The Community for Technology Leaders
RSS Icon
Issue No.05 - May (2013 vol.12)
pp: 855-867
Adrian Holzer , Politechnique Montréal, Montréal
Patrick Eugster , Purdue University, West Lafayette
Benoît Garbinato , Lausanne University, Lausanne
Location-based multicast addressing (LMA) yields an important building block for context-aware applications in mobile ad hoc networks (MANETs). In LMA, messages are routed based on their content as well as on the location of the sending and the receiving nodes. The same dynamism that motivates locations as part of the addressing mechanism for multicast applications in MANETs, makes such a multicast challenging to implement both efficiently and reliably across application scenarios. Different implementation strategies have been proposed in literature for abstractions similar to LMA, motivated and validated by specific applications. The goal of this paper is to devise specific implementation strategies for LMA and compare these strategies in the context of several application scenarios, in order to aid in the selection of a scheme for a given application. To that end, we first detail three algorithms for implementing LMA. The first, message-centric, strategy uses geographically scoped gossiping to propagate messages. The second, query-centric, strategy propagates queries of receivers to subsequently route messages. The third, hybrid, strategy strives for the best of both worlds through a restricted multicasting of both messages and queries. We compare these algorithms both analytically and empirically. We pinpoint differences and break-even points among the approaches based on communication patterns, contrasting our findings with common expectations and our analysis. Our evaluations show that the hybrid approach invariably outperforms at least one of the other approaches, making it a safe choice for settings with varying or unknown communication patterns.
Receivers, Mobile computing, Ad hoc networks, Context, Routing, Peer to peer computing, Mobile communication, multicast, Mobile, ad hoc, location, addressing
Adrian Holzer, Patrick Eugster, Benoît Garbinato, "Evaluating Implementation Strategies for Location-Based Multicast Addressing", IEEE Transactions on Mobile Computing, vol.12, no. 5, pp. 855-867, May 2013, doi:10.1109/TMC.2012.54
[1] R. Baldoni, R. Beraldi, G. Cugola, M. Migliavacca, and L. Querzoni, “Structure-Less Content-Based Routing in Mobile Ad Hoc Networks,” Proc. Int'l Conf. Pervasive Services, 2005.
[2] D. Braginsky and D. Estrin, “Rumor Routing Algorthim for Sensor Networks,” Proc. First ACM Int'l Workshop Wireless Sensor Networks and Applications, 2002.
[3] A. Carzaniga, D.S. Rosenblum, and A.L. Wolf, “Achieving Scalability and Expressiveness in an Internet-Scale Event Notification Service,” Proc. 19th Ann. ACM Symp. Principles of Distributed Computing, 2000.
[4] S. Castelli, P. Costa, and G.P. Picco, “HyperCBR: Large-Scale Content-Based Routing in a Multidimensional Space,” Proc. IEEE INFOCOM, 2008.
[5] M. Cilia, L. Fiege, C. Haul, A. Zeidler, and A.P. Buchmann, “Looking into the Past: Enhancing Mobile Publish/Subscribe Middleware,” Proc. Second Int'l Workshop Distributed Event-Based Systems, 2003.
[6] R. Chandra, V. Ramasubramanian, and K. Birman, “Anonymous Gossip: Improving Multicast Reliability in Mobile Ad-Hoc Networks,” Proc. Int'l Conf. Distributed Computing Systems, 2001.
[7] P. Costa and G.P. Picco, “Semi-Probabilistic Content-Based Publish-Subscribe,” Proc. IEEE Int'l Conf. Distributed Computing Systems, 2005.
[8] P. Costa, M. Migliavacca, G.P. Picco, and G. Cugola, “Epidemic Algorithms for Reliable Content-Based Publish-Subscribe: An Evaluation,” Proc. Int'l Conf. Distributed Computing Systems, 2004.
[9] G. Cugola, A. Margara, and M. Migliavacca, “Context-Aware Publish-Subscribe: Model, Implementation, and Evaluation,” Proc. IEEE Symp. Computers and Comm., 2009.
[10] G. Cugola and M. Migliavacca, “On Context-Aware Publish-Subscribe,” Proc. Second Int'l Workshop Distributed Event-Based Systems, 2008.
[11] G. Cugola and M. Migliavacca, “A Context and Content-Based Routing Protocol for Mobile Sensor Networks,” Proc. Sixth European Conf. Wireless Sensor Networks, 2009.
[12] V. Drabkin and R. Friedman, and G. Kliot, and M. Segal, “RAPID: Reliable Probabilistic Dissemination in Wireless Ad-Hoc Networks,” Proc. IEEE Int'l Symp. Reliable Distributed Systems, 2007.
