Greedy Routing with Bounded Stretch

Slides:



Advertisements
Similar presentations
Approximation algorithms for geometric intersection graphs.
Advertisements

Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
Compact Routing in Theory and Practice Lenore J. Cowen Tufts University.
The Crossroads of Geography and Networks Michael T. Goodrich Dept. of Computer Science w/ David Eppstein, Kevin Wortman, Darren Strash, and Lowell Trott.
1 Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces Dmitri Krioukov CAIDA/UCSD Joint work with F. Papadopoulos, M.
Compact and Low Delay Routing Labeling Scheme for Unit Disk Graphs Chenyu Yan, Yang Xiang, and Feodor F. Dragan (WADS 2009) Kent State University, Kent,
Wavelength Assignment in Optical Network Design Team 6: Lisa Zhang (Mentor) Brendan Farrell, Yi Huang, Mark Iwen, Ting Wang, Jintong Zheng Progress Report.
Rumors and Routes Rajmohan Rajaraman Northeastern University, Boston May 2012 Chennai Network Optimization WorkshopRumors and Routes1.
Geometric Ad-Hoc Routing: Of Theory and Practice Fabian Kuhn Roger Wattenhofer Yan Zhang Aaron Zollinger.
Does Topology Control Reduce Interference? Martin Burkhart Pascal von Rickenbach Roger Wattenhofer Aaron Zollinger.
Ad-Hoc Networks Beyond Unit Disk Graphs
XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Worst-Case Optimal and Average-Case Efficient Geometric Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
Routing, Anycast, and Multicast for Mesh and Sensor Networks Roland Flury Roger Wattenhofer RAM Distributed Computing Group.
Department of Computer Science, University of Maryland, College Park, USA TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.:
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
1 Analyzing Kleinberg’s (and other) Small-world Models Chip Martel and Van Nguyen Computer Science Department; University of California at Davis.
Leveraging Linial's Locality Limit Christoph Lenzen, Roger Wattenhofer Distributed Computing Group.
Randomized 3D Geographic Routing Roland Flury Roger Wattenhofer Distributed Computing Group.
Efficient Hop ID based Routing for Sparse Ad Hoc Networks Yao Zhao 1, Bo Li 2, Qian Zhang 2, Yan Chen 1, Wenwu Zhu 3 1 Lab for Internet & Security Technology,
Traveling with a Pez Dispenser (Or, Routing Issues in MPLS) Anupam Gupta Amit Kumar FOCS 2001 Rajeev Rastogi Iris Reinbacher COMP670P
Geometric Routing without Geometry
Dept. of Computer Science Distributed Computing Group Asymptotically Optimal Mobile Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
[1][1][1][1] Lecture 2-3: Coping with NP-Hardness of Optimization Problems in Practice May 26 + June 1, Introduction to Algorithmic Wireless.
An Efficient Location Service for Mobile Ad Hoc Networks Roland Flury Roger Wattenhofer Distributed Computing Group MLS.
Algorithmic Models for Sensor Networks Stefan Schmid and Roger Wattenhofer WPDRTS, Island of Rhodes, Greece, 2006.
1 Analyzing Kleinberg’s (and other) Small-world Models Chip Martel and Van Nguyen Computer Science Department; University of California at Davis.
Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets.
Greedy Routing with Bounded Stretch Roland Flury, Roger Wattenhofer (ETH Zurich), Sriram Pemmaraju (Iowa University) Published at IEEE Infocom 2009 Introduction.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Introduction to Routing. The Routing Problem Apply after placement Input: –Netlist –Timing budget for, typically, critical nets –Locations of blocks and.
An Algorithmic Approach to Geographic Routing in Ad Hoc and Sensor Networks - IEEE/ACM Trans. on Networking, Vol 16, Number 1, February 2008 D
1 Introduction to Approximation Algorithms. 2 NP-completeness Do your best then.
Improved Sparse Covers for Graphs Excluding a Fixed Minor Ryan LaFortune (RPI), Costas Busch (LSU), and Srikanta Tirthapura (ISU)
Separability and Topology Control of Quasi Unit Disk Graphs Philippe Giabbanelli CMPT 880 – Spring 2008.
Transitive-Closure Spanner of Directed Graphs Kyomin Jung KAIST 2009 Combinatorics Workshop Joint work with Arnab Bhattacharyya MIT Elena Grigorescu MIT.
1 Oblivious Routing in Wireless networks Costas Busch Rensselaer Polytechnic Institute Joint work with: Malik Magdon-Ismail and Jing Xi.
1 Oblivious Routing in Wireless networks Costas Busch Rensselaer Polytechnic Institute Joint work with: Malik Magdon-Ismail and Jing Xi.
Gennaro Cordasco - How Much Independent Should Individual Contacts be to Form a Small-World? - 19/12/2006 How Much Independent Should Individual Contacts.
Online Social Networks and Media
On Graphs Supporting Greedy Forwarding for Directional Wireless Networks W. Si, B. Scholz, G. Mao, R. Boreli, et al. University of Western Sydney National.
Efficient Labeling Scheme for Scale-Free Networks The scheme in detailsPerformance of the scheme First we fix the number of hubs (to O(log(N))) and show.
Analysis and algorithms of the construction of the minimum cost content-based publish/subscribe overlay Yaxiong Zhao and Jie Wu
Retrieval-Guaranteed Location-Aware Information Brokerage Scheme in 3D Wireless Ad Hoc Networks.
1 Presented by Jing Sun Computer Science and Engineering Department University of Conneticut.
Two Connected Dominating Set Algorithms for Wireless Sensor Networks Overview Najla Al-Nabhan* ♦ Bowu Zhang** ♦ Mznah Al-Rodhaan* ♦ Abdullah Al-Dhelaan*
ETH Zurich – Distributed Computing Group Stephan HolzerSODA Stephan Holzer Silvio Frischknecht Roger Wattenhofer Networks Cannot Compute Their Diameter.
ProgessFace: An Algorithm to Improve Routing Efficiency of GPSR-like Routing Protocols in Wireless Ad Hoc Networks Chia-Hung Lin, Shiao-An Yuan, Shih-Wei.
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
Spanning Trees Dijkstra (Unit 10) SOL: DM.2 Classwork worksheet Homework (day 70) Worksheet Quiz next block.
Data Structures for Emergency Planning Cyril Gavoille (LaBRI, University of Bordeaux) 8 th FoIKS Bordeaux – March 3, 2014.
VLSI Physical Design Automation
Does Topology Control Reduce Interference?
Forbidden-Set Distance Labels for Graphs of Bounded Doubling Dimension
Surviving Holes and Barriers in Geographic Data Reporting for
Leveraging Linial's Locality Limit
Know thy Neighbor’s Neighbor Better Routing for Skip Graphs and Small Worlds Moni Naor Udi Wieder.
Peer-to-Peer and Social Networks
Jie Gao Stony Brook University CG Week 2012
I206: Lecture 15: Graphs Marti Hearst Spring 2012.
Clustering TexPoint fonts used in EMF.
Koorde: A simple degree optimal DHT
On the effect of randomness on planted 3-coloring models
Introduction Wireless Ad-Hoc Network
Compact routing schemes with improved stretch
How to use spanning trees to navigate in Graphs
Distance-preserving Subgraphs of Interval Graphs
Routing in Networks with Low Doubling Dimension
Forbidden-set labelling in graphs
Presentation transcript:

Greedy Routing with Bounded Stretch Cluster 1 Greedy Routing with Bounded Stretch Roland Flury, Roger Wattenhofer (ETH Zurich), Sriram Pemmaraju (Iowa University) Published at IEEE Infocom 2009 Introduction We consider the problem of greedy routing where messages are forwarded to the neighbor which is closest to the destination node. Due to its simplicity, this routing scheme is very promising. For greedy routing, the nodes only need to know their position (which may be obtained from GPS or through a virtual placement). In general, greedy routing does not work as messages may get stuck at local minima, nodes which have no neighbor that is closer to the destination, see Figure 1. Many geometric solutions to escape such local minima have been proposed so far. We follow a different approach: assign coordinates such that greedy routing always works. Greedy paths are not necessarily optimal. We measure the overhead through the stretch : In our example, the greedy path uses 5 hops whereas the optimal path only needs 4. Thus, the path has a stretch of 1.25. Ingredient 1: Tree Cover Build a constant stretch tree cover of O(log n) trees We choose a set of trees {T1, T2, …, Tk} such that for any two nodes u, v  Ti with dTi(u,v) ≤ ρ dG(u,v) Gupta et al. describe the construction of a constant stretch tree cover for planar graphs We extend this result to CUDGs Embedding Example Introduction To build the first tree of the tree cover, separate the network. From the separator, grow a BFS tree to obtain the first tree. Remove the separator from the network and continue recursively on the remaining connected components. In our example, the recursion already stops as the new separators already cover the entire components. The second tree is obtained by concatenating the components via the removed separator. Ingredient 2: Separators Any planar graph of n vertices can be separated such that each resulting connected component has at most 2/3 n vertices. [Lipton, Tarjan] We show that this result also holds for CUDGs Note: We need no geometric information. 1 2 3 9 4 5 6 8 7 Figure 1: The greedy path from node 2 towards node 6 falls into a local minimum at node 1 which has no neighbor closer to node 6. ≤ 2 3 n ≤ 2 3 n Greedy embedding 1 3 9 8 4 5 6 7 2 Figure 2: The network is embedded such that greedy routing between any two points is possible. Ingredient 3: Distance Labeling Any tree of n vertices can be embedded isometrically into c ∙ log n dimensions. [Linial et al.] Given the coordinates of any two nodes, the exact distance (along the tree) can be obtained using the L∞ norm: Label each tree using the distance labeling. stretch := length of greedy path length of optimal path [2, 0, 2] [3, 1, 3] [1, 1, 1] [0, 2, 2] [0, 2, 0] L ∞( [3, 1, 3] , [0, 2, 2] ) = 3 Our Results A CUDG is a Combinatorial Unit Disk Graph, a UDG without any geometric information. Note: without 2D coordinates, it is NP-hard to find an embedding given only the connectivity of the network. This result can also be seen as a compact routing scheme with O(log3 n) bits. Note: UDGs are not constant doubling Our technique can be used for general graphs, where we obtain a O(log3 n)-dimensional embedding with O(log n) stretch. Embedding & Routing Recipe Build a constant stretch tree cover using the separator theorem for CUDGs Label each tree with the isometric embedding Greedy routing from u to v : Forward along the tree which indicates the shortest distance. Finally, combine the labels from the different trees to form the coordinate of each node. A CUDG can be embedded in polynomial time into O(log2 n) dimensions such that greedy routing has a constant stretch [2, 0, 2] [3, 1, 3] [1, 1, 1] [0, 2, 2] [0, 2, 0] How good is our greedy embedding? Our greedy embedding is the first to ensure a constant stretch for greedy routing. To get a feeling about the quality of our embedding, we ran simulations on over 2000 random networks of varying size and analyzed over 108 paths of 74 hops on average. The plot shows the stretch for different network densities and path lengths. Related Work Any planar 3-connected network has a greedy embedding in 2D. The average stretch is 1.1, which shows that our greedy routing has only 10% longer routes than an optimal solution. The maximum stretch was found for an ‘unlucky’ short route, which was 3 times longer than the optimal route. In general, short routes tend to have low stretch as they are likely to be connected through a good tree. sparse, tree-like networks short paths: good tree is likely fewer samples Conjecture by Papadimitriou and Ratajczak Proven by Moitra and Leighton in 2008 Any network has a greedy embedding into the hyperbolic space. Robert Kleinberg, 2007 Improved by Eppstein & Goodrich in 2008 such that coordinates only need O(n) bits Worst case stretch: O(n)