KEPPAN: Knowledge exploitation for proactively-planned ad-hoc networks

https://doi.org/10.1016/j.jnca.2009.05.003Get rights and content

Abstract

This paper explores the idea of managing mobile ad-hoc networks (MANETs) by the communication needs of their nodes, as a means to facilitate the operation of distributed applications. Specifically, we present a middleware layer that enables reasoning about the multiple possibilities there may exist to ensure satisfiability of certain communication needs. This middleware has been explicitly devised to handle partial and changeable knowledge about the networks, and to guide the search for missing information whenever it cannot conclude whether it will be possible to satisfy some needs. These features provide the basis to implement policies with which to coordinate activities in a MANET, in quest for the configuration that best satisfies the communication needs of its nodes. We provide simulation results to show the comparative advantages of our solution, plus a report of experiments to assess its practicality and usability.

Introduction

Computing is witnessing a shift from desktop machines reliant on fixed, wired networks to wireless networks of mobile devices that communicate without infrastructure support. The paradigm of mobile ad-hoc networks (MANETs) is becoming increasingly popular, with applications in diverse areas like military surveillance (Rubin and Zhang, 2003), emergency situations (Jiang et al., 2004), vehicular networks (Blum et al., 2004), sensor–actor networks (Melodia et al., 2007) and many others.

The problem we address in this paper is that the physical mobility of the nodes of a MANET frequently results in sporadic and transient connectivity, which may cause an application to malfunction if it cannot communicate with the nodes that provide the services it needs. To prevent that, many authors (Basu and Redi, 2004, Chang et al., 2004, Goldenberg et al., 2004) considered scenarios in which the nodes move purposefully to preserve static connectivity requirements, such as maintaining a biconnected network topology. Unfortunately, these tethered mobility (TM) approaches tend to over-restrict the movements of the nodes, which may be very harmful for some applications. As an alternative, the authors of Su et al. (2001), de Rosa et al. (2005) and Härri et al. (2005) opted not to ensure that disconnections do never occur, but to anticipate them using movement prediction (MP) techniques, and then warn the applications or their users about the foreseeable problems. This approach can prevent breaks between pairs of nodes that are exchanging information at a given moment; however, it cannot provide those nodes with information on how to maintain the communications, e.g. by establishing multihop routes through other nodes, migrating services onto nodes that stay within range, etc.

Knowing the limitations of previous approaches, some authors have wondered about enabling proactive-planning of MANETs through knowledge exploitation (KP) (Sen et al., 2005), driven by the communication requirements of the nodes, i.e. by indications that it should be possible to communicate with certain services at specific times and places. The idea starts out by having the nodes exchange information, including whatever they know about:

  • The service provision plans of the different nodes: which services they are going to provide, during what time intervals, etc.

  • The elasticity properties of the services, i.e. whether they can migrate from one node to another, be cloned or leased for a period of time, etc.

  • The motion profiles of the nodes, i.e. their intended/expected movements.

  • Miscellaneous facts like the impossibility to make some moves (e.g. due to the presence of walls), the fact that a given service cannot be provided by certain nodes, etc.

Gathering this information, any node can guess a global picture of the MANET to automatically check the satisfiability of its communication requirements, and derive possible reactions if they cannot be fulfilled. The reactions may imply moving oneself to a specific location, telling others to move, accomplishing service relocations, reconsidering the communication requirements themselves, etc. In any case, it is up to the applications or the users of the different nodes to agree on which reactions to apply and enforce the corresponding rearrangements.

Research into knowledge exploitation in MANETs is still incipient. Even though we can trace back its origins to the wealthy literature of autonomous systems (Dobson et al., 2006), the idea was fully described in Handorean et al. (2004), where the authors sketched the formalisms needed to represent pieces of information about a network and to reason about the knowledge they convey. Later, Mecella et al. (2006) presented an architecture to support collaborative applications in MANETs, focusing on the coordination procedures with which to handle problems with the satisfiability of communication requirements (specifically, in emergency scenarios). Murphy et al. (2001) proposed a knowledge exchange and coordination scheme based on tuple spaces, which they proved particularly suitable to furnish the view of a shared memory for distributed applications. Also with tuple spaces, Sen et al. (2007) refined the formalisms put forward in Handorean et al. (2004) and built a database of motion profiles to deal with connectivity problems.

All of the aforementioned studies assume the knowledge available about the networks to be perfect, which is rarely true in real environments. Rather the opposite, the knowledge is most often partial (i.e. incomplete) and changeable. When a node appears in a MANET, it only knows about its own location, services and movements, which yields a very limited view of the network to reason about communication requirements. That view can be augmented, progressively, with information retrieved from other nodes, but there are seldom guarantees about its completeness and freshness. Indeed, it usually happens that a node cannot expose complete information about itself; for example, although there are many cases that a node follows a fixed or predictable trajectory—e.g. nodes attached to rails, unmanned vehicles in military applications (Rubin and Zhang, 2003) or virtual nodes whose movement can be controlled at will (Dolev et al., 2004)—complete motion profiles are generally unavailable. This problem was already pointed out in Biskupski et al. (2007), where the authors proposed an abstract agent-based model of self-organizing MANETs, with notions of partiality and changeability in the knowledge available about a network. Another conceptual model was given in Holzer et al. (2007), focusing on the formalization of autonomous and emergent behavior.

The preceding discussion reveals that research into knowledge exploitation remains at a rather theoretical level, since there are no working solutions to the problem of handling imperfect knowledge. Here, we tackle this question by introducing a middleware layer that provides mechanisms for the nodes of a MANET to collaborate in making up the network that best satisfies their communication requirements. This proposal makes contributions related to the following aspects:

  • Analyzing what can be concluded about the possibility to satisfy communication requirements in the face of incomplete knowledge about the MANETs.

  • Characterizing how the conclusions are affected by changes in the knowledge bases, either additions or modifications.

  • Exposing the multiple possibilities there may exist to ensure satisfiability of certain requirements.

  • Assessing practicality of the algorithms that process the knowledge and the amount of information that a mobile device has to handle.

Hereafter, we shall focus on the tasks related to knowledge exploitation, i.e. the modeling of the networks and the reasoning enabled about communication requirements. The various means that may be used to gather location information in MANETs and to ensure its trustworthiness have been surveyed in Friedman and Kliot (2006), Wu and Wu (2006) and Marias et al. (2006), respectively. Likewise, mechanisms to accomplish the dissemination of information among different nodes can be sought in Chen and Wu (2003) and Oyabu et al. (2005) or in the literature of tuple spaces (Gelernter, 1985, Freeman et al., 1999, Xu et al., 2006).

Our proposal, called KEPPAN (knowledge exploitation for proactively-planned ad-hoc networks), is described in Section 2 along with toy examples illustrating all of its features. Later on, Section 3 includes simulation results to show the comparative advantages of this scheme, plus a report of experiments to assess its practicality and usability. Finally, Section 4 provides a summary of conclusions and the motivation of future work.

Section snippets

The KEPPAN middleware

The core of our approach to knowledge exploitation is the scheme shown in Fig. 1, which represents the internal behavior of every node in a MANET. To begin with, through whichever means, a node may receive information about the network at any time. That information serves as the input for a synthesis procedure to automatically generate and update discrete models, that capture the envisaged availability of the different services against time and space. Those models are used by an analysis

Evaluation

The idea of knowledge exploitation can be applied in scenarios with and without human intervention. In the following subsections, we describe the results of simulations and practical experiments we have made to validate the design and implementation of KEPPAN.

Conclusions and future work

We have presented a scheme to support the proactive management of mobile ad-hoc networks, with the goal of improving the stability of the communications. We have worked on the idea of knowledge exploitation, paying attention to the fact—neglected in the literature so far—that every node must handle incomplete and changeable knowledge about other nodes, about the services they provide and about their motion profiles. In this regard, KEPPAN provides the necessary modeling and reasoning mechanisms

Acknowledgment

This work has been partially funded by the Xunta de Galicia, through the research Project PGIDIT04PXIB32201PR.

References (43)

  • A. Fernández-Vilas et al.

    Incremental specification with SCTL/MUS-T: a case study

    Journal of Systems and Software

    (2004)
  • Q. Li et al.

    Communication in disconnected ad hoc networks using message relay

    Parallel and Distributed Computing

    (2003)
  • P. Basu et al.

    Movement control algorithms for realization of fault-tolerant ad hoc robot networks

    IEEE Network

    (2004)
  • B. Biskupski et al.

    Properties and mechanisms of self-organizing MANET and P2P systems

    ACM Transactions on Autonomous and Adaptive Systems

    (2007)
  • J. Blum et al.

    Challenges of intervehicle ad hoc networks

    IEEE Transactions on Intelligent Transportation Systems

    (2004)
  • Chang Y-H, Ho T, Pack Kaelbling L. Mobilized ad-hoc networks: a reinforcement learning approach. In: First IEEE...
  • Chen X, Wu J. Multicasting techniques in mobile ad hoc networks. In: The handbook of ad hoc wireless networks. Boca...
  • Chung W, Park S-Y, Bae H-Y. An extension of XQuery for moving objects over GML. In: International conference on...
  • Clarke E, Grumberg O, Jha S, Lu Y, Veith H. Progress on the state explosion problem in model-checking. In: Lecture...
  • F. de Rosa et al.

    Disconnection prediction in mobile ad hoc networks for supporting cooperative work

    IEEE Pervasive Computing

    (2005)
  • S. Dobson et al.

    A survey of autonomic communications

    ACM Transactions on Autonomous and Adaptive Systems

    (2006)
  • S. Dolev et al.

    Virtual mobile nodes for mobile ad hoc networks

  • Finney MA. FARSITE: fire area simulator—model development and evaluation. Technical Report RMRS-RP-4, Forest Service,...
  • E. Freeman et al.

    JavaSpaces: principles patterns and practice

    (1999)
  • Friedman R, Kliot G. Location services in wireless ad hoc and hybrid networks: a survey. Technical Report CS-2006-10,...
  • J. García-Duque et al.

    A six-valued logic to reason about uncertainty and inconsistency in requirements specifications

    Journal of Logic and Computation

    (2006)
  • J. García-Duque et al.

    Guidelines for the incremental identification of aspects in requirements specifications

    Requirements Engineering

    (2006)
  • D. Gelernter

    Generative communication in Linda

    ACM Computing Surveys

    (1985)
  • Goldenberg DK, Lin J, Morse AS, Rosen BE, Yang YR. Towards mobility as a network control primitive. In: Fifth ACM...
  • R.H. Güting et al.

    A foundation for representing and querying moving objects

    ACM Transactions on Database Systems

    (2000)
  • Handorean R, Gill CD, Roman G-C. Accommodating transient connectivity in ad hoc and mobile settings. In: Second...
  • Cited by (3)

    • 3D P2P overlay over MANETs

      2014, Computer Networks
      Citation Excerpt :

      Such networks can also be made useful and deployed rapidly in case of political disputes like, London and Egypt strikes in 2011 [29–32]. There are few applications [33,34] that can be used for these purposes. In this paper, we consider a scenario of a structured P2P overlay over a MANET, where not all nodes share and access files, i.e., some nodes are peers and others are non-peers.

    View full text