[13] P. Eugster, B. Garbinato, and A. Holzer, “Location-Based Publish/Subscribe,” Proc. IEEE Fourth Int'l Symp. Network Computing and Applications, 2005.
[14] L. Fiege, F.C. Gaertner, O. Kasten, and A. Zeidler, “Supporting Mobility in Content-Based Publish/Subscribe Middleware,” Proc. ACM/IFIP/USENIX Int'l Conf. Middleware, 2003.
[15] D. Frey and G.-C. Roman, “Context-Aware Publish Subscribe in Mobile Ad Hoc Networks,” Proc. Ninth Int'l Conf. Coordination Models and Languages, 2007.
[16] B. Garbinato, A. Holzer, and F. Vessaz, “Six-Shot Multicast: Location-Aware Strategy for Efficient Message Routing in Manets,” Proc. IEEE Fourth Int'l Symp. Network Computing and Applications, 2005.
[17] B. Garbinato, A. Holzer, and F. Vessaz, “Context-Aware Broadcasting Approaches in Mobile Ad Hoc Networks,” Computer Networks, vol. 54, pp. 1210-1228, 2010.
[18] J. Glanz and J. Markoff, “U.S. Underwrites Internet Detour Around Censors,” New York Times, June 2011.
[19] O. Goussevskaia, T. Moscibroda, and R. Wattenhofer, “Local Broadcasting in the Physical Interference Model,” Proc. Fifth Int'l Workshop Foundations Mobile Computing, 2008.
[20] M. Happner, R. Burridge, and R. Sharma, “Java Message Service,” technical report, Mar. 2002.
[21] Y. Huang and H. Garcia-Molina, “Publish/Subscribe in a Mobile Environment,” Wireless Networks, vol. 10, pp. 643-652, 2004.
[22] R. Meier and V. Cahill, “On Event-Based Middleware for Location-Aware Mobile Applications,” IEEE Trans. Software Eng., vol. 36, no. 3, pp. 409-430, May/June 2010.
[23] S.J. Lee, M. Gerla, and C.C. Chiang, “On-Demand Multicast Routing Protocol,” Proc. Wireless Comm. and Networking Conf., 2009.
[24] M. Migliavacca and G. Cugola, “Adapting Publish-Subscribe Routing to Traffic Demands,” Proc. Inaugural Int'l Conf. Distributed Event-Based Systems, 2007.
[25] S.-Y. Ni, Y.-C. Tseng, Y.-S. Chen, and J.-P. Sheu, “The Broadcast Storm Problem in a Mobile Ad Hoc Network,” Proc. ACM MobiCom, 1999.
[26] V. Paruchuri, A. Durresi, and R. Jain, “Optimized Flooding Protocol for Ad Hoc Networks,” Computing Research Repository, 2003.
[27] V.D. Park and M.S. Corson, “A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks,” Proc. IEEE INFOCOM, 1997.
[28] I. Podnar and I. Lovrek, “Supporting Mobility with Persistent Notification in Publish/Subscribe Systems,” Proc. Second Int'l Workshop Distributed Event-Based Systems, 2004.
[29] E.M. Royer and C.E. Perkins, “Multicast Operation of the Ad-Hoc On-Demand Distance Vector Routing Protocol,” Proc. ACM MobiCom, 1999.
[30] C.F. Sorensen, M. Wu, T. Sivaharan, G.S. Blair, P. Okanda, A. Friday, and H. Duran-Limon, “A Context-Aware Middleware for Applications in Mobile Ad Hoc Environments,” Proc. Workshop Middleware for Pervasive and Ad-Hoc Computing, 2004.
[31] P. Sutton, R. Arkins, and B. Segall, “Supporting Disconnectedness-Transparent Information Delivery for Mobile and Invisible Computing,” Proc. IEEE/ACM First Int'l Symp. Cluster Computing and the Grid, 2001.
[32] J. Xie, R.R. Talpade, A. Mcauley, and M. Liu, “AMRoute: Ad Hoc Multicast Routing Protocol,” Mobile Networks and Applications, vol. 7, pp. 429-439, 2002.
[33] E. Yoneki and J. Bacon, “Distributed Multicast Grouping for Publish/Subscribe over Mobile Ad Hoc Networks,” Proc. Wireless Comm. and Networking Conf., 2005.
[34] J. Yoon, M. Liu, and B. Noble, “Random Waypoint Considered Harmful,” Proc. IEEE INFOCOM, 2003.
[35] Q. Yuan and J. Wu, “DRIP: A Dynamic Voronoi Regions-Based Publish/Subscribe Protocol in Mobile Networks,” Proc. IEEE INFOCOM, 2008.
34 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool