Monitoring Churn in Wireless Networks

Slides:



Advertisements
Similar presentations
Energy-Efficient Distributed Algorithms for Ad hoc Wireless Networks Gopal Pandurangan Department of Computer Science Purdue University.
Advertisements

* Distributed Algorithms in Multi-channel Wireless Ad Hoc Networks under the SINR Model Dongxiao Yu Department of Computer Science The University of Hong.
Leader Election Let G = (V,E) define the network topology. Each process i has a variable L(i) that defines the leader.  i,j  V  i,j are non-faulty.
Design Guidelines for Maximizing Lifetime and Avoiding Energy Holes in Sensor Networks with Uniform Distribution and Uniform Reporting Stephan Olariu Department.
SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
Randomized Sensing in Adversarial Environments Andreas Krause Joint work with Daniel Golovin and Alex Roper International Joint Conference on Artificial.
CLUSTERING IN WIRELESS SENSOR NETWORKS B Y K ALYAN S ASIDHAR.
Fabian Kuhn, Microsoft Research, Silicon Valley
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Johannes Schneider –1 A Log-Star Distributed Maximal Independent Set Algorithm for Growth-Bounded Graphs Johannes Schneider Roger Wattenhofer TexPoint.
Broadcasting Protocol for an Amorphous Computer Lukáš Petrů MFF UK, Prague Jiří Wiedermann ICS AS CR.
Information Dissemination in Highly Dynamic Graphs Regina O’Dell Roger Wattenhofer.
Routing, Anycast, and Multicast for Mesh and Sensor Networks Roland Flury Roger Wattenhofer RAM Distributed Computing Group.
Fast Distributed Algorithm for Convergecast in Ad Hoc Geometric Radio Networks Alex Kesselman, Darek Kowalski MPI Informatik.
Ad Hoc and Sensor Networks – Roger Wattenhofer –7/1Ad Hoc and Sensor Networks – Roger Wattenhofer – MAC Theory Chapter 7 TexPoint fonts used in EMF. Read.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
ETH Zurich – Distributed Computing Group Roger Wattenhofer 1ETH Zurich – Distributed Computing – Christoph Lenzen Roger Wattenhofer Exponential.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Distributed Disaster Disclosure Bernard Mans Stefan Schmid Roger Wattenhofer Scandinavian Workshop on Algorithm Theory (SWAT) June 2008.
ETH Zurich – Distributed Computing Group Jasmin Smula 1ETH Zurich – Distributed Computing – Stephan Holzer Yvonne Anne Pignolet Jasmin.
CS 599 Intelligent Embedded Systems1 Adaptive Protocols for Information Dissemination in Wireless Sensor Networks W.R.Heinzelman, J.kulik, H.Balakrishnan.
EWSN 04 – Berlin, Jan. 20, 2004 Silence is Golden with High Probability: Maintaining a Connected Backbone in Wireless Sensor Networks Paolo Santi* Janos.
Algorithmic Models for Sensor Networks Stefan Schmid and Roger Wattenhofer WPDRTS, Island of Rhodes, Greece, 2006.
Localized Self- healing using Expanders Gopal Pandurangan Nanyang Technological University, Singapore Amitabh Trehan Technion - Israel Institute of Technology,
Johannes PODC 2009 –1 Coloring Unstructured Wireless Multi-Hop Networks Johannes Schneider Roger Wattenhofer TexPoint fonts used in EMF. Read.
1 Plaxton Routing. 2 Introduction Plaxton routing is a scalable mechanism for accessing nearby copies of objects. Plaxton mesh is a data structure that.
Fundamental Lower Bound for Node Buffer Size in Intermittently Connected Wireless Networks Yuanzhong Xu, Xinbing Wang Shanghai Jiao Tong University, China.
CS 712 | Fall 2007 Using Mobile Relays to Prolong the Lifetime of Wireless Sensor Networks Wei Wang, Vikram Srinivasan, Kee-Chaing Chua. National University.
Fault Tolerant and Mobility Aware Routing Protocol for Mobile Wireless Sensor Network Name : Tahani Abid Aladwani ID :
1 Constant Density Spanners for Wireless Ad-Hoc Networks Discrete Mathematics and Algorithms Seminar Melih Onus April
1 Tight Bounds for Delay-Sensitive Aggregation Yvonne Anne Oswald Stefan Schmid Roger Wattenhofer Distributed Computing Group LEA.
PODC Distributed Computation of the Mode Fabian Kuhn Thomas Locher ETH Zurich, Switzerland Stefan Schmid TU Munich, Germany TexPoint fonts used in.
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
Dr. Sudharman K. Jayaweera and Amila Kariyapperuma ECE Department University of New Mexico Ankur Sharma Department of ECE Indian Institute of Technology,
MMAC: A Mobility- Adaptive, Collision-Free MAC Protocol for Wireless Sensor Networks Muneeb Ali, Tashfeen Suleman, and Zartash Afzal Uzmi IEEE Performance,
BATON A Balanced Tree Structure for Peer-to-Peer Networks H. V. Jagadish, Beng Chin Ooi, Quang Hieu Vu.
Cross-Layer Scheduling for Power Efficiency in Wireless Sensor Networks Mihail L. Sichitiu Department of Electrical and Computer Engineering North Carolina.
ETH Zurich – Distributed Computing Group Stephan Holzer 1ETH Zurich – Distributed Computing – Stephan Holzer Yvonne Anne Pignolet Jasmin.
ETH Zurich – Distributed Computing Group Stephan Holzer 1ETH Zurich – Distributed Computing – Stephan Holzer Yvonne Anne Pignolet Jasmin.
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
A Bandwidth Scheduling Algorithm Based on Minimum Interference Traffic in Mesh Mode Xu-Yajing, Li-ZhiTao, Zhong-XiuFang and Xu-HuiMin International Conference.
ETH Zurich – Distributed Computing Group Stephan Holzer 1ETH Zurich – Distributed Computing – Stephan Holzer Yvonne Anne Pignolet Jasmin.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
– Clustering TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A.
ETH Zurich – Distributed Computing Group Stephan HolzerETH Zurich – Distributed Computing – Stephan Holzer - ETH Zürich Thomas Locher.
Adaptive Scheduling over a Wireless Channel under Jamming
Xin Liu Department of Computer Science Univ. of California, Davis
Slotted Programming for Sensor Networks
A Log-Star Distributed Maximal Independent Set Algorithm for Growth-Bounded Graphs Johannes Schneider Roger Wattenhofer TexPoint fonts used in EMF.
Data Collection and Dissemination
Wireless Sensor Network Architectures
Distributed Energy Efficient Clustering (DEEC) Routing Protocol
Introduction to Wireless Sensor Networks
Routing in Wireless Sensor Networks
Leader Election (if we ignore the failure detection part)
Clustering TexPoint fonts used in EMF.
TexPoint fonts used in EMF.
Research: algorithmic solutions for networking
Distributed Network Measurements
Presentation by Andrew Keating for CS577 Fall 2009
Object Location Problem: Find a close copy of an object in a large network Solution should: Find object if it exists Find a close copy of the object (no.
Combinatorial Topology and Distributed Computing
Speaker: Po-Hung Chen Advisor: Dr. Ho-Ting Wu 2016/10/12
Speaker : Lee Heon-Jong
Combinatorial Optimization of Multicast Key Management
Minimizing Broadcast Latency and Redundancy in Ad Hoc Networks
Combinatorial Topology and Distributed Computing
MAC Theory Chapter 7 TexPoint fonts used in EMF.
A Distributed Clustering Scheme For Underwater Sensor Networks
Hongchao Zhou, Fei Liu, Xiaohong Guan
Presentation transcript:

Monitoring Churn in Wireless Networks TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAAAAA

Motivation / Intro Network of sensor nodes: Mobile Computing Summer 2002 Motivation / Intro Network of sensor nodes: measuring certain properties of their environment wireless, communicating on several channels battery powered Nodes might fail / nodes may be added All nodes should be aware of all present nodes with small delay with little energy consumption using few channels for communication Distributed Computing Group, Roger Wattenhofer

Model n nodes with IDs single-hop synchronized time slots t s r Mobile Computing Summer 2002 Model 3 1 5 12 2 n nodes with IDs single-hop synchronized time slots t s r time transmit / receive / sleep 1 energy 1 / 1 / 0 channel 1 t s node 1 local computations free channel 2 k channels channel 1 r s node 2 channel 2 no collision detection channel 1 r s t bounded message size node 3 channel 2 O(1) IDs Distributed Computing Group, Roger Wattenhofer

Model cont’d Nodes may join or crash at any time Mobile Computing Summer 2002 Model cont’d 3 1 5 2 3 1 5 12 2 Nodes may join or crash at any time churn = joins and crashes 7 burst = large number of joins and crashes in short time Adversary: May let nodes crash or join in order to make an algorithm fail Distributed Computing Group, Roger Wattenhofer

Every node must know the IDs of all nodes currently in the network Mobile Computing Summer 2002 Goal Every node must know the IDs of all nodes currently in the network 1 2 3 5 7 12 Distributed Computing Group, Roger Wattenhofer

Mobile Computing Summer 2002 Simple Lower Bounds What time / energy is at least necessary in this model? every node can only receive one message per time slot containing at most a constant number of IDs  on average only constant rate of churn tolerable per time slot  Ω(b) time slots necessary to learn about b joins / crashes  every node needs Ω(b) energy units to learn about b joins / crashes Distributed Computing Group, Roger Wattenhofer

Results Our Monitoring Algorithm: Mobile Computing Summer 2002 Results Our Monitoring Algorithm: tolerates churn bursts in any order of magnitude is deterministic except for detection of joining nodes handles asymptotically maximum average rate of churn tolerable in this model after each burst of size b it takes O(b + log n) time slots and O(b + log n) energy per node until all nodes have updated their ID table (optimal up to additive logarithmic term) needs Θ(n/log n) channels Distributed Computing Group, Roger Wattenhofer

Results cont‘d Our Monitoring Algorithm: Mobile Computing Summer 2002 Results cont‘d Our Monitoring Algorithm: can get by with less than Θ(n/log n) channels: k channels available  time . Distributed Computing Group, Roger Wattenhofer

Monitoring Algorithm burst size is assumed to be b'=log n Mobile Computing Summer 2002 Monitoring Algorithm burst size is assumed to be b'=log n 2b'+2 nodes in each set Θ(n/b') sets nodes partitioned into n/(2b'+2)-1 sets each set detects crashed and joined nodes on its own channel disseminate information to all nodes 1 2 ... 7 12 3 13 34 all nodes update ID table double b' if algo did not work Distributed Computing Group, Roger Wattenhofer

Crash Detection I am still here! I am still here! I am still here! Mobile Computing Summer 2002 Crash Detection nodes send „I am here“ messages I am still here! I am still here! I am still here! min(2b'+2,n) time slots necessary Distributed Computing Group, Roger Wattenhofer

Mobile Computing Summer 2002 Join Detection joiners send join requests to with S1 with probability 1/b' I want to join! Set S1 I want to join! b' in Ω(b)  in constant number of rounds at least 1 joiner Distributed Computing Group, Roger Wattenhofer

Information Dissemination Mobile Computing Summer 2002 Information Dissemination every set becomes vertex of balanced binary tree depth log n every set forwards information on node v with smallest ID first information on v disseminated after O(log n) time slots all information disseminated after O(log n + b') time slots Distributed Computing Group, Roger Wattenhofer

Monitoring Algorithm Step Time b' = log n O(1) partitioning O(1) Mobile Computing Summer 2002 Monitoring Algorithm Step Time b' = log n O(1) partitioning O(1) crash detection O(min(b', n)) log(b/log n) times runtime O(b + log n) join detection O(b' + log n) dissemination O(b' + log n) update ID table O(1) 1 2 ... 7 12 3 13 34 double b' O(1) Distributed Computing Group, Roger Wattenhofer

What if critical nodes crash? Mobile Computing Summer 2002 What if critical nodes crash? in each set node which is responsible for communication with other sets = representative all other nodes replacements replacements take over if representative does not send delay of at most b' still runtime of O(b' + log n) per round Distributed Computing Group, Roger Wattenhofer

Conclusions & Future Work Mobile Computing Summer 2002 Conclusions & Future Work Model t s r Lower Bounds Monitoring Algorithm Future Work: Multi-hop Distributed Computing Group, Roger Wattenhofer

Thank You! Questions & Comments? TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAAAAA