
with Query Source
in their NNCS
Other Nodes
Flooding Path
Spatially Bound Query Flooding
> Queries can easily bound
within a certain area, e.g.,
a hyper ball, to ensure RTT
between query source and
server.
CFIC, Coimbra, May 16, 2013
Torsten Braun: Guaranteed Greedy Routing in Overlay Networks
15
Query Source
End Systems
with Query Source
in their NNCS
Other Nodes
Flooding Path
Network Optimization / QoS
> Paths fulfilling RTT / QoS
requirements must be within
an ellipsoid around source
and destination.
> Ellipsoid as bounding area
for path to be selected.
CFIC, Coimbra, May 16, 2013
Torsten Braun: Guaranteed Greedy Routing in Overlay Networks
16
Relative Path Stretch
> NNCS evaluation using OMNET++
> Different data sets
— PlanetLab data for 217 overlay nodes
— KING data for 462 overlay nodes
> Comparison of NNCS using different
virtual space dimensions with Pastry
CFIC, Coimbra, May 16, 2013
Torsten Braun: Guaranteed Greedy Routing in Overlay Networks
17
Conclusions
> NNCS enables greedy routing in overlay networks using
virtual space embedding.
> Various applications can take advantage of NNCS.
> NNCS based approach outperforms Pastry.
CFIC, Coimbra, May 16, 2013
Torsten Braun: Guaranteed Greedy Routing in Overlay Networks
18
Thanks for your Attention !
> cds.unibe.ch
> slideshare.net/torstenbraun
> braun@iam.unibe.ch
Torsten Braun: Guaranteed Greedy Routing in Overlay Networks
CFIC, Coimbra, May 16, 2013 19

More Related Content

What's hot

Caching in Information Centric Network (ICN)
Caching in Information Centric Network (ICN)Caching in Information Centric Network (ICN)
Caching in Information Centric Network (ICN)Lippo Group Digital
 
Cm32996999
Cm32996999Cm32996999
Cm32996999IJMER
 
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...IJERA Editor
 
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationPerformance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationIDES Editor
 
Congestion control, routing, and scheduling 2015
Congestion control, routing, and scheduling 2015Congestion control, routing, and scheduling 2015
Congestion control, routing, and scheduling 2015parry prabhu
 
Content centric networks
Content centric networksContent centric networks
Content centric networksMeshingo Jack
 
Information Centric Networking and Content Addressability
Information Centric Networking and Content AddressabilityInformation Centric Networking and Content Addressability
Information Centric Networking and Content AddressabilityShi Junxiao
 
Optimal Converge cast Methods for Tree- Based WSNs
Optimal Converge cast Methods for Tree- Based WSNsOptimal Converge cast Methods for Tree- Based WSNs
Optimal Converge cast Methods for Tree- Based WSNsIJMER
 
M.Phil Computer Science Wireless Communication Projects
M.Phil Computer Science Wireless Communication ProjectsM.Phil Computer Science Wireless Communication Projects
M.Phil Computer Science Wireless Communication ProjectsVijay Karan
 
QOD PHASE-1 FINAL PPT
QOD PHASE-1 FINAL PPTQOD PHASE-1 FINAL PPT
QOD PHASE-1 FINAL PPTAAKASH S
 
Using In-Network Adaptation to Tackle Inefficiencies Caused by DASH in Inf...
Using In-Network Adaptation to Tackle Inefficiencies Caused by DASH in Inf...Using In-Network Adaptation to Tackle Inefficiencies Caused by DASH in Inf...
Using In-Network Adaptation to Tackle Inefficiencies Caused by DASH in Inf...Benjamin Rainer
 
Link Capacity Estimation in SDN-based End-hosts
Link Capacity Estimation in SDN-based End-hostsLink Capacity Estimation in SDN-based End-hosts
Link Capacity Estimation in SDN-based End-hostsFarzaneh Pakzad
 
M.E Computer Science Wireless Communication Projects
M.E Computer Science Wireless Communication ProjectsM.E Computer Science Wireless Communication Projects
M.E Computer Science Wireless Communication ProjectsVijay Karan
 
Energy Conservation in Wireless Sensor Networks Using Cluster-Based Approach
Energy Conservation in Wireless Sensor Networks Using Cluster-Based ApproachEnergy Conservation in Wireless Sensor Networks Using Cluster-Based Approach
Energy Conservation in Wireless Sensor Networks Using Cluster-Based ApproachIJRES Journal
 
Application Aware Topology Generation for Surface Wave Networks-on-Chip
Application Aware Topology Generation for Surface Wave Networks-on-ChipApplication Aware Topology Generation for Surface Wave Networks-on-Chip
Application Aware Topology Generation for Surface Wave Networks-on-Chipzhao fu
 

What's hot (19)

Caching in Information Centric Network (ICN)
Caching in Information Centric Network (ICN)Caching in Information Centric Network (ICN)
Caching in Information Centric Network (ICN)
 
Cm32996999
Cm32996999Cm32996999
Cm32996999
 
Named Data Networking
Named Data NetworkingNamed Data Networking
Named Data Networking
 
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
 
A Systematic Review of Congestion Control in Ad Hoc Network
A Systematic Review of Congestion Control in Ad Hoc NetworkA Systematic Review of Congestion Control in Ad Hoc Network
A Systematic Review of Congestion Control in Ad Hoc Network
 
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationPerformance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
 
Congestion control, routing, and scheduling 2015
Congestion control, routing, and scheduling 2015Congestion control, routing, and scheduling 2015
Congestion control, routing, and scheduling 2015
 
Content centric networks
Content centric networksContent centric networks
Content centric networks
 
Information Centric Networking and Content Addressability
Information Centric Networking and Content AddressabilityInformation Centric Networking and Content Addressability
Information Centric Networking and Content Addressability
 
Named data networking. Basic Principle
Named data networking. Basic PrincipleNamed data networking. Basic Principle
Named data networking. Basic Principle
 
Optimal Converge cast Methods for Tree- Based WSNs
Optimal Converge cast Methods for Tree- Based WSNsOptimal Converge cast Methods for Tree- Based WSNs
Optimal Converge cast Methods for Tree- Based WSNs
 
I1102014953
I1102014953I1102014953
I1102014953
 
M.Phil Computer Science Wireless Communication Projects
M.Phil Computer Science Wireless Communication ProjectsM.Phil Computer Science Wireless Communication Projects
M.Phil Computer Science Wireless Communication Projects
 
QOD PHASE-1 FINAL PPT
QOD PHASE-1 FINAL PPTQOD PHASE-1 FINAL PPT
QOD PHASE-1 FINAL PPT
 
Using In-Network Adaptation to Tackle Inefficiencies Caused by DASH in Inf...
Using In-Network Adaptation to Tackle Inefficiencies Caused by DASH in Inf...Using In-Network Adaptation to Tackle Inefficiencies Caused by DASH in Inf...
Using In-Network Adaptation to Tackle Inefficiencies Caused by DASH in Inf...
 
Link Capacity Estimation in SDN-based End-hosts
Link Capacity Estimation in SDN-based End-hostsLink Capacity Estimation in SDN-based End-hosts
Link Capacity Estimation in SDN-based End-hosts
 
M.E Computer Science Wireless Communication Projects
M.E Computer Science Wireless Communication ProjectsM.E Computer Science Wireless Communication Projects
M.E Computer Science Wireless Communication Projects
 
Energy Conservation in Wireless Sensor Networks Using Cluster-Based Approach
Energy Conservation in Wireless Sensor Networks Using Cluster-Based ApproachEnergy Conservation in Wireless Sensor Networks Using Cluster-Based Approach
Energy Conservation in Wireless Sensor Networks Using Cluster-Based Approach
 
Application Aware Topology Generation for Surface Wave Networks-on-Chip
Application Aware Topology Generation for Surface Wave Networks-on-ChipApplication Aware Topology Generation for Surface Wave Networks-on-Chip
Application Aware Topology Generation for Surface Wave Networks-on-Chip
 

Viewers also liked

Mobile transport layer
 Mobile transport layer Mobile transport layer
Mobile transport layerSonaliAjankar
 
TCP Performance Optimizations for Wireless Sensor Networks
TCP Performance Optimizations forWireless Sensor NetworksTCP Performance Optimizations forWireless Sensor Networks
TCP Performance Optimizations for Wireless Sensor NetworksTorsten Braun, Universität Bern
 
ad-hoc network by divyajyothi
ad-hoc network by divyajyothiad-hoc network by divyajyothi
ad-hoc network by divyajyothidivyajyothi405
 
TCP over wireless slides
TCP over wireless slidesTCP over wireless slides
TCP over wireless slidesMahesh Rajawat
 
Inter-Cell Interference Coordination in Heterogeneous Networks with Open Ac...
Inter-Cell Interference Coordination in  Heterogeneous Networks with Open  Ac...Inter-Cell Interference Coordination in  Heterogeneous Networks with Open  Ac...
Inter-Cell Interference Coordination in Heterogeneous Networks with Open Ac...toha ardi nugraha
 

Viewers also liked (11)

Internet of Things and Future Internet
Internet of Things and Future InternetInternet of Things and Future Internet
Internet of Things and Future Internet
 
Collaborations with U Coimbra and BME
Collaborations with U Coimbra and BMECollaborations with U Coimbra and BME
Collaborations with U Coimbra and BME
 
Soziale Netze – Einsatzmöglichkeiten der Zukunft
Soziale Netze – Einsatzmöglichkeiten der ZukunftSoziale Netze – Einsatzmöglichkeiten der Zukunft
Soziale Netze – Einsatzmöglichkeiten der Zukunft
 
Real-World Energy Measurements of a Wireless Mesh Network
Real-World Energy Measurements of a Wireless Mesh NetworkReal-World Energy Measurements of a Wireless Mesh Network
Real-World Energy Measurements of a Wireless Mesh Network
 
Mobile transport layer
 Mobile transport layer Mobile transport layer
Mobile transport layer
 
TCP Performance Optimizations for Wireless Sensor Networks
TCP Performance Optimizations forWireless Sensor NetworksTCP Performance Optimizations forWireless Sensor Networks
TCP Performance Optimizations for Wireless Sensor Networks
 
ad-hoc network by divyajyothi
ad-hoc network by divyajyothiad-hoc network by divyajyothi
ad-hoc network by divyajyothi
 
TCP over wireless slides
TCP over wireless slidesTCP over wireless slides
TCP over wireless slides
 
Inter-Cell Interference Coordination in Heterogeneous Networks with Open Ac...
Inter-Cell Interference Coordination in  Heterogeneous Networks with Open  Ac...Inter-Cell Interference Coordination in  Heterogeneous Networks with Open  Ac...
Inter-Cell Interference Coordination in Heterogeneous Networks with Open Ac...
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
IoT architecture
IoT architectureIoT architecture
IoT architecture
 

Similar to Guaranteed Greedy Routing in Overlay Networks

Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc Networks
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc NetworksHexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc Networks
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc NetworksIJTET Journal
 
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKSEFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKSijwmn
 
Multi-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network ArchitectureMulti-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network Architectureijsrd.com
 
A neighbor coverage based probabilistic rebroadcast for reducing routing over...
A neighbor coverage based probabilistic rebroadcast for reducing routing over...A neighbor coverage based probabilistic rebroadcast for reducing routing over...
A neighbor coverage based probabilistic rebroadcast for reducing routing over...JPINFOTECH JAYAPRAKASH
 
Analysis of Selfish behavior in energy consumption model based Multihop cellu...
Analysis of Selfish behavior in energy consumption model based Multihop cellu...Analysis of Selfish behavior in energy consumption model based Multihop cellu...
Analysis of Selfish behavior in energy consumption model based Multihop cellu...ijsrd.com
 
Addressing the Digital Divide: LR-PON Planning for Sparsely Populated Areas
Addressing the Digital Divide: LR-PON Planning for Sparsely Populated AreasAddressing the Digital Divide: LR-PON Planning for Sparsely Populated Areas
Addressing the Digital Divide: LR-PON Planning for Sparsely Populated AreasSaptadeep Pal
 
A QoS oriented distributed routing protocol for Hybrid Wireless Network :Firs...
A QoS oriented distributed routing protocol for Hybrid Wireless Network :Firs...A QoS oriented distributed routing protocol for Hybrid Wireless Network :Firs...
A QoS oriented distributed routing protocol for Hybrid Wireless Network :Firs...AAKASH S
 
Ad-Hoc Wireless Network
Ad-Hoc Wireless NetworkAd-Hoc Wireless Network
Ad-Hoc Wireless Networkmdfarhanh1
 
Active path updation for layered routing (apular) in wireless
Active path updation for layered routing (apular) in wirelessActive path updation for layered routing (apular) in wireless
Active path updation for layered routing (apular) in wirelessAlexander Decker
 
Active Path Updation For Layered Routing (Apular) In Wireless Mesh Networks
Active Path Updation For Layered Routing (Apular) In Wireless Mesh NetworksActive Path Updation For Layered Routing (Apular) In Wireless Mesh Networks
Active Path Updation For Layered Routing (Apular) In Wireless Mesh Networkschetan1nonly
 
Multi hop distributed coordination in
Multi hop distributed coordination inMulti hop distributed coordination in
Multi hop distributed coordination inIJCNCJournal
 
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS cscpconf
 
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...IJTET Journal
 
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkQuadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkIJCI JOURNAL
 
Routing Protocols
Routing ProtocolsRouting Protocols
Routing ProtocolsBIT DURG
 
Datagram vs. virtual circuit
Datagram vs. virtual circuitDatagram vs. virtual circuit
Datagram vs. virtual circuitVikash Gangwar
 

Similar to Guaranteed Greedy Routing in Overlay Networks (20)

Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc Networks
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc NetworksHexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc Networks
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc Networks
 
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKSEFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
 
IJET-V2I6P5
IJET-V2I6P5IJET-V2I6P5
IJET-V2I6P5
 
Multi-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network ArchitectureMulti-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network Architecture
 
A neighbor coverage based probabilistic rebroadcast for reducing routing over...
A neighbor coverage based probabilistic rebroadcast for reducing routing over...A neighbor coverage based probabilistic rebroadcast for reducing routing over...
A neighbor coverage based probabilistic rebroadcast for reducing routing over...
 
Analysis of Selfish behavior in energy consumption model based Multihop cellu...
Analysis of Selfish behavior in energy consumption model based Multihop cellu...Analysis of Selfish behavior in energy consumption model based Multihop cellu...
Analysis of Selfish behavior in energy consumption model based Multihop cellu...
 
Addressing the Digital Divide: LR-PON Planning for Sparsely Populated Areas
Addressing the Digital Divide: LR-PON Planning for Sparsely Populated AreasAddressing the Digital Divide: LR-PON Planning for Sparsely Populated Areas
Addressing the Digital Divide: LR-PON Planning for Sparsely Populated Areas
 
A QoS oriented distributed routing protocol for Hybrid Wireless Network :Firs...
A QoS oriented distributed routing protocol for Hybrid Wireless Network :Firs...A QoS oriented distributed routing protocol for Hybrid Wireless Network :Firs...
A QoS oriented distributed routing protocol for Hybrid Wireless Network :Firs...
 
Ad-Hoc Wireless Network
Ad-Hoc Wireless NetworkAd-Hoc Wireless Network
Ad-Hoc Wireless Network
 
Active path updation for layered routing (apular) in wireless
Active path updation for layered routing (apular) in wirelessActive path updation for layered routing (apular) in wireless
Active path updation for layered routing (apular) in wireless
 
Active Path Updation For Layered Routing (Apular) In Wireless Mesh Networks
Active Path Updation For Layered Routing (Apular) In Wireless Mesh NetworksActive Path Updation For Layered Routing (Apular) In Wireless Mesh Networks
Active Path Updation For Layered Routing (Apular) In Wireless Mesh Networks
 
Last
LastLast
Last
 
Routing protocols in ad hoc network
Routing protocols in ad hoc networkRouting protocols in ad hoc network
Routing protocols in ad hoc network
 
Multi hop distributed coordination in
Multi hop distributed coordination inMulti hop distributed coordination in
Multi hop distributed coordination in
 
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
 
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
 
9517cnc06
9517cnc069517cnc06
9517cnc06
 
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkQuadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
 
Routing Protocols
Routing ProtocolsRouting Protocols
Routing Protocols
 
Datagram vs. virtual circuit
Datagram vs. virtual circuitDatagram vs. virtual circuit
Datagram vs. virtual circuit
 

More from Torsten Braun, Universität Bern

Information-Centric Networking in Wireless/Mobile Networks
Information-Centric Networking in Wireless/Mobile NetworksInformation-Centric Networking in Wireless/Mobile Networks
Information-Centric Networking in Wireless/Mobile NetworksTorsten Braun, Universität Bern
 
Performance Evaluation of Opportunistic Routing Protocols: A Framework-based ...
Performance Evaluation of Opportunistic Routing Protocols: A Framework-based ...Performance Evaluation of Opportunistic Routing Protocols: A Framework-based ...
Performance Evaluation of Opportunistic Routing Protocols: A Framework-based ...Torsten Braun, Universität Bern
 
A4-Mesh: Authentication, Authorization, Accounting, and Auditing in Wireless...
A4-Mesh: Authentication, Authorization, Accounting, and Auditing in Wireless...A4-Mesh: Authentication, Authorization, Accounting, and Auditing in Wireless...
A4-Mesh: Authentication, Authorization, Accounting, and Auditing in Wireless...Torsten Braun, Universität Bern
 
Future Mobile Telecommunication Networks Using Cloud Technologies
Future Mobile Telecommunication Networks Using Cloud TechnologiesFuture Mobile Telecommunication Networks Using Cloud Technologies
Future Mobile Telecommunication Networks Using Cloud TechnologiesTorsten Braun, Universität Bern
 
Wmich 2012Reliable and Energy-Efficient Communication in Wireless Sensor Netw...
Wmich 2012Reliable and Energy-Efficient Communication in Wireless Sensor Netw...Wmich 2012Reliable and Energy-Efficient Communication in Wireless Sensor Netw...
Wmich 2012Reliable and Energy-Efficient Communication in Wireless Sensor Netw...Torsten Braun, Universität Bern
 
Reliable and Energy-Efficient Communication in Wireless Sensor Networks
Reliable and Energy-Efficient Communication in Wireless Sensor NetworksReliable and Energy-Efficient Communication in Wireless Sensor Networks
Reliable and Energy-Efficient Communication in Wireless Sensor NetworksTorsten Braun, Universität Bern
 
Topology Control and Mobility Strategy for UAV Ad-hoc Networks
Topology Control and Mobility Strategy for UAV Ad-hoc NetworksTopology Control and Mobility Strategy for UAV Ad-hoc Networks
Topology Control and Mobility Strategy for UAV Ad-hoc NetworksTorsten Braun, Universität Bern
 
Content-Centric Networking in Delay/Disruption-Tolerant Networks
Content-Centric Networking in Delay/Disruption-Tolerant NetworksContent-Centric Networking in Delay/Disruption-Tolerant Networks
Content-Centric Networking in Delay/Disruption-Tolerant NetworksTorsten Braun, Universität Bern
 
A smart Multi-hop hierarchical routing protocol for Efficient VIdeo communica...
A smart Multi-hop hierarchical routing protocol for Efficient VIdeo communica...A smart Multi-hop hierarchical routing protocol for Efficient VIdeo communica...
A smart Multi-hop hierarchical routing protocol for Efficient VIdeo communica...Torsten Braun, Universität Bern
 
On Hardware and Software Approaches to Monitor Wireless Mesh and Sensor Networks
On Hardware and Software Approaches to Monitor Wireless Mesh and Sensor NetworksOn Hardware and Software Approaches to Monitor Wireless Mesh and Sensor Networks
On Hardware and Software Approaches to Monitor Wireless Mesh and Sensor NetworksTorsten Braun, Universität Bern
 
Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wi...
Development and Evaluation of Energy-Efficient and Adaptive Protocolsfor Wi...Development and Evaluation of Energy-Efficient and Adaptive Protocolsfor Wi...
Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wi...Torsten Braun, Universität Bern
 

More from Torsten Braun, Universität Bern (14)

Ic0906 wi-uav UAVNet
Ic0906 wi-uav UAVNetIc0906 wi-uav UAVNet
Ic0906 wi-uav UAVNet
 
Die Evolution des Internet
Die Evolution des InternetDie Evolution des Internet
Die Evolution des Internet
 
Information-Centric Networking in Wireless/Mobile Networks
Information-Centric Networking in Wireless/Mobile NetworksInformation-Centric Networking in Wireless/Mobile Networks
Information-Centric Networking in Wireless/Mobile Networks
 
Performance Evaluation of Opportunistic Routing Protocols: A Framework-based ...
Performance Evaluation of Opportunistic Routing Protocols: A Framework-based ...Performance Evaluation of Opportunistic Routing Protocols: A Framework-based ...
Performance Evaluation of Opportunistic Routing Protocols: A Framework-based ...
 
A4-Mesh: Authentication, Authorization, Accounting, and Auditing in Wireless...
A4-Mesh: Authentication, Authorization, Accounting, and Auditing in Wireless...A4-Mesh: Authentication, Authorization, Accounting, and Auditing in Wireless...
A4-Mesh: Authentication, Authorization, Accounting, and Auditing in Wireless...
 
Future Mobile Telecommunication Networks Using Cloud Technologies
Future Mobile Telecommunication Networks Using Cloud TechnologiesFuture Mobile Telecommunication Networks Using Cloud Technologies
Future Mobile Telecommunication Networks Using Cloud Technologies
 
Wmich 2012Reliable and Energy-Efficient Communication in Wireless Sensor Netw...
Wmich 2012Reliable and Energy-Efficient Communication in Wireless Sensor Netw...Wmich 2012Reliable and Energy-Efficient Communication in Wireless Sensor Netw...
Wmich 2012Reliable and Energy-Efficient Communication in Wireless Sensor Netw...
 
Reliable and Energy-Efficient Communication in Wireless Sensor Networks
Reliable and Energy-Efficient Communication in Wireless Sensor NetworksReliable and Energy-Efficient Communication in Wireless Sensor Networks
Reliable and Energy-Efficient Communication in Wireless Sensor Networks
 
Topology Control and Mobility Strategy for UAV Ad-hoc Networks
Topology Control and Mobility Strategy for UAV Ad-hoc NetworksTopology Control and Mobility Strategy for UAV Ad-hoc Networks
Topology Control and Mobility Strategy for UAV Ad-hoc Networks
 
Content-Centric Networking in Delay/Disruption-Tolerant Networks
Content-Centric Networking in Delay/Disruption-Tolerant NetworksContent-Centric Networking in Delay/Disruption-Tolerant Networks
Content-Centric Networking in Delay/Disruption-Tolerant Networks
 
A smart Multi-hop hierarchical routing protocol for Efficient VIdeo communica...
A smart Multi-hop hierarchical routing protocol for Efficient VIdeo communica...A smart Multi-hop hierarchical routing protocol for Efficient VIdeo communica...
A smart Multi-hop hierarchical routing protocol for Efficient VIdeo communica...
 
On Hardware and Software Approaches to Monitor Wireless Mesh and Sensor Networks
On Hardware and Software Approaches to Monitor Wireless Mesh and Sensor NetworksOn Hardware and Software Approaches to Monitor Wireless Mesh and Sensor Networks
On Hardware and Software Approaches to Monitor Wireless Mesh and Sensor Networks
 
Research Challenges in Networked Systems
Research Challenges in Networked SystemsResearch Challenges in Networked Systems
Research Challenges in Networked Systems
 
Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wi...
Development and Evaluation of Energy-Efficient and Adaptive Protocolsfor Wi...Development and Evaluation of Energy-Efficient and Adaptive Protocolsfor Wi...
Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wi...
 

Recently uploaded

Scenario Library et REX Discover industry- and role- based scenarios
Scenario Library et REX Discover industry- and role- based scenariosScenario Library et REX Discover industry- and role- based scenarios
Scenario Library et REX Discover industry- and role- based scenariosErol GIRAUDY
 
UiPath Studio Web workshop series - Day 1
UiPath Studio Web workshop series  - Day 1UiPath Studio Web workshop series  - Day 1
UiPath Studio Web workshop series - Day 1DianaGray10
 
Keep Your Finger on the Pulse of Your Building's Performance with IES Live
Keep Your Finger on the Pulse of Your Building's Performance with IES LiveKeep Your Finger on the Pulse of Your Building's Performance with IES Live
Keep Your Finger on the Pulse of Your Building's Performance with IES LiveIES VE
 
The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)IES VE
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc
 
Planetek Italia Srl - Corporate Profile Brochure
Planetek Italia Srl - Corporate Profile BrochurePlanetek Italia Srl - Corporate Profile Brochure
Planetek Italia Srl - Corporate Profile BrochurePlanetek Italia Srl
 
Where developers are challenged, what developers want and where DevEx is going
Where developers are challenged, what developers want and where DevEx is goingWhere developers are challenged, what developers want and where DevEx is going
Where developers are challenged, what developers want and where DevEx is goingFrancesco Corti
 
LF Energy Webinar - Unveiling OpenEEMeter 4.0
LF Energy Webinar - Unveiling OpenEEMeter 4.0LF Energy Webinar - Unveiling OpenEEMeter 4.0
LF Energy Webinar - Unveiling OpenEEMeter 4.0DanBrown980551
 
.NET 8 ChatBot with Azure OpenAI Services.pptx
.NET 8 ChatBot with Azure OpenAI Services.pptx.NET 8 ChatBot with Azure OpenAI Services.pptx
.NET 8 ChatBot with Azure OpenAI Services.pptxHansamali Gamage
 
Trailblazer Community - Flows Workshop (Session 2)
Trailblazer Community - Flows Workshop (Session 2)Trailblazer Community - Flows Workshop (Session 2)
Trailblazer Community - Flows Workshop (Session 2)Muhammad Tiham Siddiqui
 
Graphene Quantum Dots-Based Composites for Biomedical Applications
Graphene Quantum Dots-Based Composites for  Biomedical ApplicationsGraphene Quantum Dots-Based Composites for  Biomedical Applications
Graphene Quantum Dots-Based Composites for Biomedical Applicationsnooralam814309
 
Novo Nordisk's journey in developing an open-source application on Neo4j
Novo Nordisk's journey in developing an open-source application on Neo4jNovo Nordisk's journey in developing an open-source application on Neo4j
Novo Nordisk's journey in developing an open-source application on Neo4jNeo4j
 
Oracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptxOracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptxSatishbabu Gunukula
 
2024.03.12 Cost drivers of cultivated meat production.pdf
2024.03.12 Cost drivers of cultivated meat production.pdf2024.03.12 Cost drivers of cultivated meat production.pdf
2024.03.12 Cost drivers of cultivated meat production.pdfThe Good Food Institute
 
UiPath Studio Web workshop series - Day 2
UiPath Studio Web workshop series - Day 2UiPath Studio Web workshop series - Day 2
UiPath Studio Web workshop series - Day 2DianaGray10
 
Flow Control | Block Size | ST Min | First Frame
Flow Control | Block Size | ST Min | First FrameFlow Control | Block Size | ST Min | First Frame
Flow Control | Block Size | ST Min | First FrameKapil Thakar
 
EMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarEMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarThousandEyes
 
UiPath Studio Web workshop Series - Day 3
UiPath Studio Web workshop Series - Day 3UiPath Studio Web workshop Series - Day 3
UiPath Studio Web workshop Series - Day 3DianaGray10
 
Technical SEO for Improved Accessibility WTS FEST
Technical SEO for Improved Accessibility  WTS FESTTechnical SEO for Improved Accessibility  WTS FEST
Technical SEO for Improved Accessibility WTS FESTBillieHyde
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 

Recently uploaded (20)

Scenario Library et REX Discover industry- and role- based scenarios
Scenario Library et REX Discover industry- and role- based scenariosScenario Library et REX Discover industry- and role- based scenarios
Scenario Library et REX Discover industry- and role- based scenarios
 
UiPath Studio Web workshop series - Day 1
UiPath Studio Web workshop series  - Day 1UiPath Studio Web workshop series  - Day 1
UiPath Studio Web workshop series - Day 1
 
Keep Your Finger on the Pulse of Your Building's Performance with IES Live
Keep Your Finger on the Pulse of Your Building's Performance with IES LiveKeep Your Finger on the Pulse of Your Building's Performance with IES Live
Keep Your Finger on the Pulse of Your Building's Performance with IES Live
 
The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
 
Planetek Italia Srl - Corporate Profile Brochure
Planetek Italia Srl - Corporate Profile BrochurePlanetek Italia Srl - Corporate Profile Brochure
Planetek Italia Srl - Corporate Profile Brochure
 
Where developers are challenged, what developers want and where DevEx is going
Where developers are challenged, what developers want and where DevEx is goingWhere developers are challenged, what developers want and where DevEx is going
Where developers are challenged, what developers want and where DevEx is going
 
LF Energy Webinar - Unveiling OpenEEMeter 4.0
LF Energy Webinar - Unveiling OpenEEMeter 4.0LF Energy Webinar - Unveiling OpenEEMeter 4.0
LF Energy Webinar - Unveiling OpenEEMeter 4.0
 
.NET 8 ChatBot with Azure OpenAI Services.pptx
.NET 8 ChatBot with Azure OpenAI Services.pptx.NET 8 ChatBot with Azure OpenAI Services.pptx
.NET 8 ChatBot with Azure OpenAI Services.pptx
 
Trailblazer Community - Flows Workshop (Session 2)
Trailblazer Community - Flows Workshop (Session 2)Trailblazer Community - Flows Workshop (Session 2)
Trailblazer Community - Flows Workshop (Session 2)
 
Graphene Quantum Dots-Based Composites for Biomedical Applications
Graphene Quantum Dots-Based Composites for  Biomedical ApplicationsGraphene Quantum Dots-Based Composites for  Biomedical Applications
Graphene Quantum Dots-Based Composites for Biomedical Applications
 
Novo Nordisk's journey in developing an open-source application on Neo4j
Novo Nordisk's journey in developing an open-source application on Neo4jNovo Nordisk's journey in developing an open-source application on Neo4j
Novo Nordisk's journey in developing an open-source application on Neo4j
 
Oracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptxOracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptx
 
2024.03.12 Cost drivers of cultivated meat production.pdf
2024.03.12 Cost drivers of cultivated meat production.pdf2024.03.12 Cost drivers of cultivated meat production.pdf
2024.03.12 Cost drivers of cultivated meat production.pdf
 
UiPath Studio Web workshop series - Day 2
UiPath Studio Web workshop series - Day 2UiPath Studio Web workshop series - Day 2
UiPath Studio Web workshop series - Day 2
 
Flow Control | Block Size | ST Min | First Frame
Flow Control | Block Size | ST Min | First FrameFlow Control | Block Size | ST Min | First Frame
Flow Control | Block Size | ST Min | First Frame
 
EMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarEMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? Webinar
 
UiPath Studio Web workshop Series - Day 3
UiPath Studio Web workshop Series - Day 3UiPath Studio Web workshop Series - Day 3
UiPath Studio Web workshop Series - Day 3
 
Technical SEO for Improved Accessibility WTS FEST
Technical SEO for Improved Accessibility  WTS FESTTechnical SEO for Improved Accessibility  WTS FEST
Technical SEO for Improved Accessibility WTS FEST
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 

Guaranteed Greedy Routing in Overlay Networks

  • 1. Conference on Future Internet Communications 2013 Guaranteed Greedy Routing in Overlay Networks Dragan Milic and Torsten Braun Universität Bern, Switzerland braun@iam.unibe.ch, cds.unibe.ch
  • 2. Overview > Introduction — Motivation — Greedy Routing in Virtual Spaces — Greedy Routing Failure > Overlay Network Construction for Greedy Routing — Nearest Neighbours Convex Set (NNCS) — Algorithm for NNCS Maintenance — NNCS Robustness — Routing Optimization > NNCS Applications — Building of Multicast Trees — Service Discovery — Spatially Bound Query Flooding — Network Optimization / QoS > Evaluation: Relative Path Stretch > Conclusions CFIC, Coimbra, May 16, 2013 Torsten Braun: Guaranteed Greedy Routing in Overlay Networks 2
  • 3. Motivation > Overlay network construction does often not consider underlying network topology. > Overlay network routing protocols — optimize number of hops along the path, but — disregard paths’ RTT stretch = actual RTT on the path through the overlay network RTT along the optimal path in the underlying network > Proposal: apply greedy routing in virtual spaces, where distance between nodes is proportional to their RTT CFIC, Coimbra, May 16, 2013 Torsten Braun: Guaranteed Greedy Routing in Overlay Networks 3
  • 4. CFIC, Coimbra, May 16, 2013 Torsten Braun: Guaranteed Greedy Routing in Overlay Networks 4 Positioning Hosts in a Virtual Space Host 1 Host 2 Host 8 Host 3 Host 5 Host 7 Host 4 Host 6 Physical Network Virtual Space Host 1 Host 8 Host 2 Host 3 Host 7 Host 4 Host 5 Host 6 x y
  • 5. Greedy Routing in Virtual Spaces > Next hop = neighbour with minimal distance to destination CFIC, Coimbra, May 16, 2013 Torsten Braun: Guaranteed Greedy Routing in Overlay Networks 5
  • 6. Greedy Routing Failure > Problem — There might not always be a neighbour closer to the destination. > Solutions — For geographical routing in mobile ad-hoc networks: backup routing modes, e.g., using right-hand rule in GPSR — For overlay networks: construct an overlay network that ensures to have always a neighbour closer to the destination CFIC, Coimbra, May 16, 2013 Torsten Braun: Guaranteed Greedy Routing in Overlay Networks 6
  • 7. Overlay Network Construction for Greedy Routing CFIC, Coimbra, May 16, 2013 Torsten Braun: Guaranteed Greedy Routing in Overlay Networks 7 > Delaunay triangulation — can ensure existence of closer neighbours towards destination, — but distributed approach is complex. > Solution — Nearest Neighbors Convex Set (NNCS) is based on dividing the virtual space into half spaces. Current Node Neighbour Node Half Space
  • 8. Nearest Neighbours Convex Set (NNCS) > Construct half spaces for all neighbours of a node > NNCS — is a convex set defined by intersection of all half spaces. — guarantees that greedy routing makes progress at each node. CFIC, Coimbra, May 16, 2013 Torsten Braun: Guaranteed Greedy Routing in Overlay Networks 8 Current Node Neighbour Node Other Nodes Half Space
  • 9. Algorithm for NNCS Maintenance CFIC, Coimbra, May 16, 2013 Torsten Braun: Guaranteed Greedy Routing in Overlay Networks 9
  • 10. NNCS Robustness > Problem — In case of churns or failures, NNCS may lead to routing failures or isolated nodes. > Solution — Add second NNCS layer by constructing a NNCS without considering the nodes in the first layer of the NNCS CFIC, Coimbra, May 16, 2013 Torsten Braun: Guaranteed Greedy Routing in Overlay Networks 10
  • 11. Routing Optimization CFIC, Coimbra, May 16, 2013 Torsten Braun: Guaranteed Greedy Routing in Overlay Networks 11 > Problem — NNCS selects close neighbours, which leads to many hops. — Fisheye overlay network with a mix of close and distant neighbours, but greedy routing using a Fisheye overlay network does not guarantee progress. > Solution — maintain NNCS and Fisheye overlay network sets — select next hop making most progress from both node sets D. Milic, T. Braun: “Fisheye: Topology aware choice of peers for overlay networks”, 34th IEEE Local Computer Networks, 2009
  • 12. Applications > Building of Multicast Trees > Service Discovery > Spatially Bound Query Flooding > Network Optimization / QoS CFIC, Coimbra, May 16, 2013 Torsten Braun: Guaranteed Greedy Routing in Overlay Networks 12
  • 13. Building of Multicast Trees > Reverse path multicast routing > Node R forwards a received multicast message to all nodes that would use R for routing a unicast message to the source CFIC, Coimbra, May 16, 2013 Torsten Braun: Guaranteed Greedy Routing in Overlay Networks 13
  • 14. Service Discovery CFIC, Coimbra, May 16, 2013 Torsten Braun: Guaranteed Greedy Routing in Overlay Networks 14 > Problem — Service discovery is usually based on flooding. — Efficient flooding mechanisms > Solution — Forwarding of query message along reverse path Query Source End Systems with Query Source in their NNCS Other Nodes Flooding Path
  • 15. Spatially Bound Query Flooding > Queries can easily bound within a certain area, e.g., a hyper ball, to ensure RTT between query source and server. CFIC, Coimbra, May 16, 2013 Torsten Braun: Guaranteed Greedy Routing in Overlay Networks 15 Query Source End Systems with Query Source in their NNCS Other Nodes Flooding Path
  • 16. Network Optimization / QoS > Paths fulfilling RTT / QoS requirements must be within an ellipsoid around source and destination. > Ellipsoid as bounding area for path to be selected. CFIC, Coimbra, May 16, 2013 Torsten Braun: Guaranteed Greedy Routing in Overlay Networks 16
  • 17. Relative Path Stretch > NNCS evaluation using OMNET++ > Different data sets — PlanetLab data for 217 overlay nodes — KING data for 462 overlay nodes > Comparison of NNCS using different virtual space dimensions with Pastry CFIC, Coimbra, May 16, 2013 Torsten Braun: Guaranteed Greedy Routing in Overlay Networks 17
  • 18. Conclusions > NNCS enables greedy routing in overlay networks using virtual space embedding. > Various applications can take advantage of NNCS. > NNCS based approach outperforms Pastry. CFIC, Coimbra, May 16, 2013 Torsten Braun: Guaranteed Greedy Routing in Overlay Networks 18
  • 19. Thanks for your Attention ! > cds.unibe.ch > slideshare.net/torstenbraun > braun@iam.unibe.ch Torsten Braun: Guaranteed Greedy Routing in Overlay Networks CFIC, Coimbra, May 16, 2013 19