Oct 28, 2015 - Tactical mobile ad-hoc networks (MANETs) can benefit from the ability to reliably execute a critical configuration change for all nodes. Must be ...
Design and Evaluation of a Mass Configuration Protocol (MCONF) for Tactical MANETs Peter Katlic
Koushik Kar
James Nguyen
James Morris
Robert Cole
October 28, 2015
Outline
1. Introduction 2. Background and Related Work 3. Methodology 4. Findings 5. Discussion and Conclusion
2/35
Overview
Idea Tactical mobile ad-hoc networks (MANETs) can benefit from the ability to reliably execute a critical configuration change for all nodes. Must be able to: I
propagate in controlled manner
I
avoid node isolation
I
maintain network performance
3/35
Tactical Network
4/35
Challenges Lack of infrastructure I
nodes act as routers
I
multi-hop communications
I
control traffic overhead
I
partitions
Wireless medium I
loss
I
hidden/exposed terminal
I
overlap
I
contention
I
collision
5/35
Goal
Reliable high execution rate
Fast low duration
Efficient low number of sent messages
6/35
Outline
1. Introduction 2. Background and Related Work 3. Methodology 4. Findings 5. Discussion and Conclusion
7/35
Reliable Broadcast
I
Commonly used in ad-hoc wireless networks
I
Broadcast storm problem Approaches
I
I I I I I I I
reverse path forwarding (RPF) hot potato forwarding spanning tree dynamic probabilistic broadcasting double-covered broadcast counter/location/cluster-based simultaneous tx using frequency division
8/35
Configuration Protocols
I
Clock synchronization
I
Addressing (e.g. MANETconf)
I
Full configuration
I
Designed for wired networks (e.g. Network Configuration Protocol (NETCONF)) Approaches
1. Introduction 2. Background and Related Work 3. Methodology 4. Findings 5. Discussion and Conclusion
12/35
MCONF Requirements
I
Propagate configuration change through entire MANET
I
Initiated by root node
I
Various modes of operation
I
Configurable
I
Decision process
I
Support for multiple routing protocols
13/35
Message Types
Type CONFIRM ACK COMMIT DONE LIST
Purpose Gather feedback or warn of impending configuration Respond with feedback and acknowledge impending configuration Configuration command Acknowledge configuration command execution Distribute known node addresses
14/35
Modes of Operation
Mode Baseline u-MCONF c-MCONF I
Early execution
I
Lazy execution
Description Single broadcast Unconditional with confirmation Conditional with confirmation
15/35
Baseline
Single broadcast I
controlled broadcast flood → baseline
I
safe and small changes
I
stable and connected network
16/35
u-MCONF
Unconditional with confirmation I
execution feedback
I
critical change without node input
I
tolerant of network disruption
17/35
u-MCONF Flowchart Start
Wait for Message
no
yes Root Node?
Broadcast COMMIT
yes
Wait for Message no
COMMIT? timeout yes Broadcast COMMIT to 1-hop Neighbors
no
DONE?
yes
Retry? yes
no
1-hop neighbors? no
DONE from all 1-hop neighbors?
yes yes Wait for Message
Execute Action
timeout no
DONE? Retry? yes
no
DONE from all 1-hop neighbors?
yes
Broadcast DONE
no
Execute Action
Stop
18/35
no
c-MCONF
Conditional with confirmation I
input gathering with execution feedback
I
critical change requiring node input
I
tolerant of network disruption
19/35
c-MCONF Flowchart (1/2) Start
Wait for Message
no
no
yes Root Node?
Broadcast CONFIRM
yes
Wait for Message
CONFIRM?
timeout
yes Broadcast CONFIRM to 1-hop Neighbors
yes
no
ACK? Retry? yes
no
1-hop neighbors? no
ACK from all 1-hop neighbors?
yes yes
Wait for Message
Make Decision
timeout
no
ACK? Retry? yes
no
ACK from all 1-hop neighbors?
yes
Broadcast ACK
no
20/35
no
c-MCONF Flowchart (2/2) no
Wait for Message
Execute?
timeout
yes no
COMMIT? Broadcast COMMIT
yes
yes Broadcast COMMIT to 1-hop Neighbors
Wait for Message
yes
timeout
no
1-hop neighbors?
no
DONE? Retry? yes
yes Wait for Message no
DONE from all 1-hop neighbors?
timeout
no
yes
DONE? Retry?
Execute Action
yes
no
DONE from all 1-hop neighbors?
yes
Broadcast DONE
no
Execute Action
Stop
21/35
no
Strategy Realistic Topologies I
Fixed
I
Mobile
MANET Emulation I
Multiple nodes with single machine
I
Repeatable and controlled conditions
I
Mobility Scenarios
Experimentation I
Modes
I
Message Sizes
I
Loss Rates
22/35
Assumptions
I
Addressing previously configured
I
Routing protocol in place
I
Root has one-hop neighbors
I
Mostly connected topology
I
Security/encryption ignored
23/35
Development and Testing Environment
I
Linux
I
LXC Linux containers
I
Extendable Mobile Ad-hoc Network Emulator (EMANE)
I
Common Open Research Emulator (CORE)
I
BonnMotion
I
Shell script
I
R
24/35
Outline
1. Introduction 2. Background and Related Work 3. Methodology 4. Findings 5. Discussion and Conclusion