Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 The Geodesic Broadcast Scheme for Wireless Ad Hoc Networks Dimitrios Katsaros, Ph.D. Yannis Manolopoulos, Dept. Informatics Aristotle University,

Similar presentations


Presentation on theme: "1 The Geodesic Broadcast Scheme for Wireless Ad Hoc Networks Dimitrios Katsaros, Ph.D. Yannis Manolopoulos, Dept. Informatics Aristotle University,"— Presentation transcript:

1 1 The Geodesic Broadcast Scheme for Wireless Ad Hoc Networks Dimitrios Katsaros, Ph.D. Yannis Manolopoulos, prof. @ Dept. Informatics Aristotle University, Thessaloniki, Greece IEEE Mobile Distributed Computing Workshop: 26/06/2006 Presentation by: Panickos Neophytou @ Dept. of Computer Science University of Pittsburgh, USA

2 2 Mobile Ad Hoc Networks No wired infrastructure Self-organized All nodes act as routers Broadcasted signal Powered by battery (majority) Mobile (maybe) Potential Multi-hop routes

3 3 Wireless communication model r u Every node that falls inside the communication range r of a node u, is considered reachable (one-to-all broadcast). In practice, it is more complicated than this! We adopt this model due to its simplicity.

4 4 Broadcasting – Applications Alarm signal Route discovery in non-GPS routing Paging Destination search in GPS routing: Source S broadcasts short message that will search for destination D Destination D will route back to S with a short message location report S will route full message to D Location updates for routing, geocasting, …

5 5 Relevant work - Broadcasting A straightforward method for implementing broadcasting is by use of flooding (reliable, but broadcast-storm problem ) probability-based methods (non-reliable) area-based methods (reliable) neighbour-knowledge-based methods Are based on the concept of identifying a small forward node set, which has the property that the nodes of this set form a connected dominating set (CDS) for the ad hoc network graph

6 6 Relevant work – Topology control Relative Neighborhood Graph (RNG): An edge uv is included in RNG iff it is not the longest edge in any triangle uvw. Grabriel Graph (GG): An edge uv is included in GG iff the disk with diameter uv contains no other node inside it. Minimum Spanning Tree (MST) and Localized Minimum Spanning Tree (LMST): Calculated with Dijkstra’s algorithm and Li, Hou & Sha, respectively. uv uv included uv uv not included w w u v uv included uv not included v u w sample graph MST LMST Delaunay Triangulation (DT), Partial Delaunay Triangulation (PDT), Yao graph (YG), etc: A lot of other (variants of) geometric structures  Topology Control: Choosing a set of links from the possible ones. Not exactly our problem. So graph-theoretic concepts, than geometric ones.

7 7 Minimal Dominating Set A vertex set is DS (Dominating Set) Any other vertex connected to one DS vertex It is CDS, if it is connected It is MCDS if its size is minimum among CDS Discovery of the MCDS of a graph is in NP-complete DSCDS A lot of methods perform broadcasting with the aid of CDS …

8 8 Motivation for new broadcasting protocol The protocol should: be localized, and thus distributed incur moderate number of message exchange among the nodes be computationally efficient, and thus able to cope with frequent changes in the network topology due to high/moderate mobility not make use of “variants”, e.g., node IDs, because a (locally) best decision might not be reached (even if it does exist) fully exploit the locally available information in making the best decisions

9 9 Well-known CDS algorithm Each node exchanges its neighborhood information with all of its one-hop neighbors Any node with two unconnected neighbors becomes a dominator (red) The set of all the red nodes form a CDS Wu and Li ’ s algorithm

10 10 Well-known CDS algorithm A node v can be taken out from the CDS if there exists a node u such that N[v] is a subset of N[u] and the ID of v is smaller than the ID of u A node u can be taken out from the CDS if u has two neighbors v and w such that N(u) is covered by N(v) ∪ N(w) and its ID is the smallest of the other two nodes ’ IDs Open neighbor set N(v) = {u | u is a neighbor of v} Closed neighbor set N[v] = N(v) ∪ {v} Wu and Li ’ s algorithm (Pruning Rules 1 & 2) vuvuuv w

11 11 Weaknesses of current approaches Some approaches can not detect all possible eliminations because ordering based on node ID prevents this. As a consequence they incur significantly excessive retransmissions Others rely on a lot of “local” information, for instance knowledge of k-hop neighborhood (k > 2), e.g., [WD04,WL04] Other methods are computationally expensive, incurring a cost of O(f 2 ) or O(f 3 ), where f is the maximum degree of a node of the ad hoc network, e.g., the methods reported in [WL01, WD03, DW04] and [SSZ02] some methods (e.g., [QVLl00,SSZ02]) do not fully exploit the compiled information ; for instance, the use of the degree of a node as its priority when deciding its possible inclusion in the dominating set might not result in the best local decision

12 12 Terminology A MANET is abstracted as a graph G(V,E) An edge e=(u,v), exists if and only if u is in the transmission range of v and vice versa. All links in the graph are bidirectional The network is assumed to be in a connected state The set of neighbors of a node v is represented by N 1 (v), i.e., N 1 (v)={u: (v,u)  E} The set of two-hop nodes of node v, i.e., the nodes which are the neighbors of node v's neighbors except for the nodes that are the neighbors of node v, is represented by N 2 (v) The combined set of one-hop and two-hop neighbors of v is denoted as N 12 (v).

13 13 A new measure of node importance Let σ uw = σ wu denote the number of shortest paths from u  V to w  V (by definition, σ uu =0). Let σ uw (v) denote the number of shortest paths from u to w that some vertex v  V lies on. We define the node importance index NI(v) of a vertex v as: Large values for the NI index of a node v indicate that this node v can reach others on relatively short paths, or that the node v lies on considerable fractions of shortest paths connecting others. In the former case, it captures the fact of a possibly large degree of node v, and in the latter case, it captures the fact that v might have one (some) “isolated” neighbors

14 14 The NI index in sample graphs In parenthesis, the NI index of the respective node; i.e., 7(156): node with ID 7 has NI equal to 156. Nodes with large NI:  Articulation nodes (in bridges), e.g., 3, 4, 7, 16, 18  With large fanout, e.g., 14, 8, U Therefore: geodesic nodes

15 15 The NI index in a localized algorithm For any node v, the NI indexes of the nodes in N 12 (v) calculated only for the subgraph of the 2-hop (in general, k-hop) neighborhood reveal the relative importance of the nodes in covering N 12 For a node u (of the 2-hop neighbourhood of a node v), the NI index of u will be denoted as NI v (u)

16 16 How to compute the NI index? At a first glance, NI computation seems expensive, i.e., O(m*n 2 ) operations in total for a 2-hop neighbourhood, which consists of n nodes and m links: calculating the shortest path between a particular pair of vertices (assume for the moment that there exists only one) can be done using breadth-first search in O(m) time, and there exist O(n 2 ) vertex pairs Fortunately, we can do better than this by making some smart observations. The improved algorithm ( CalculateNodeImportanceIndex ) is quite complicated and beyond the scope of this presentation THEOREM. The complexity of the algorithm CalculateNodeImportanceIndex is O(n*m) for a graph with n vertices and m edges

17 17 Pseudocode for CalculateNodeImportanceIndex

18 18 Pseudocode for CalculateNodeImportanceIndex

19 19 Exploitation of NI in broadcasting Design of a traditional source-dependent neighbor-designating method for broadcasting Each node selects (designates) its neighbors, which will rebroadcast the message The NIBB or Geodesic broadcasting algorithm THEOREM. The NIBB algorithm is reliable, in the sense that the broadcasting packet can be disseminated to every node in the network (if it is connected)

20 20 Evaluation setting Evaluation against: WL, the basic scheme of [WL01] without the two rules (Rule 1 and Rule 2) WL 1+2, improved scheme incorporating these rules indicated MPR, the MultiPoint Relaying method denoted as [QVL00] SSZ, reported in [SSZ02], which was selected as a Fast Breaking Paper for October 2003 Evaluation w.r.t.: Number of nodes of the MANET Average node degree (i.e., density of the MANET) Number of clusters (implementation of a suitable network topology generator) Strength of the clusters, called graph assortativity, (i.e., are there many bridges and nodes with large fanout)

21 21 Performance: vs. #nodes

22 22 Performance: vs. avg node degree

23 23 Performance: vs. #clusters

24 24 Performance: vs. cluster “strength”

25 25 Conclusions on NIBB The proposed protocol is based on a novel localized metric for measuring the value of a node in “covering” the neighbourhood with its rebroadcast The calculation of this metric is very efficient, linear in the number of nodes and linear in the number of links The protocol is able to reap significant performance gains, reducing the number of rebroadcasting nodes

26 26 Conclusions on NIBB This metric itself is of independent importance, since it can be used: in performing wireless (ad hoc or sensor) network clustering for detection of critical nodes and links for connectivity in MANETs We described the protocol as a neighbour designating method, although a self-pruning version of it is also possible with the exploitation of a backoff procedure

27 27 References 1.J. Wu, and H. Li, H. A dominating-set-based routing scheme in ad hoc wireless networks, Telecommunication Systems, 18(1– 3), 13–36, 2001. 2.I. Stojmenovic, M. Seddigh and J.D. Zunic. Dominating sets and neighbor elimination-based broadcasting algorithms in wireless networks, IEEE Transactions on Parallel and Distributed Systems, 13(1), 14–25, 2002. 3.A. Qayyum, L. Viennot and A. Laouiti. Multipoint Relaying: An efficient technique for flooding in mobile wireless networks, Technical Report, Institut National de Recherche en Informatique et Automatique (INRIA), No. 3898, March, 2000. 4.J. Wu and F. Dai. Broadcasting in ad hoc networks based on self-pruning, International Journal of Foundations of Computer Science, 14(2), 201–221, 2003. 5.J. Wu and F. Dai. A generic distributed broadcast scheme in ad hoc wireless networks, IEEE Transactions on Computers, 53(10), 1343–1354, 2004.

28 28 References 6.F. Dai and J. Wu. An extended localized algorithm for connected dominating set formation in ad hoc wireless networks, IEEE Transactions on Parallel and Distributed Systems, 15(10), 908–920, 2004. 7.F. Dai and J. Wu. Performance analysis of broadcast protocols in ad hoc networks based on self-pruning, IEEE Transactions on Parallel and Distributed Systems, 15(11), 1027– 1040, 2004. 8.J. Wu and W. Lou. Extended multipoint relays to determine connected dominating sets in MANETs, IEEE Transactions on Computers, 55(3), 334–347, 2006. 9.W. Lou and J. Wu. On reducing broadcast redundancy in ad hoc wireless networks, IEEE Transactions on Mobile Computing, 1(2), 111–122, 2002. 10.N. Li, J. C. Hou, L. Sha. Design and Analysis of an MST-Based Topology Control Algorithm, IEEE INFOCOM, 2003


Download ppt "1 The Geodesic Broadcast Scheme for Wireless Ad Hoc Networks Dimitrios Katsaros, Ph.D. Yannis Manolopoulos, Dept. Informatics Aristotle University,"

Similar presentations


Ads by Google