Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Lowering the barrier to wireless and mobile experimentation

Published: 01 January 2003 Publication History

Abstract

The success of ns highlights the importance of an infrastructure that enables efficient experimentation. Similarly, Netbed's automatic configuration and control of emulated and live network environments minimizes the effort spent configuring and running experiments. Learning from the evolution of these systems, in this paper we argue that a live wireless and mobile experimental facility focusing on ease of use and accessibility will not only greatly lower the barrier to research in these areas, but that the primary technical challenges can be overcome.The flexibility of Netbed's common abstractions for diverse node and link types has enabled its development from strictly an emulation platform to one that integrates simulation and live network experimentation. It can be further extended to incorporate wireless and mobile devices. To reduce the tedium of wireless and mobile experimentation, we propose automatically allocating and mapping a subset of a dense mesh of devices to match a specified network topology. To achieve low-overhead, coarse repeatability for mobile experiments, we outline how to leverage the predictability of passive couriers, such as PDA-equipped students and PC-equipped busses.

References

[1]
S. Bajaj et al. Improving Simulation for Network Research. Technical Report 99-702b, USC, March 1999.
[2]
M. G. Baker, J. H. Hartman, M. D. Kupfer, K. W. Shirriff, and J. K. Ousterhout. Measurements of a distributed file system. In Proc. of 13th ACM SOSP, pages 198--212, 1991.
[3]
J. Broch, D. A. Maltz, D. B. Johnson, Y.-C. Hu, and J. Jetcheva. A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. In Proc. of the Fourth Annual ACM/IEEE MOBICOM, October 1998.
[4]
S. M. Cherry. What Went Wrong at Ricochet. IEEE Spectrum, 29(3):60--61, Mar. 2002.
[5]
J. Heidemann, N. Bulusu, J. Elson, C. Intanagonwiwat, K. chan Lan, Y. Xu, W. Ye, D. Estrin, and R. Govindan. Effects of Detail in Wireless Network Simulation. In Proc. of the SCS Multiconference on Distributed Simulation, pages 3--11. USC/ISI, January 2001.
[6]
J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and K. Pister. System Architecture Directions for Networked Sensors. In Proceedings of the 9th Intl. Conf. on Architectural Support for Programming Languages and Operating Systems, pages 93--104, Nov. 2000.
[7]
P. Johansson, T. Larsson, N. Hedman, B. Mielczarek, and M. Degermark. Scenario-based Performance Analysis of Routing Protocols for Mobile Ad-hoc Networks. In Proc. of the Fifth Annual ACM/IEEE MOBICOM, pages 195--206, August 1999.
[8]
D. Johnson, C. Aragon, L. McGeoch, and C. Schevon. Optimization by Simulated Annealing: An Experimental Evaluation; Part I, Graph Partitioning. Operations Research, 37(6):865--893, 1989.
[9]
D. B. Johnson et al. The CMU Monarch Project's Wireless and Mobility Extensions to ns. Technical report, Carnegie Mellon University, August 1999.
[10]
J. Kaba and D. Raichle. Testbed on a Desktop: Strategies and Techniques to Support Multi-hop MANET Routing Protocol Development. In Proc. of the 2001 ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc'01), Oct. 2001.
[11]
P.-H. Kamp and R. N. M. Watson. Jails: Confining the Omnipotent Root. In Proc. 2nd Intl. SANE Conference, May 2000.
[12]
Q. Ke, D. A. Maltz, and D. B. Johnson. Emulation of Multi-Hop Wireless Ad Hoc Networks. In Proc. of the Seventh International Workshop on Mobile Multimedia Communications, October 2000.
[13]
LAN/MAN Standards Committee of the IEEE Computer Society. IEEE Std 802.11a-1999. Technical report, IEEE, 1999.
[14]
LAN/MAN Standards Committee of the IEEE Computer Society. IEEE Std 802.11b-1999. Technical report, IEEE, September 1999.
[15]
B. M. Leiner, R. J. Ruth, and A. R. Sastry. Goals and Challenges of the DARPA GloMo Program. IEEE Personal Communications, December 1996.
[16]
J. Li, J. Jannotti, D. S. J. De Couto, D. R. Karger, and R. Morris. A Scalable Location Service for Geographic Ad Hoc Routing. In Proc. of the 6th Annual Intl. Conf. on Mobile Computing and Networking, Aug. 2000.
[17]
D. A. Maltz, J. Broch, and D. B. Johnson. Experiences Designing and Building a Multi-Hop Wireless Ad Hoc Network Testbed. Technical Report CMU-CS-99-116, Carnegie Mellon University, March 1999.
[18]
D. A. Maltz, J. Broch, and D. B. Johnson. Lessons from a Full-Scale Multi-Hop Wireless Ad Hoc Network Testbed. IEEE Personal Communications, Feb. 2001.
[19]
R. Morris, J. Jannotti, F. Kaashoek, J. Li, and D. Decouto. CarNet: A Scalable Ad Hoc Wireless Network System. In Proc. of the Ninth ACM SIGOPS European Workshop, Kolding, Denmark, Sept. 2000.
[20]
B. Noble, M. Satyanarayanan, G. T. Nguyen, and R. H. Katz. Trace-Based Mobile Network Emulation. In Proc. of SIGCOMM '97, September 1997.
[21]
R. Tanese. The Distributed Genetic Algorithm. In Third International Conference on Genetic Algorithms, pages 434--439. Morgan Kaufmann, 1989.
[22]
P. Van Hentenryck. Constraint Satisfaction in Logic Programming. Logic Programming Series, The MIT Press, Cambridge, MA, 1989.
[23]
B. White, J. Lepreau, L. Stoller, R. Ricci, S. Guruprasad, M. Newbold, M. Hibler, C. Barb, and A. Joglekar. An Integrated Experimental Environment for Distributed Systems and Networks. In Proc. of the 5th Symposium on Operating Systems Design and Implementation, Boston, MA, December 2002.
[24]
X. Zeng, R. Bagrodia, and M. Gerla. GloMoSim: A Library for Parallel Simulation of Large-scale Wireless Networks. In Proc. of the 12th Workshop on Parallel and Distributed Simulation, pages 154--161, May 1998.
[25]
Y. Zhang and W. Li. An Integrated Environment for Testing Mobile Ad-Hoc Networks. In Proc. of the 2002 ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc'02), June 2002.

Cited By

View all
  • (2024)Magpie: Improving the Efficiency of A/B Tests for Large Scale Video-on-Demand SystemsProceedings of the 2024 ACM on Internet Measurement Conference10.1145/3646547.3689019(588-594)Online publication date: 4-Nov-2024
  • (2023)IsaNetJournal of Computer Security10.3233/JCS-22002131:3(217-259)Online publication date: 1-Jan-2023
  • (2021)How Distance-Bounding Can Detect Internet Traffic HijackingCryptology and Network Security10.1007/978-3-030-92548-2_19(355-371)Online publication date: 13-Dec-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM SIGCOMM Computer Communication Review
ACM SIGCOMM Computer Communication Review  Volume 33, Issue 1
January 2003
148 pages
ISSN:0146-4833
DOI:10.1145/774763
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 January 2003
Published in SIGCOMM-CCR Volume 33, Issue 1

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)0
Reflects downloads up to 19 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Magpie: Improving the Efficiency of A/B Tests for Large Scale Video-on-Demand SystemsProceedings of the 2024 ACM on Internet Measurement Conference10.1145/3646547.3689019(588-594)Online publication date: 4-Nov-2024
  • (2023)IsaNetJournal of Computer Security10.3233/JCS-22002131:3(217-259)Online publication date: 1-Jan-2023
  • (2021)How Distance-Bounding Can Detect Internet Traffic HijackingCryptology and Network Security10.1007/978-3-030-92548-2_19(355-371)Online publication date: 13-Dec-2021
  • (2019)Fairness Measurement Procedure for the Evaluation of Congestion Control AlgorithmsJournal of Communications10.12720/jcm.14.11.1017-1025(1017-1025)Online publication date: 2019
  • (2018)PantheonProceedings of the 2018 USENIX Conference on Usenix Annual Technical Conference10.5555/3277355.3277426(731-743)Online publication date: 11-Jul-2018
  • (2018)Mobility in mobile ad-hoc network testbed using robot: Technical and critical reviewRobotics and Autonomous Systems10.1016/j.robot.2018.07.007108(153-178)Online publication date: Oct-2018
  • (2018)Mobility in MANET Using Robot: A ReviewFuturistic Trends in Network and Communication Technologies10.1007/978-981-13-3804-5_23(304-324)Online publication date: 25-Dec-2018
  • (2017)Secure producer mobility in information-centric networkProceedings of the 4th ACM Conference on Information-Centric Networking10.1145/3125719.3125725(163-169)Online publication date: 26-Sep-2017
  • (2016)A Survey of Man In The Middle AttacksIEEE Communications Surveys & Tutorials10.1109/COMST.2016.254842618:3(2027-2051)Online publication date: 1-Jul-2016
  • (2012)Towards a framework for evaluating BGP securityProceedings of the 5th USENIX conference on Cyber Security Experimentation and Test10.5555/2372336.2372340(3-3)Online publication date: 6-Aug-2012
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media